A Survey on Mobile and Pervasive Computing of Efficient Authentication

With today’s technology, several applications have faith in the existence of little devices that may exchange info and kind communication networks. During a good portion of such applications, the confidentiality and integrity of the communicated messages are of specific interest. During this paper, the authors tend to propose 2 novel techniques for authenticating short encrypted messages that square measure directed to meet the necessities of mobile and pervasive applications. By taking advantage of the actual fact that the message to be genuine must even be encrypted, they tend to propose incontrovertibly secure authentication codes that square measure additional economical than any message authentication code within the paper.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Resource Details

Provided by:
International Journal of Research In Advanced Engineering Technologies (IJRAET)
Topic:
Security
Format:
PDF