Showing 1 - 5 results of 5 for search '"message authentication code"', query time: 0.07s Refine Results
  1. 1

    Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine by Mat Isa, Mohd Anuar, Ahmad, Miza Mumtaz, Mohd Sani, Nor Fazlida, Hashim, Habibah, Mahmod, Ramlan

    Published 2014
    “…In this work, we explore the authentication and verification of key exchange protocol using Message Authentication Code (MAC). We propose a new MAC scheme model using input-output automata to protect the integrity of the secret key in the key exchange protocol. …”
    Get full text
    Article
  2. 2

    Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase by Alaidaros, Hashem Mohammed, A. Rasid, Mohd Fadlee, Othman, Mohamed, Raja Abdullah, Raja Syamsul Azmir

    Published 2007
    “…In the current bulk data transfer phase in Secure Socket Layer (SSL), the server or the client firstly calculates the Message Authentication Code (MAC) of the data using Keyed-Hash Message Authentication Code (HMAC) operation, and then performs the symmetric encryption on the data together with the MAC. …”
    Get full text
    Conference or Workshop Item
  3. 3

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…Many applications such as electronic banking, medical database, and electronic commerce require the exchange of private information. Hashed Message Authentication Code (HMAC) is widely used to provide authenticity, while symmetric encryption algorithms provide confidentiality. …”
    Get full text
    Thesis
  4. 4

    Cellular automata based user authentication scheme using identity-bits commitment for wireless sensor network by Jamil, Norziana, Mahmod, Ramlan

    Published 2011
    “…With the advance of the technology where the communication devices are all in small form factor, high speed and low cost authentication scheme for generating Message Authentication Code (MAC) is definitely a demand. This paper introduces a new fast and lightweight authentication scheme based on Cellular Automata (CA) utilizing a so called Identity-bits Commitment embedded in a temper resistance chip inside the wireless sensors. …”
    Get full text
    Conference or Workshop Item
  5. 5

    Improving security performance with parallel crypto operations in SSL bulk data transfer by Alaidaros, Hashem Mohammed, Othman, Mohamed, A. Rasid, Mohd Fadlee

    Published 2009
    “…In the current bulk data transfer phase in Secure Socket Layer (SSL), the server or the client firstly calculates the Message Authentication Code (MAC) of the data using HMAC operation, and then performs the symmetric encryption on the data together with the MAC. …”
    Get full text
    Article