A comparative study on access control methods for ITS radio communications systems

Author(s):  
Takahiro Yokomori ◽  
Masahiro Fujii ◽  
Hiroyuki Hatano ◽  
Atsushi Ito ◽  
Yu Watanabe
2009 ◽  
Vol 29 (7) ◽  
pp. 2000-2002
Author(s):  
Qin CHEN ◽  
Huan YUAN ◽  
Jian-hua FENG

2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Reza Alimoradi

The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analyzed.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 322
Author(s):  
K. V. V. Satyanarayana ◽  
J. Mahathi ◽  
V. V. R. Srikar ◽  
S.K. Sai Babu

Now-a-days, usage of cloud is getting more popular and for the safety the security is being enhanced every day from time to time. Multiple security techniques are being implemented.Attribute based security is one of the concepts especially for basics of the cipher-text based, but the user's attributes were given by the multiple authorities. So, the multi-authority with cipher-text encryption is emerging at present. In this, we will see why the cipher-text based is important and different security models with the multi-authority with the revocation in the different levels in the security models.


Sign in / Sign up

Export Citation Format

Share Document