Common use of Proposed Scheme Clause in Contracts

Proposed Scheme. The proposed scheme involves mainly two entities (the smart meter (SM) and the NAN gateway). Before describing TABLE I Symbols and descriptions current time stamp of SM. In order to provide the message integrity, the SM computes Y 1 = MACL1[SMIDj , T 1, ASMj ]. It generates a pseudo number (φ) and computes α = H(NID φ) idSTj T 1, and finally, sends a message, start α, Q1, ASMj , Y 1, φ, T 1 to the NAN. { } || ⊕ || Symbols Descriptions NID Neighborhood Area Network (NAN) identity XXXX Smart meter identity ST , idST Secret token and its identity EK [ms] Encrypt ms using key (K) DK [ms] Decrypt ms using key (K) p, n Large prime numbers Fq A finite field E Elliptic curve defined on finite field Fq with prime order n G Group of elliptic curve points on E P A point on elliptic curve E with order n H(.) One-way hash function (e.g., SHA-1, SHA-2, MD5, etc.) MAC, || Message authentication code, and concatenation operation φ, φN SM’s and XXX’s pseudo random numbers, respectively

Appears in 3 contracts

Samples: Authentication and Key Agreement, Authentication and Key Agreement, cronfa.swan.ac.uk

AutoNDA by SimpleDocs

Proposed Scheme. The proposed scheme involves mainly two entities (the smart meter (SM) and the NAN gateway). Before describing TABLE I Symbols and descriptions SYMBOLS AND DESCRIPTIONS current time stamp of SM. In order to provide the message integrity, the SM computes Y 1 = MACL1[SMIDj , T 1, ASMj ]. It generates a pseudo number (φ) and computes α = H(NID φ) idSTj T 1, and finally, sends a message, start α, Q1, ASMj , Y 1, φ, T 1 to the NAN. { } || ⊕ || Symbols Descriptions NID Neighborhood Area Network (NAN) identity XXXX Smart meter identity ST , idST Secret token and its identity EK [ms] Encrypt ms using key (K) DK [ms] Decrypt ms using key (K) p, n Large prime numbers Fq A finite field E Elliptic curve defined on finite field Fq with prime order n G Group of elliptic curve points on E P A point on elliptic curve E with order n H(.) One-way hash function (e.g., SHA-1, SHA-2, MD5, etc.) MAC, || Message authentication code, and concatenation operation φ, φN SM’s and XXX’s pseudo random numbers, respectively

Appears in 2 contracts

Samples: Authentication and Key Agreement, Authentication and Key Agreement

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.