Security Comparison Sample Clauses

Security Comparison. The overall comparison between PL-GAKA and related approaches are shown in Table 2. We refer to [8] for considering the following protocols: • Protocol #1 proposed by Xxxxxxx and Xxxxxxxxxxx is a group password-based key agreement [15]. • Protocol #2 proposed by Xxxxx and Barua is a group password-based authentication key agreement [16]. • Protocol #3 proposed by Xxx et al. is a group key agreement [3]. • Protocol #4 proposed by Xxxx and Xxxxx is a group key agreement [17]. • Protocol #5 proposed by Xxx et al. is a group password-based authentication key agreement [8].
AutoNDA by SimpleDocs
Security Comparison. In this section, we compare the security performance of Xxxxx et al.’s scheme [27], Xxxxx et al.’s scheme [28], Li et al.’s scheme [29] and our scheme. Let S1, S2, S3, S4, S5, S6, S7, S8, S9 denote mutual authentication, session key agreement, identity anonymity, identity traceability, perfect forward security, resistance of replay attack, resistance of mam-in-the-middle attack, resistance of impersonation attack and resistance of tampering attack, respectively. The compar- isons are shown in Table I. According to Amin and Biswas [36], Xxxxx et al.’s scheme does not provide identity anonymity and it cannot provide defense against impersonation attack. We find that the Xxxxx et al.’s scheme does not provide identity anonymity and identity traceability. We also find that Li et al.’s scheme does not achieve identity traceability. However, our scheme can provide all of the security requirements in the Table I. TABLE I SECURITY COMPARISONS
Security Comparison. In Table 3, we have tabulated an overall security comparison among our scheme and other related DBAKA schemes [4, 21-22, 24, 28-32]. Table 3 shows that the proposed scheme has removed the vulnerability of DBAKA protocols in [29-32], e.g. known key attacks. None of these schemes in [4, 21-22, 24, 28-32] provide communication confidentiality. Furthermore, the existing DBAKA protocols always require that VLR and HLR must share secrets in advance. It is inconvenient for the delegation-based authentication protocols. For each HLR, there are always a great many of VLRs in global mobility networks. In order to provide roaming registered mobile users with access service, each HLR has to share a secret with as many as VLRs, some of which are far geographically from HLR, even in different countries. In addition, since HLR also works as a VLR, HLR (as a VLR) must store shared secrets. Our DBAKA protocol does not require VLR and HLR to share any secret key in advance. Table 3. Comparison of security features among different schemes Scheme F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 Xxx-Xxx [4] No Yes Yes No No No No No No No Xxx et al. [24] No Yes Yes No Yes Yes No No No No Xx et al. [21] No No Yes No Yes Yes No No No No Xx-Xxxx [22] Yes No Yes No Yes Yes No No No No Xxxx et al. [28] Yes Yes Yes No Yes Yes No No No No Xx-Xxxxx [29] Yes Yes Yes No Yes Yes No No No No Xxxx et al. [30] Yes Yes Yes No Yes Yes No No No No Xxx et al. [31] Yes Yes Yes No Yes Yes No No No No Hwang-You [32] Yes Yes Yes No Yes Yes No No No Yes Ours Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes F1: whether withstands denial-of-service attack or not; F2: whether withstands request replication attack or not; F3: whether withstands impersonation attack or not; F4: whether withstands known-key attack or not; F5: whether provides mutual authentication or not; F6: whether provides non-repudiation or not; F7: whether provides weak un-traceability or not; F8: whether provides communication confidentiality or not; F9: whether provides key confirmation or not; F10: whether requires no secrets pre-sharing or not. It is observed that our scheme outperforms other recently proposed existing DBAKA schemes as our scheme is secure and supports extra features.

Related to Security Comparison

  • Security Compliance Apple will take appropriate steps to ensure compliance with security procedures by its employees, contractors and sub processors and Apple shall ensure that any persons authorized to process Personal Data comply with applicable laws regarding the confidentiality and security of Personal Data with regards to the Service.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Security Contact Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.

  • Financial Monitoring City staff shall monitor, review, and evaluate the financial procedures of the Subrecipient through documents submitted to the City and on-site monitoring. The Subrecipient shall provide and make available to the City such reports and records that will be necessary for a proper financial evaluation. With reasonable notice being given to the Subrecipient, the City may schedule at least one on-site visit and other visits that may be needed during the course of this Agreement.

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • Commodity Compliance and Compatibility It is the Contractor’s responsibility to ensure that the Commodities supplied are compliant with the Contract requirements, specifications, terms, and conditions. Additionally, the Contractor shall ensure that all Commodities ordered by the Customer are fully compatible with each other and with any associated pre-existing Commodity possessed by the Customer and disclosed to the Contractor by the Customer. The Contractor’s acceptance of the Customer’s order shall indicate that the Contractor agrees to deliver a Commodity that is fully compliant and compatible with the Customer’s order requirements, specifications, terms, and conditions. In the event any ordered Base Equipment, OEM and Non-OEM Option(s), Part(s), Accessory(ies), and Implement(s); and their respective features, equipment, and components are found by the Customer to be missing, incorrect, defective, damaged, non- compatible, or non-compliant, the Contractor shall, at the Customer’s discretion, be required to complete one of the following: • Install or repair the Base Equipment, OEM and Non-OEM Option(s), Part(s), Accessory(ies), and Implement(s), and their respective features, equipment, and components; • Replace the Base Equipment, OEM and Non-OEM Option(s), Part(s), Accessory(ies), and Implement(s); and their respective features, equipment, and components; • Refund the purchase price of the Base Equipment, OEM and Non-OEM Option(s), Part(s), Accessory(ies), and Implement(s); and their respective features, equipment, and components to the Customer. Any changes necessary after the delivery of the Customer’s order that are required to bring a Commodity into compliance or compatibility due to an incorrect order fulfillment by the Contractor shall be accomplished at the Contractor’s expense.

  • FINANCIAL RESOURCES The Adviser has the financial resources available to it necessary for the performance of its services and obligations contemplated in the Pricing Disclosure Package, the Prospectus, and under this Agreement, the Investment Management Agreement and the Administration Agreement.

  • Financial Management (a) The Recipient shall ensure that a financial management system is maintained in accordance with the provisions of Section 2.09 of the Standard Conditions.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!