Show simple item record

dc.contributor.authorNorville, Richard S.
dc.contributor.authorNamuduri, Kameswara
dc.contributor.authorPendse, Ravi
dc.date.accessioned2011-05-25T20:02:17Z
dc.date.available2011-05-25T20:02:17Z
dc.date.issued2007
dc.identifier.citationNorville, Richard S., Namuduri, Kamesh and Ravi Pendse. Node authentication in networks using zero-knowledge proofs. -- In: Web Services Security and E-Business. Hearshey, PA: Idea Group, 2007, p.142-164en_US
dc.identifier.isbn1599041685
dc.identifier.isbn9781599041704
dc.identifier.urihttp://hdl.handle.net/10057/3500
dc.identifier.urihttp://dx.doi.org/10.4018/978-1-59904-168-1.ch008
dc.descriptionFull text of this book chapter is not available due to publisher's copyright restrictions.
dc.description.abstractZero-knowledge proof (ZKP) based authentication protocols provide a smart way to prove an identity of a node without giving away any information about the secret of that identity. There are many advantages as well as disadvantages to using this protocol over other authentication schemes, and challenges to overcome in order to make it practical for general use. This chapter examines the viability of ZKPs for use in authentication protocols in networks. It is concluded that nodes in a network can achieve a desired level of security by trading off key size, interactivity, and other parameters of the authentication protocol. This chapter also provides data analysis that can be useful in determining expected authentication times based on device capabilities. Pseudocode is provided for implementing a graph-based ZKP on small or limited processing devices.en_US
dc.language.isoen_USen_US
dc.publisherIdea Groupen_US
dc.titleNode authentication in networks using zero-knowledge proofsen_US
dc.typeBook chapteren_US


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record