"2011-09-20+02:00"^^ . . "Zlat\u00E1 Idka" . "[827EA0C4B9EA]" . "authentication; zero-knowledge technique; attack; ITS applications"@en . "Proceedings of the International Scientific Conference Modern Safety Technologies in Transportation" . . . "I, Z(MSM6840770043)" . "21260" . . "It is typical for ITS area that traffic data elements are stored, managed and provided by different subjects. The access to get or insert these traffic data is provided only to subjects (generally to entities) who passed out of process identification, process authentication and have required access privileges. The paper presents protocols using zero-knowledge technique which make possible pass out of process authentication on condition only prove knowledge of password (or some secret) without leak of them. The usage of these protocols in the authentication process for ITS application has advantage and this paper occupies by a design of system's architecture. The paper presents attacker resistance of selected protocols when attacker attempt at fraud."@en . "1"^^ . . "7"^^ . . . "1"^^ . . "Authentication using Zero-Knowledge Technique for ITS Applications"@en . "Authentication using Zero-Knowledge Technique for ITS Applications" . "SUPREMA Ltd." . . . "RIV/68407700:21260/11:00182813!RIV12-MSM-21260___" . "Je\u0159\u00E1bek, Michal" . "Authentication using Zero-Knowledge Technique for ITS Applications"@en . "It is typical for ITS area that traffic data elements are stored, managed and provided by different subjects. The access to get or insert these traffic data is provided only to subjects (generally to entities) who passed out of process identification, process authentication and have required access privileges. The paper presents protocols using zero-knowledge technique which make possible pass out of process authentication on condition only prove knowledge of password (or some secret) without leak of them. The usage of these protocols in the authentication process for ITS application has advantage and this paper occupies by a design of system's architecture. The paper presents attacker resistance of selected protocols when attacker attempt at fraud." . . "Authentication using Zero-Knowledge Technique for ITS Applications" . . . . . . "Ko\u0161ice" . "978-80-970772-0-4" . . . . "RIV/68407700:21260/11:00182813" . "1338-5232" . "187511" .