{"title":"Appropriate hash functions selection for message authentication in electronic tender for insurance companies","authors":"Ava Pourkashani, R. Rzayev, F. Faghihi","doi":"10.1109/ICCIT.2010.5711224","DOIUrl":null,"url":null,"abstract":"Nowadays, expansion of insurance companies provides competitive market, in which several companies participate in tenders with huge price. as a lot of tenders are held based on electronic form, tender documents security is taken into consideration as high level technical issue. In this paper, decision making algorithm based on AHP for suitable authentication function in e-tender of insurance companies is proposed. For this reason, three kinds of applied hash functions (CBC-MAC, SHA-1 and HMAC) are evaluated based on throughput, security and universality criteria.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"5th International Conference on Computer Sciences and Convergence Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIT.2010.5711224","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Nowadays, expansion of insurance companies provides competitive market, in which several companies participate in tenders with huge price. as a lot of tenders are held based on electronic form, tender documents security is taken into consideration as high level technical issue. In this paper, decision making algorithm based on AHP for suitable authentication function in e-tender of insurance companies is proposed. For this reason, three kinds of applied hash functions (CBC-MAC, SHA-1 and HMAC) are evaluated based on throughput, security and universality criteria.