A Solution to Implement Dynamic Authentication
نویسندگان
چکیده
منابع مشابه
Ultimate Solution to Authentication via Memorable Password
A new password authentication and key agreement protocol called AMP is proposed in a provable manner. Human-memorable password authentication is not easy to provide over insecure networks due to the low entropy of the password. A cryptographic protocol, based on the public-key cryptography, is the most promising solution to this problem. AMP provides the password-veri er based authentication an...
متن کاملA Low Cost Solution to Authentication in Passive RFID Systems
This paper aims to propose a solution to address the issue of authentication to prevent counterfeiting in a low cost RFID based system based on using Physically Uncloneable Functions.
متن کاملA Solution to WLAN Authentication and Association DoS Attacks
-The growing popularity of the 802.11-based Wireless LAN (WLAN) also increases its risk of security attacks. The new WLAN security standard, 802.11i, addresses most issues on user authentication and data encryption; however, it does not protect WLANs against Denial of Service (DoS) attacks. This paper presents a solution to detect and resolve authentication request flooding (AuthRF) and associa...
متن کاملPractical Solution to Authentication of Images with a Secure Camera
Those who have seen the movie Forrest Gump witnessed former U.S. President J.F. Kennedy shaking the hand of Tom Hanks. Nevertheless, they have never met. Though this image seems real, how can we be certain it is not? How long can we still believe the images? This paper presents an efficient system guaranteeing to detect whether the images of an original video sequence have been modified between...
متن کاملUsing a Random Secret Pre-Distribution Scheme to Implement Message Authentication in VANETs
In recent years, the development of the Intelligent Transportation System (ITS) has increased the popularity of vehicular ad hoc networks (VANET). A VANET is designed to enable vehicles to exchange information about traffic or vehicle conditions to help other vehicles avoid traffic accidents or traffic jams. To resist malicious attacks, all vehicles must be anonymous and their routings must be ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Open Journal of Applied Sciences
سال: 2012
ISSN: 2165-3917,2165-3925
DOI: 10.4236/ojapps.2012.23025