An Authentication Method for Secure Internet Transaction Using Smart Card and Secure Coprocessor

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Zero Footprint Secure Internet Authentication Using Network Smart Card

This paper describes the motivation and technological innovation of Network Smart Card, a next generation smart card architecture that supports standard Internet communication and security protocols. It outlines the role of these next generation smart cards in addressing some of the weaknesses inherent in current Internet authentication frameworks. The paper evaluates several common methods of ...

متن کامل

An improved and secure smart card-based authentication scheme

Kim and Chung (2009) found that Yoon and Yoo’s scheme (2005) easily reveals a user’s password and is susceptible to masquerading user attack, masquerading server attack and stolen verifier attack. Therefore, Kim and Chung proposed a new remote user authentication scheme. They claimed that the proposed scheme resolves all aforementioned security flaws, while keeping the merits of Yoon and Yoo’s ...

متن کامل

Cryptanalysis and An Efficient Secure ID-Based Remote User Authentication Scheme Using Smart Card pdfkeywords=Attack, Authentication, Password, Secure ID, Smart Card

Remote User authentication protocol is used for verifying the legitimacy of a remote user over insecure network environments. Recently, many secure ID based remote user authentication scheme using smart card have been proposed in the literature. In 2012, Ratan-Sanjay [1] proposed secure ID based remote user authentication scheme using smart card and claimed that their scheme can avoid all types...

متن کامل

A Secure Dynamic Authentication Scheme for Smart Card based Networks

Authentication is one of the essential security features in network communication. Authentication process ascertains the legitimacy of the communicating partners in communication. In authentication process, the originator of the communication and the respondent transacts some identification codes of each other prior to start of the message transaction. Several methods have been proposed regardi...

متن کامل

Secure Watemarking Method with Smart Card

we treat in this paper a secure authentication method using watermarking, smart card and cryptography. It can serve to control logical and physical access and the network access and to prove the card owner identity.This method is very secure because the high level of security of smart card, the method of watermarking and detection and the complexity of the algorithm RSA and DES aim to remove th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Jurnal Teknologi

سال: 2012

ISSN: 2180-3722,0127-9696

DOI: 10.11113/jt.v38.502