Authentication systems: principles and threats
نویسندگان
چکیده
منابع مشابه
Threats to 5G Group-based Authentication
The fifth generation wireless system (5G) is expected to handle an unpredictable number of heterogeneous connected devices and to guarantee at least the same level of security provided by the contemporary wireless standards, including the Authentication and Key Agreement (AKA) protocol. The current AKA protocol has not been designed to efficiently support a very large number of devices. Hence, ...
متن کاملPrinciples for Entity Authentication
We study the roles of message components in authentication protocols. In particular, we investigate how a certain component contributes to the task of achieving entity authentication. To this aim, we isolate a core set of roles that enables us to extract general principles that should be followed to avoid attacks. We then formalize these principles in terms of rules for protocol parties and we ...
متن کاملComparison of Two Multiplex PCR Systems for Meat Species Authentication
Background: Meat species adulteration has become a problem of concern. This study aimed to compare two previously published multiplex Polymerase Chain Reaction (PCR) methods for meat species authentication. Methods: The primers used in the first multiplex PCR involved species-specific reverse primer for sheep, goat, cattle, pig, and donkey with universal forward primer. In the second multiple...
متن کاملA Survey of Security Threats and Authentication Schemes in WiMAX
WiMAX networks have advantages over the wired network, such as convenience, mobility, and flexibility. The security concerns in this network may prevent its further widespread adoption. Hence, improving the security of WiMAX is of considerable importance. In WiMAX networks by providing security features like authentication, authorization and encryption. The absence of proper authentication mech...
متن کاملInformation Systems Threats and Vulnerabilities
Vulnerability of Information Systems is a major concern these days in all spheres of Financial, government, private sectors. Security of the Information Systems is one of the biggest challenges faces by almost all the organizations in today's world. Even though most of the organizations have realized the value of information and the part it plays in the success of the business, yet only a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer and Information Science
سال: 2015
ISSN: 1913-8997,1913-8989
DOI: 10.5539/cis.v8n3p155