Authentication systems: principles and threats

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Threats to 5G Group-based Authentication

The fifth generation wireless system (5G) is expected to handle an unpredictable number of heterogeneous connected devices and to guarantee at least the same level of security provided by the contemporary wireless standards, including the Authentication and Key Agreement (AKA) protocol. The current AKA protocol has not been designed to efficiently support a very large number of devices. Hence, ...

متن کامل

Principles for Entity Authentication

We study the roles of message components in authentication protocols. In particular, we investigate how a certain component contributes to the task of achieving entity authentication. To this aim, we isolate a core set of roles that enables us to extract general principles that should be followed to avoid attacks. We then formalize these principles in terms of rules for protocol parties and we ...

متن کامل

Comparison of Two Multiplex PCR Systems for Meat Species Authentication

Background: Meat species adulteration has become a problem of concern. This study aimed to compare two previously published multiplex Polymerase Chain Reaction (PCR) methods for meat species authentication.  Methods: The primers used in the first multiplex PCR involved species-specific reverse primer for sheep, goat, cattle, pig, and donkey with universal forward primer. In the second multiple...

متن کامل

A Survey of Security Threats and Authentication Schemes in WiMAX

WiMAX networks have advantages over the wired network, such as convenience, mobility, and flexibility. The security concerns in this network may prevent its further widespread adoption. Hence, improving the security of WiMAX is of considerable importance. In WiMAX networks by providing security features like authentication, authorization and encryption. The absence of proper authentication mech...

متن کامل

Information Systems Threats and Vulnerabilities

Vulnerability of Information Systems is a major concern these days in all spheres of Financial, government, private sectors. Security of the Information Systems is one of the biggest challenges faces by almost all the organizations in today's world. Even though most of the organizations have realized the value of information and the part it plays in the success of the business, yet only a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer and Information Science

سال: 2015

ISSN: 1913-8997,1913-8989

DOI: 10.5539/cis.v8n3p155