Highly Secure Authentication Scheme

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure authentication scheme for session initiation protocol

Department of Management Information System, National Chung Hsing University, 250, Kuo Kuang Rd., Taichung, 413 Taiwan, ROC Department of Information Management, Chaoyang University of Technology, 168, Gifeng E. Rd., Wufeng, Taichung County, 413 Taiwan, ROC Graduate Institute of Networking and Communication Engineering, Chaoyang University of Technology, 168, Gifeng E. Rd., Wufeng, Taichung Cou...

متن کامل

A Secure YS-Like User Authentication Scheme

Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choose password freely. (2) The server does not need to maintain a password table. (3) There is no need to involve a trusted third party. Although there were several variants of the YS-like schemes claimed to address the forgery attac...

متن کامل

A secure human-computer authentication scheme

We introduce a protocol for authentication between a human and a computer, where the human is able to use no special hardware other than a dumb terminal. Authentication is based on a shared secret which can be reused polynomially often with no danger of exposure, assuming the conjectured uniform hardness of learning parity functions in the presence of noise. Under this conjecture, the protocol ...

متن کامل

Secure Authentication Scheme based on IBE

Wireless sensor networks are confronted with unique challenges. Absence of infrastructure support, the key distribution is one of the most challenging security problems in wireless sensor networks, and the traditional security techniques used in tradition networks cannot be applied directly. We propose an IBE-based authentication protocol as the security scheme, which can achieve the key establ...

متن کامل

A Forward Secure Remote User Authentication Scheme

Remote user authentication schemes allow a valid user to login a remote server. In 2000, Hwang and Li’s proposed a new remote user authentication scheme with smart cards. In the recent years,some researchers pointed out the security weaknesses of Hwang and Li’s scheme and they also proposed some modified schemes to avoid these weaknesses. This paper analyzes that Hwang and Li’s scheme does not ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2014

ISSN: 0975-8887

DOI: 10.5120/18983-0422