Identification and Authentication: Technology and Implementation Issues

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identification and Authentication: Technology and Implementation Issues

Computer-based information systems in general, and Internet e-commerce and e-business systems in particular, employ many types of resources that need to be protected against access by unauthorized users. Three main components of access control are used in most information systems: identification, authentication, and authorization. In this paper we focus on authentication, which is the most prob...

متن کامل

Implementation Issues of Pki Technology

Today, one of the biggest concerns about using the Internet for business-critical data is security. This paper will concentrate on the area of software security based on public key cryptographic technology. The Public Key systems make it possible for two parties to communicate securely without either having to know or trust the other party. This is possible because a third party, called the Cer...

متن کامل

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

Facial Recognition Technology A Survey of Policy and Implementation Issues

ACKNOWLEDGMENTS Although responsibility for the final product is ours, we could not have produced this report without key contributions from several individuals to whom we are deeply indebted. Jonathon Phillips and Alex Vasilescu generously shared their wisdom and expertise. Extended conversations with them, particularly in the early phases of the project, guided us to important sources and hel...

متن کامل

Video Authentication: Issues and Challenges

Video authentication aims to ensure the trustworthiness of the video by verifying the integrity and source of video data. It has gained much attention in the recent years. In this paper we present the issues in the designing of a video authentication system. These issues include the classification of tampering attacks, levels of tampering attack and robustness. Further we present the categoriza...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Communications of the Association for Information Systems

سال: 2006

ISSN: 1529-3181

DOI: 10.17705/1cais.01704