Secure in-vehicle Systems using Authentication

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Remote Authentication Using Biometrics

Biometrics offer a potential source of high-entropy, secret information. Before such datacan be used in cryptographic protocols, however, two issues must be addressed: biometric data(1) are not uniformly distributed, and (2) are not exactly reproducible. Recent work, mostnotably that of Dodis, Reyzin, and Smith, has shown how these obstacles may be overcomeusing public informati...

متن کامل

Secure Multimodal Authentication Using Watermarking

As malicious attacks greatly threaten the security and reliability of biometric systems, Authentication of biometric data is very important. In this paper Two-stage authentication based on watermarking is proposed to address this problem. The facial features of an individual embed into a fingerprint image which works as data credibility token and secondary authentication source. At the first st...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Secure ubiquitous authentication protocols for RFID systems

In this article, the possible privacy and security threats to the radio frequency identification (RFID) systems are investigated and new authentication protocols are proposed which provide the identified privacy and security in a very efficient manner for a ubiquitous computing environment. The approach utilizes the concepts of two very different, widely known RFID protocols, i.e. the “low-cost...

متن کامل

Vehicle to Vehicle Authentication

Vehicle Authentication. In recent future, vehicles will establish a spontaneous connection over a wireless radio channel, coordinating actions and information. Vehicles will exchange warning messages over the wireless radio channel through Dedicated Short Range Communication (IEEE 1609) over the Wireless Access in Vehicular Environment (802.11p). Unfortunately, the wireless communication among ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Networked and Distributed Computing

سال: 2015

ISSN: 2211-7946

DOI: 10.2991/ijndc.2015.3.3.3