Study on the Connection with Public Authentication and Bio Authentication
نویسندگان
چکیده
منابع مشابه
Public-key Steganography with Authentication Public-key Steganography with Authentication
Steganography is the science of sending messages hidden in harmless communications over a public channel so that an adversary eavesdropping on the channel cannot even detect the presence of the hidden messages. Several models for steganography have been introduced. Some are private-key settings, and the others are public-key settings. In this paper, we propose a model of public-key steganograph...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملa study on the design of bio-ethanol process from date wastes of sistan and baluchistan province
اتانول کاربردهای متنوعی در صنایع لاستیک سازی، رنگسازی، حلالها ومکمل سوخت خودرو دارد. اتانول برخلاف نفت از جمله مواد تجدیدپذیر محسوب می شود که مشکلات زیست محیطی و آلودگی نیز ایجاد نمی کند. استفاده از اتانول به عنوان مکمل سوختخودروها از جمله مهمترین مصارف صنعتی این ماده بشمار می رود. با توجه به این موضوع تحقیق و توسعه در زمینه تولید اتانول با درجه خلوص بالا در سطح جهان، و نه تنها در کشور های پیشر...
HMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملPublic Key Authentication with Memory Tokens
We propose a very low-cost authentication scheme based on Merkle signatures, which does not require any computation on the prover side, but instead, has moderate memory requirements. Our technique is particularly attractive on platforms where memory is already available, since it can be implemented at practically no cost, without any CPU, and with an extremely simple memory access control mecha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of The Korea Internet of Things Society
سال: 2015
ISSN: 2466-0078
DOI: 10.20465/kiots.2015.1.1.039