Study on the Connection with Public Authentication and Bio Authentication

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Public-key Steganography with Authentication Public-key Steganography with Authentication

Steganography is the science of sending messages hidden in harmless communications over a public channel so that an adversary eavesdropping on the channel cannot even detect the presence of the hidden messages. Several models for steganography have been introduced. Some are private-key settings, and the others are public-key settings. In this paper, we propose a model of public-key steganograph...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

a study on the design of bio-ethanol process from date wastes of sistan and baluchistan province

اتانول کاربردهای متنوعی در صنایع لاستیک سازی، رنگسازی، حلالها ومکمل سوخت خودرو دارد. اتانول برخلاف نفت از جمله مواد تجدیدپذیر محسوب می شود که مشکلات زیست محیطی و آلودگی نیز ایجاد نمی کند. استفاده از اتانول به عنوان مکمل سوختخودروها از جمله مهمترین مصارف صنعتی این ماده بشمار می رود. با توجه به این موضوع تحقیق و توسعه در زمینه تولید اتانول با درجه خلوص بالا در سطح جهان، و نه تنها در کشور های پیشر...

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Public Key Authentication with Memory Tokens

We propose a very low-cost authentication scheme based on Merkle signatures, which does not require any computation on the prover side, but instead, has moderate memory requirements. Our technique is particularly attractive on platforms where memory is already available, since it can be implemented at practically no cost, without any CPU, and with an extremely simple memory access control mecha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of The Korea Internet of Things Society

سال: 2015

ISSN: 2466-0078

DOI: 10.20465/kiots.2015.1.1.039