منابع مشابه
User-aided data authentication
All classical authentication protocols are based on pre-shared authentic information such as long-term secret keys or a public key infrastructure. However, there are many practical settings, where participants can additionally employ authentic OutOf-Band (OOB) communication, e.g., manual message transfer. In this paper, we study the corresponding user-aided message authentication and key agreem...
متن کاملData Science Solution for User Authentication
User authentication is considered a key factor in almost any software system and is often the first layer of security in the digital world. Authentication methods utilize one, or a combination of up to two, of the following factors: something you know, something you have and something you are. To prevent serious data breaches that have occurred using the traditional authentication methods, a fo...
متن کاملPatterns-of-Life Aided Authentication
Wireless Body Area Network (WBAN) applications have grown immensely in the past few years. However, security and privacy of the user are two major obstacles in their development. The complex and very sensitive nature of the body-mounted sensors means the traditional network layer security arrangements are not sufficient to employ their full potential, and novel solutions are necessary. In contr...
متن کاملA correlation framework for continuous user authentication using data mining
The emergence of new transport technologies coupled with deregulation and privatisation has contributed to thecontiguous growth of telecommunications networks particularly in terms of both the intricacy and size of the network.The rapid growth in network size, and intricacy, is of a concern to those who are involved in Network Management -particularly those involved with network...
متن کاملUser authentication in SIP
Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia over the packet data networks, such as the Internet. The Session Initiation Protocol (SIP) is widely used as a signalling protocol for VoIP. As SIP is being used more, the security of it is an important issue. In this paper, we concentrate on user authentication in SIP. We examine current solutions ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Security and Networks
سال: 2009
ISSN: 1747-8405,1747-8413
DOI: 10.1504/ijsn.2009.023427