Methods For Authenticating Keys

نویسنده

  • James Kirby
چکیده

With the evolution of the business world from a paper-based to an electronic environment, security has taken an even more prominent role than ever before. Whether bank transactions are being encrypted or emails being protected, a business must have faith in the underlying technology infrastructure and must have the strongest belief that its information is safe from adversaries of any kind. Through the development of information security it is possible to achieve this goal. However as we will see in this report, the solution is not a simple one and many factors must firstly be taken into consideration.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using a Variation of Elgamal Signature to Support Fast and Lazy Authenticating Origin Autonomous Systems

About the schemes for authenticating origin autonomous systems, related documents think it is appropriate to authenticate address attestations and related public keys only using the information of update messages. However, this approach is infeasible in existing schemes because update messages are limited in length to 4096 bytes and thus are too small to carry the necessary public key certifica...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

Authenticating ‘Cover to Cover’ Reader Series vis-à-vis Cultural Norms for the Iranian community

This research study was an attempt to explore hidden cultural components in an ELT textbook from Oxford University Press (OUP) titled 'Cover to Cover'. Two research methodologies were relied on to unveil the western ideologies in this series: Firstly, a qualitative review over its reading textbooks was undertaken for authenticating the hidden western values for Iranian contexts. At this stage, ...

متن کامل

Prototyping a Lightweight Trust Architecture to Fight Phishing

LTA is a lightweight trust architecture that fights phishing attacks by authenticating e-mail messages. LTA uses separable identity-based ring signatures, which are more attractive than traditional digital signatures for e-mail signing. Because the signatures are identity-based, users do not need to generate keys ahead of time. And because the ring signatures are repudiable, users do not need t...

متن کامل

Security Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates

A Biometric fuzzy extractor scheme for iris templates was recently presented in [3]. This fuzzy extractor binds a cryptographic key with the iris template of a user, allowing to recover such cryptographic key by authenticating the user by means of a new iris template from her. In this work, an analysis of the security efficiency of this fuzzy extractor is carried out by means of a study about t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003