نتایج جستجو برای: authentication

تعداد نتایج: 34927  

2004
Zinaida Benenson Felix Gärtner Dogan Kesdogan

If the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We focus on user authentication, a central problem when trying to build access control mechanisms for sensor networks. We first sketch some security issues in the context of user authentication in sensor networks. We then introduce the notion of...

Journal: :Int. J. Comput. Math. 2008
Rongxing Lu Xiaodong Lin Zhenfu Cao Liuquan Qin Xiaohui Liang

Deniable authentication protocol is a new authentication mechanism in secure computer communication, which not only enables an intended receiver to identify the source of a received message but also prevents a third party from identifying the source of the message. In this paper, based on the Diffie-Hellman algorithm, we propose a new simple deniable authentication protocol from a provably secu...

Journal: :RFC 2011
Yaron Sheffer Glen Zorn Hannes Tschofenig Scott R. Fluhrer

The Extensible Authentication Protocol (EAP) describes a framework that allows the use of multiple authentication mechanisms. This document defines an authentication mechanism for EAP called EAP-EKE, based on the Encrypted Key Exchange (EKE) protocol. This method provides mutual authentication through the use of a short, easy to remember password. Compared with other common authentication metho...

2005
J. Chin M. Parkin N. Zhang A. Nenadic J. M. Brooke

Current Grid software lacks support for authentication techniques other than PKIbased digital certificates. Support for multiple authentication technologies is important, particularly in information Grids, where classified resources/data should enjoy fine-grained protection. This paper describes our work in the design and implementation of a Grid authentication middleware. The solution, called ...

2013
Diogo Menezes Ferrazani Mattos

In this work, we propose a host authentication and access control architecture for software defined networks. The key idea is to authenticate at Layer 2, using IEEE 802.1X standard and Extensible Authentication Protocol (EAP). EAP exchanges authentication information between the supplicant host and a RADIUS authentication server. We developed the proposed authenticator as an OpenFlow applicatio...

2013
W. Michael Petullo Jon A. Solworth

Authentication primitives should be simple, general, and robust against attack. We describe the authentication mechanisms of Ethos, an experimental, clean-slate operating system that has been designed for security. We reexamine and redesign software layering for authentication, and evaluate the resulting security properties. In Ethos, integrated network security and simplified local authenticat...

2012
Younghwa An

To improve the security weaknesses in user authentication system, many biometrics-based user authentication schemes using smart cards have been proposed. Das in 2011, proposed an effective biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication, while eliminating the security flaws of Li-Hwang’s scheme. In this paper, ...

2004
Zinaida Benenson Felix C. Freiling Dogan Kesdogan

If the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We focus on user authentication, a central problem when trying to build access control mechanisms for sensor networks. We first sketch some security issues in the context of user authentication in sensor networks. We then introduce the notion of...

2010
G. Arumugam R. Sujatha

In order to protect secret information from sensitive and various applications, secured authentication system should be incorporated; it should contain security and confidentiality. Even if it is assumed that the cryptographic primitives are perfect, the security goals may not be achieved: the system itself may have weaknesses that can be exploited by an attacker in network attacks. In this pap...

2015
Zuowen Tan Z. W. Tan

In wireless network and mobile network, a two-factor authentication scheme for roaming services enables a mobile user to achieve mutual authentication and key agreement with the foreign agent. In this paper, we review Kim et al.’s anonymous authentication scheme in global mobility networks. Analysis shows that Kim et al.’s scheme fails to achieve anonymity and two-factor authentication. In addi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید