نتایج جستجو برای: primary user emulation attack

تعداد نتایج: 950393  

2012
Ravi Singh Pippal Jaidhar C. D. Shashikala Tapaswi

With the exponential growth of Internet users, various business transactions take place over an insecure channel. To secure these transactions, authentication is the primary step that needs to be passed. To overcome the problems associated with traditional password based authentication methods, smart card authentication schemes have been widely used. However, most of these schemes are vulnerabl...

2006
Andreas Löhr

Todays standard input devices for graphical user interfaces, mouse and keyboard, cannot be utilized by users whose motor functions are limited. Examples include users suffering from motor restrictions due to illnesses and users in application domains with manual activities. This dissertation engages in the research area speech-controlled graphical user interfaces which aims at finding a solutio...

Journal: :EURASIP J. Information Security 2015
José Marinho Jorge Granjal Edmundo Monteiro

Currently, there are several ongoing efforts for the definition of new regulation policies, paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this context, cognitive radio (CR) emerges as one of the most promising players by enabling the dynamic access to vacant frequency bands on a non-interference basis. However, the intrinsic characteristic of CR opens new w...

2012
Younghwa An

To improve the security weaknesses in user authentication system, many biometrics-based user authentication schemes using smart cards have been proposed. Das in 2011, proposed an effective biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication, while eliminating the security flaws of Li-Hwang’s scheme. In this paper, ...

Journal: :Proceedings on Privacy Enhancing Technologies 2017

Journal: :Journal of the Korea Academia-Industrial cooperation Society 2011

Journal: :CoRR 2017
Hossen Asiful Mustafa Hasan Muhammad Kafi

Password security can no longer provide enough security in the area of remote user authentication. Considering this security drawback, researchers are trying to find solution with multifactor remote user authentication system. Recently, three factor remote user authentication using biometric and smart card has drawn a considerable attention of the researchers. However, most of the current propo...

Journal: :IJDC 2013
Dirk von Suchodoletz Klaus Rechert Isgandar Valizada

The changing world of IT services opens the chance to more tightly integrate digital long-term preservation into systems, both for commercial and end users. The emergence of cloud offerings re-centralizes services, and end users interact with them remotely through standardized (web-)client applications on their various devices. This offers the chance to use partially the same concepts and metho...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید