نتایج جستجو برای: authentication data structure
تعداد نتایج: 3694940 فیلتر نتایج به سال:
The purpose of this paper is to present the design for providing security and higher authentication scheme for executing secure data transaction in an Organization field over Internet. There has been incessant change in technology day by day, so security mechanisms like authentication schemes are also required to be updated. Authentication schemes that involve more than single level for authent...
Current Grid software lacks support for authentication techniques other than PKIbased digital certificates. Support for multiple authentication technologies is important, particularly in information Grids, where classified resources/data should enjoy fine-grained protection. This paper describes our work in the design and implementation of a Grid authentication middleware. The solution, called ...
Biometric mechanisms of authentication are becoming a popular approach to securing computer systems, networks and other critical resources. This paper proposes a behavioural authentication system based on user interaction with computer games. Literature about current physical and behavioural biometric methods is reviewed and game based authentication design and implementation issues are discuss...
Wearable devices have flourished over the past ten years providing great advantages to people and, recently, they have also been used for identity authentication. Most of the authentication methods adopt a one-time authentication manner which cannot provide continuous certification. To address this issue, we present a two-step authentication method based on an own-built fingertip sensor device ...
Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Heal...
Sensor nodes deployed at hostile environments suffer compromise node attacks, in which an adversary injects counterfeit data into the sink causing error detection at upper level and energy wastage in en-route sensor nodes. A novel authentication scheme known as, Cooperative BitCompressed Authentication (CBA) is based on random graph characteristic of sensor node deployment and a cooperative bit...
A digital certificate under Public Key Infrastructure has a defect of Man-in-the-Middle Attack that performs hash collision attacks. In this paper, we propose a robust biometric-PKI authentication system against Man-in-the-Middle Attack. The biometric-PKI authentication system consists of current PKI authentication and biometric authentication, which employs biometric data and a public key from...
In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multi-domain. Authentication remains as the signi...
Abstract Authentication plays an important role in maintaining social security. Modern authentication methods often relies on mass data datasets to implement by data-driven. However, essential question still remains unclear at level. To what extent can the movement be simplified? We theoretically explain rationality of through arm movements mathematical modeling and design simplest scheme movem...
Abstract Civil receivers of Global Navigation Satellite System (GNSS) are vulnerable to spoofing and jamming attacks due their signal structures. The Spreading Code Authentication (SCA) technique is one the GNSS message encryption identity authentication techniques. Its robustness complexity in between Message (NMA) Encryption (NME)/Spreading (SCE). A commonly used spreading code inserts unpred...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید