نتایج جستجو برای: authentication
تعداد نتایج: 34927 فیلتر نتایج به سال:
If the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We focus on user authentication, a central problem when trying to build access control mechanisms for sensor networks. We first sketch some security issues in the context of user authentication in sensor networks. We then introduce the notion of...
Are security issues about biometric authentication, which must be taken into consid. Paper presents security concerns about biometric authentication and its.of studying biometric authentication systems and their security. Our research on security and reliability issues related to biometric authentication started in 1999. Http:www.ecom-monitor.compapersbiometricsTR2000.pdf.Please help improve it...
For portable communication systems, the delegation-based authentication protocol provides efficient subsequent login authentication, data confidentiality, user privacy protection, and non-repudiation. However, in all proposed protocols, the non-repudiation of mobile users is based on an unreasonable assumption that home location registers are always trusted. To weaken this assumption and enhanc...
Biometrics have the potential to solidify person-authentication by examining \unforgeable" features of individuals. This paper explores issues involved with e ective integration of biometric-enhanced authentication into computer systems and design options for addressing them. Because biometrics are not secrets, systems must not use them like passwords; otherwise, biometric-based authentication ...
Kerberos is the widely deployed authentication protocol. This document gives you comparison between NTLM and Kerberos authentication. And it gives information on how Kerberos authentication plays a vital role in authentication and delegation scenarios, and the situations where Kerberos authentication should be used or may be required in solution designs. Scenarios include business intelligence ...
WiMAX networks have advantages over the wired network, such as convenience, mobility, and flexibility. The security concerns in this network may prevent its further widespread adoption. Hence, improving the security of WiMAX is of considerable importance. In WiMAX networks by providing security features like authentication, authorization and encryption. The absence of proper authentication mech...
We describe Byzantine Fault Tolerant Authentication, a mechanism for public key authentication in peer-to-peer systems. Authentication is done without trusted third parties, tolerates Byzantine faults and is eventually correct if more than a threshold of the peers are honest. This paper addresses the design, correctness, and fault tolerance of authentication over insecure asynchronous networks....
Biometrics have the potential to solidify person-authentication by examining "unforgeable" features of individuals. This paper explores issues involved with effective integration of biometric-enhanced authentication into computer systems and design options for addressing them. Because biometrics are not secrets, systems must not use them like passwords; otherwise, biometric-based authentication...
Traditional authentication is two valued. Unfortunately, authentication mechanisms cannot perfectly establish electronic participant’s identity. Despite years of research and its manifestations such as digital signatures, zero knowledge proofs, public key infrastructures, certificates, biometric tools, etc. the best authentication evidence is a combination of multiple factors. All authenticatio...
The EAP Re-authentication Protocol (ERP) defines extensions to the Extensible Authentication Protocol (EAP) to support efficient re-authentication between the peer and an EAP Re-authentication (ER) server through a compatible authenticator. This document specifies Diameter support for ERP. It defines a new Diameter ERP application to transport ERP messages between an ER authenticator and the ER...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید