نتایج جستجو برای: authentication data structure
تعداد نتایج: 3694940 فیلتر نتایج به سال:
advanced metering infrastructure (ami) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. this study focuses on communication between a smart meter and a server on the utility side. hence, a mutual authentication mechanism in ami is presented based on the elliptic curve cryptography (ecc) and one time signature (ots) consists o...
Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding not only to distinguish the legitimate diversity of encoded images from tampering but also localize the tampered regions in an image already deemed to be ina...
Multimedia authentication distinguishes itself from other data integrity security issues because of its unique property of content integrity in several different levels — from signal syntax levels to semantic levels. In this section, we describe several image authentication issues, including the mathematical forms of optimal multimedia authentication systems, a description of robust digital sig...
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
In SaaS, since the service provider may be un-trusted, it is essential for tenants to enable query result correctness and completeness. However, existing data authentication methods can not fit well with the customized multi-tenants sharing storage mode. This paper put forward a multi-tenant data authentication model (TCDA). TCDA is a composite structure that constructs pivot authentication tre...
Mobile devices are becoming increasingly popular and playing significant roles in our daily lives. Insufficient security weak protection mechanisms, however, cause serious privacy leakage of the unattended devices. To fully protect mobile device privacy, we propose ADFFDA, a novel continuous authentication system using an Adaptive Deep Feature Fusion scheme for effective feature representation,...
Authentication is possible in several ways namely textual, graphical, bio-metric, 3D password and third party authentication. In this paper, the authentication system is presented by introducing the multi-level authentication technique which generates the password in multiple levels to access the services. The details of proposed multilevel authentication techniques are presented along with dat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید