نتایج جستجو برای: authentication

تعداد نتایج: 34927  

2016
Julien Hatin Estelle Cherrier Jean-Jacques Schwartzmann V. Frey Christophe Rosenberger

The trust provided by authentication systems is commonly expressed with a Level of Assurance (LoA see 3). If it can be considered as a first process to simplify the expression of trust during the authentication step, it does not handle all the aspects of the authentication mechanism and especially it fails to integrate continuous authentication systems. In this paper, we propose a model based o...

1998
Aura Ganz Se Hyun Park Zvi Ganz

In this paper we introduce a robust re-authentication and key exchange protocol for IEEE 802.11 Wireless LANs. Based on an authentication protocol that we have previously published, we introduce a low computational complexity re-authentication and key exchange procedure that provides enhanced robustness in face of cryptographic attacks. This procedure accounts for the wireless media limitations...

Journal: :RFC 2013
Julien Bournelle Lionel Morand Sebastien Decugis Qin Wu Glen Zorn

The EAP Re-authentication Protocol (ERP) defines extensions to the Extensible Authentication Protocol (EAP) to support efficient re-authentication between the peer and an EAP Re-authentication (ER) server through a compatible authenticator. This document specifies Diameter support for ERP. It defines a new Diameter ERP application to transport ERP messages between an ER authenticator and the ER...

2004
J. Arkko H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP-AKA includes optional identity privac...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

Journal: :Indian Journal of Science and Technology 2019

Journal: :Computers & Security 1994

Journal: :International journal of electrical and computer engineering systems 2022

In most information systems today, static user authentication is accomplished when the provides a credential (for example, ID and matching password). However, passwords appear to be insecure method as they are vulnerable attacks chiefly caused by poor password hygiene. We contend that an additional, non-intrusive level of security can achieved analyzing keystroke biometrics coming up with uniqu...

Journal: :RFC 2008
Vidya Narayanan Lakshminath R. Dondeti

The Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. This document specifies extensions to EAP and the EAP keying hierarchy to support an EAP method-independent protocol for efficient re-authenticat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید