نتایج جستجو برای: authentication data structure
تعداد نتایج: 3694940 فیلتر نتایج به سال:
This paper analyses the authentication and key agreement (AKA) protocol for UMTS mobile networks, where a new authentication protocol which is able to reduce the network traffic and signaling message between entities, and consequently the bottleneck at authentication centre is avoided, this is achieved by reducing the number of messages between mobile and authentication centre, and then reducin...
We study query authentication schemes, algorithmic and cryptographic constructions that provideefficient and secure protocols for verifying the results of queries over structured data in untrusted oradversarial data distribution environments. We formally define the problem in a new data query and au-thentication setting that involves general query types answered in the RAM model of ...
For decades, traditional authentication methods have proved weak in protecting users and organizations from various different online attacks. These include brute force password cracking, phishing, sniffing, active man-in-the-middle attacks, and session hijacking. The introduction of the one-time-password (OTP) and multichannel authentication (MCA) has proven ability to protect users' online acc...
The Secure Grip project1 focuses on the development of a hand-grip pattern recognition system, as part of the smart gun. Its target customer is the police. To explore the authentication performance of this system, we collected data from a group of police officers, and made authentication simulations based on a likelihood-ratio classifier. This smart gun system has been proved to be useful in th...
A novel framework is proposed for lossless authentication watermarking of images which allows authentication and recovery of original images without any distortions. This overcomes a significant limitation of traditional authentication watermarks that irreversibly alter image data in the process of watermarking and authenticate the watermarked image rather than the original. In particular, auth...
In this paper, we have proposed a secure data aggregation protocol for wireless sensor networks (WSNs) that is robust to deceitful nodes. The goal of this protocol is to guarantee the essential security needs (like source authentication, data confidentiality & data integrity) as well as to achieve low communication overhead and be fitted with various aggregation functions (like sum, average, ma...
Nowadays, numerous applications are associated with cloud and user data gets collected globally stored in units. In addition to shared storage, computing technique offers multiple advantages for the through different distribution designs like hybrid cloud, public community private cloud. Though cloud-based solutions highly convenient users, it also brings a challenge i.e., security of shared. H...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید