نتایج جستجو برای: authentication data structure

تعداد نتایج: 3694940  

Journal: :Computer Communications 2007
Ja'afer Al-Saraireh Sufian Yousef

This paper analyses the authentication and key agreement (AKA) protocol for UMTS mobile networks, where a new authentication protocol which is able to reduce the network traffic and signaling message between entities, and consequently the bottleneck at authentication centre is avoided, this is achieved by reducing the number of messages between mobile and authentication centre, and then reducin...

2010
Roberto Tamassia Nikos Triandopoulos

We study query authentication schemes, algorithmic and cryptographic constructions that provideefficient and secure protocols for verifying the results of queries over structured data in untrusted oradversarial data distribution environments. We formally define the problem in a new data query and au-thentication setting that involves general query types answered in the RAM model of ...

2010
Mohamed Al Fairuz Karen Renaud

For decades, traditional authentication methods have proved weak in protecting users and organizations from various different online attacks. These include brute force password cracking, phishing, sniffing, active man-in-the-middle attacks, and session hijacking. The introduction of the one-time-password (OTP) and multichannel authentication (MCA) has proven ability to protect users' online acc...

2005
X. Shang

The Secure Grip project1 focuses on the development of a hand-grip pattern recognition system, as part of the smart gun. Its target customer is the police. To explore the authentication performance of this system, we collected data from a group of police officers, and made authentication simulations based on a likelihood-ratio classifier. This smart gun system has been proved to be useful in th...

2003
Mehmet Utku Celik Gaurav Sharma A. Murat Tekalp Eli Saber

A novel framework is proposed for lossless authentication watermarking of images which allows authentication and recovery of original images without any distortions. This overcomes a significant limitation of traditional authentication watermarks that irreversibly alter image data in the process of watermarking and authenticate the watermarked image rather than the original. In particular, auth...

2010
Mukesh Kumar Jha T. P. Sharma

In this paper, we have proposed a secure data aggregation protocol for wireless sensor networks (WSNs) that is robust to deceitful nodes. The goal of this protocol is to guarantee the essential security needs (like source authentication, data confidentiality & data integrity) as well as to achieve low communication overhead and be fitted with various aggregation functions (like sum, average, ma...

Journal: :ICTACT Journal on Image and Video Processing 2018

Journal: :Intelligent Automation and Soft Computing 2023

Nowadays, numerous applications are associated with cloud and user data gets collected globally stored in units. In addition to shared storage, computing technique offers multiple advantages for the through different distribution designs like hybrid cloud, public community private cloud. Though cloud-based solutions highly convenient users, it also brings a challenge i.e., security of shared. H...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید