نتایج جستجو برای: authentication

تعداد نتایج: 34927  

2012
R. Aparna B. B. Amberker

Providing authentication for the messages exchanged between group members in addition to confidentiality is an important issue in Secure Group communication. We develop a protocol for Secure Authentic Communication where we address authentication for the group communication scheme proposed by Blundo et al. which only provides confidentiality. Authentication scheme used is a multiparty authentic...

Journal: :I. J. Network Security 2009
Zhenfu Cao

The notion of deniable authentication protocol was introduced in 1998 by Dwork et al. [11] and Aumann and Rabin [1, 2] independently. As a new cryptographic authentication protocol, a deniable authentication protocol enables an intended receiver to identify the source of a given message without being able to prove the identity of the sender to a third party. Over the past years, many deniable a...

2005
Shuyao Yu Youkun Zhang Runguo Ye Chuck Song

Password authentication remains to be the most common form of user authentication. So far, many strong-password authentication schemes based on hash functions have been proposed, however, none is sufficiently secure and efficient. Based on the analysis of attacks against OSPA(Optimal Strong Password Authentication) protocol, we present a hash-based StrongPassword mutual Authentication Scheme (S...

2015

This paper identifies the current limitations of electronic remote authentication systems and presents a new remote authentication system that addresses these limitations. Examples of these limitations can be easily observed in everyday life. Some more common examples include: credit card theft, identity theft, insurance fraud and hacking of private computer networks. Our proposed solution incl...

2012
Maninder Singh Sarbjeet Singh

The purpose of this paper is to present the design of a secure and more advanced authentication scheme for executing secure financial transactions over Internet. There has been continuous change in technology day by day, so security mechanisms like authentication schemes are also required to be updated. The security measures have very crucial role in banking and financial sector. For any intern...

2013
Mojtaba Alizadeh Mohammad Hesam Tadayon Kouichi Sakurai Sabariah Baharun Hiroaki Anada Mazdak Zamani Akram M. Zeki Shehzad Ashraf Chaudhry Muhammad Khurram Khan

Proxy Mobile IPv6 (PMIPv6), a network-based mobility management protocol, has clearly different perceptions compared with host-based mobility management protocols. In PMIPv6, a mobile node (MN) is not involved in any mobility signaling as mobility service provisioning entities provide mobility services for the MN. This characteristic leads us to develop a new handover authentication scheme that...

2012
Jing-Chiou Liou Gregory Egan Jay K. Patel Sujith Bhashyam

There are over 2.2 billion Internet users around the world as of December 31 2011, according to the Internet World Stats (IWS) [1]. Online service is an important driving force behind many of today’s Web 2.0 and cloud computing applications. For security and privacy concerns, authentication is utilized by all online services that involve online transactions and restricted information access. Au...

Journal: :Int. J. Adv. Comp. Techn. 2010
Jing-Chiou Liou Sujith Bhashyam

Online service is an important driving force behind many of today’s Web 2.0 applications. For security and privacy concerns, authentication is required for all of services that involve online transactions. Authentication is the process of verifying a user’s identity when the user is requesting services from any secure Information System (IS). By far, the most popular authentication technique is...

Journal: :IJDSN 2013
Wei Ren Linchen Yu Liangli Ma Yi Ren

In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet ofThings. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot be applied in machine-centric M2M context. In this paper, we make the first attempt to formally model the authentication in M2M. We first model f...

2012
Minhaz Fahim Zibran

Access control and authentication have become very common activities at this modern information age to ensure information security and authorized access to the information. Traditional authentication mechanisms require the users to remember secret words or phrase, or carry identification documents like passports, smart cards, etc. Biometric authentication relieves the users from the pain of rem...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید