نتایج جستجو برای: authentication data structure

تعداد نتایج: 3694940  

2010
Anongporn Salaiwarakul

The thesis presents verification of biometric authentication protocols. ProVerif is used as the verification tool for verifying and analysing the protocols. The protocol are analysed in ProVerif model. Various attacks to the protocols are generated in order to verify whether the protocols hold their intended properties. We have selected three biometric authentication protocols and proposed a re...

2014
Shin-Jia Hwang Cheng-Han You

For portable communication systems, the delegation-based authentication protocol provides efficient subsequent login authentication, data confidentiality, user privacy protection, and non-repudiation. However, in all proposed protocols, the non-repudiation of mobile users is based on an unreasonable assumption that home location registers are always trusted. To weaken this assumption and enhanc...

2014
S. Vanitha J. Jayachitra K. Elavarasi

Kerberos is the widely deployed authentication protocol. This document gives you comparison between NTLM and Kerberos authentication. And it gives information on how Kerberos authentication plays a vital role in authentication and delegation scenarios, and the situations where Kerberos authentication should be used or may be required in solution designs. Scenarios include business intelligence ...

Journal: :International Journal on Recent and Innovation Trends in Computing and Communication 2019

Journal: :The Journal of Digital Policy and Management 2013

Journal: :Malaysian Journal of Computer Science 2019

Journal: :Human-centric Computing and Information Sciences 2020

Journal: :Bulletin of Electrical Engineering and Informatics 2022

The amount of data that must be processed, stored, and modified rises as time passes. An enormous volume from a wide range sources stored on safe platform. Maintaining such large single computer or hard drive is impracticable. As result, the cloud ideal platform for storing any quantity data. advantage in it may accessed at device. However, security big concern. Because this, despite benefits, ...

2013
Eiji Hayashi Sauvik Das Shahriyar Amini Emmanuel Owusu Jun Han Jason Hong Ian Oakley Adrian Perrig Joy Zhang

We introduce context-aware scalable authentication (CASA) as a way of balancing security and usability for authentication. Our core idea is to combine a number of passive factors for authentication (e.g., a user’s current location) with appropriate active factors. In this paper, we provide a probabilistic framework for dynamically selecting an active authentication scheme that satisfies a secur...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید