نتایج جستجو برای: authentication

تعداد نتایج: 34927  

2012
Rehana Yasmin

This study investigates the broadcast/multicast authentication problems in wireless sensor networks (WSNs), particularly sensor nodes broadcast authentication and outside user authentication, and proposes efficient and secure solutions for them. The low cost and immunity from cabling have become motivations for many applications of WSNs, for instance, the forest fire alarm, the intelligent traf...

2012
Kuljeet Kaur

Whenever there is communication between Client and Server over a public link and resources are to be accessed from remote systems, then proving an identity becomes quiet complex because there is need of proper access rights with authentication. Complete security at the transport layer starts with proof of authentication, majority organizations only use password for security but this research pa...

2015
Aythami Morales Julian Fierrez Ruben Vera-Rodriguez Javier Ortega-Garcia

In this work we present: i) an analysis of biometric technologies for online student authentication; ii) a case study on keystroke dynamics authentication applied to a real operational environment. Concisely, this work studies the biometric technologies and their advantages/disadvantages for online student authentication services. The analysis is made on the basis of three main pillars: perform...

2016
Senthil Kumar

A two-phase content-based image authentication scheme is constructed based on a combination of hard and soft authentication implementing previous existing generic approximate message authentication codes which is a error-correcting codes with cryptographic message authentication codes and symmetric encryption techniques. The message authentication codes which used for hard authentication. The t...

2017
Abbhilasha S. Narote Laxman M. Waghmare

Iris authentication is a popular method where persons are accurately authenticated. During authentication phase the features are extracted which are unique. Iris authentication uses IR images for authentication. This proposed work uses color iris images for authentication. Experiments are performed using ten different color models. This paper is focused on performance evaluation of color models...

2013
Aruna Gupta

Authentication has become integral part of 90% of web sites. The major issue in web authentication is the limitation of human memory to remember the password string for longer period. Almost all websites are still using traditional recall-based textual password to identify their remote users. Vulnerability of this authentication mechanism due to the sophistication of online identity theft has l...

2008
Weilin Huang Anthony T. S. Ho Vinod Pankajakshan

Content authentication has become an important issue for surveillance video. This paper presents a watermarking system based on Discrete Cosine Transform (DCT) for Motion-JPEG video authentication. To protect the integrity of the video object, a content-based watermark is embedded into the frames of the video. Robust watermark and semi-fragile watermark are used for temporal authentication and ...

2014
Larry Koved Bo Zhang

Complex authentication schemes, such as some forms of biometric authentication and context analysis, require large quantities of sensor data and the identify verification can be computationally intensive. This can result in long latencies from the time of the authentication challenge until the authorization decision is determined. This can be worse when there is congestion in the system due to ...

2003
H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP AKA includes optional identity privac...

2002
H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP AKA includes optional identity privac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید