نتایج جستجو برای: authentication data structure

تعداد نتایج: 3694940  

Journal: :I. J. Network Security 2017
Li Liu Anhong Wang Chin-Chen Chang Zhihong Li

A secret image sharing with deep-steganography and twostage authentication based on matrix encoding is proposed. This scheme firstly employed Wang and Su’s sharing scheme to share a secret image into n shadows. Then, n shadows were embedded into the pre-selected cover images by using matrix encoding so as to generate n stego images. Different from the common schemes which directly use LSBs repl...

2004
Harald Vogt

We propose a novel data integrity protection scheme, which relies on multiple, intervoven authentication chains instead of data origin authentication. We show that the scheme allows for secure node-to-node communication at very low implementation cost, under a certain attacker model, without reliance on a base station.

2016
Mustafa Abdullah Azzawi Rosilah Hassan Khairul Azmi Abu Bakar

Internet of Things (IoT) rises as a powerful domain where embedded devices and sensors can connect and exchange information over the Internet. The importance of IoT devices and data can be critical, so security constraints are required to keep IoT data safe from intruders; authentication is one of basic and important means to confirm data privacy and security. The nature of IoT devices as a res...

2005
Chuhong Fei Deepa Kundur Raymond H. Kwong

This paper focuses on the analysis and enhancement of watermark-based security strategies for multimedia authentication. Based on an authentication game between a transmitter and its authorized receiver, and an opponent, security of authentication watermarking is measured by the opponent’s inability to launch a successful attack. In this work, we consider two traditional classes of security for...

Journal: :Comput. Sci. Inf. Syst. 2016
Bojan Jovanovic Ivan Milenkovic Marija Bogicevic-Sretenovic Dejan Simic

Techniques for authentication that are used in today's identity management systems are vulnerable when they are used over the network. In order to prevent fraud and unauthorized data access, it is important to ensure the identity of the person who submitted authentication credentials. The authentication process can be additionally secured by using biometric data for user verification. Moreover,...

2012
G. Raghu

Wireless local area networks (wireless LANs, or WLANs) are changing the landscape of computer networking. Wireless communications are inherently more open to attack than wired data transfer, as its physical layer is not contained in the wire. Extensible Authentication Protocol –Transport Layer Security is completely password cracking resistant because it does not rely on user passwords. Extensi...

1998
Levente Buttyán Sebastian Staamann Uwe G. Wilhelm

In this paper, we describe a simple logic. The logic uses the notion of channels that are generalisations of communication links with various security properties. The abstract nature of channels enables us to treat the protocol at a higher abstraction level than do most of the known logics for authentication, and thus, we can address the higher level functional properties of the system, without...

2016
Nitesh M. Agrawal

Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentica...

2017
A. Anusha Priya R. Gunasundari

Cloud computing is a model which offers a large number of applications under the different topologies. It is the technology of building a strong data security between the Cloud Service Provider (CSP) and User. Authentication is a direct need of an each and every organization and so it is becoming supreme necessary for an organization not because it copes only with the security threats but the r...

2003
Abhay Dharmadhikari Uttam Sengupta Ameen Ahmad Roger Chandler

2. Overview of GSM SIM Based Authentication This paper discusses approaches to authenticating users with open platforms, such as notebook PCs, for WLAN access using SIM cards. Using SIM cards to authenticate WLAN access is desirable by wireless operators as this approach minimizes additional infrastructure investments since the existing authentication processes and equipment are re-used. This p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید