نتایج جستجو برای: authentication

تعداد نتایج: 34927  

Journal: :Signal Processing 2014
Chun-Chi Lo Yu-Chen Hu

Image authentication is to protect the image integrity when the digital image is illegally modified. Most of the image authentication schemes proposed so far employed the irreversible data hiding approach to embed the authentication data into the cover images. In this paper, a novel reversible image authentication scheme for digital images is proposed. In the proposed scheme, the authentication...

2015

Security analysis is provided based on tool-sets for content authentication. Given a watermark payload, the watermarking scheme should be. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. Tune a robust watermarking scheme to.have been devoted to security analysis in which successful attacks have been. Posed semi-fragile watermark-based authentication systems fail security.In this paper ...

2015
Sonia Thomas Elisabeth Thomas

a broadcast authentication protocol enables the receivers to verify that a received packet was really sent by the claimed sender. Data confidentiality, authenticity, integrity, and non repudiation are basic concerns of securing data delivery over an insecure network. Large and distributed systems with time critical applications require immediate and secure authentication of command and control ...

2005
Tierui Chen Bin B. Zhu Shipeng Li Xueqi Cheng

In this paper, we present ThresPassport (Threshold scheme-based Passport), a web-based, distributed Single Sign-On (SSO) system which utilizes a threshold-based secret sharing scheme to split a service provider’s authentication key into partial shares distributed to authentication servers. Each authentication server generates a partial authentication token upon request by a legitimate user afte...

Journal: :Journal of Computer Security 2011
Francis Hsu Hao Chen Sridhar Machiraju

Web authentication that is both secure and usable remains a challenge. Passwords are vulnerable to phishing attacks, while physical tokens face deployment obstacles. We propose to leverage the authentication infrastructure of cellular networks to enhance Web authentication. We design WebCallerID, a Web authentication scheme that uses cell phones as physical tokens and uses cellular networks as ...

2007
M. Newlin Rajkumar Yu-Lun Huang

Wireless Networks provide more flexibility and connectivity to the users, to be connected with anyone, any time, any where. This feature makes the wireless networks to be wide open to threats and attacks by the intruders. To ensure a reliable and secure wireless environment, suitable authentication protocols have to be employed based on the network infrastructure. The scope of this thesis is to...

Journal: :Concurrency and Computation: Practice and Experience 2007
Ning Zhang Li Yao Aleksandra Nenadic Jay Chin Carole A. Goble Alan L. Rector David W. Chadwick Sassa Otenko Qi Shi

In a virtual organization environment, where services and data are provided and shared among organizations from different administrative domains and protected with dissimilar security policies and measures, there is a need for a flexible authentication framework that supports the use of various authentication methods and tokens. The authentication strengths derived from the authentication metho...

2018
Awais Manzoor Abdul Wahid Munam Ali Shah Adnan Akhunzada Faisal Fayyaz Qureshi

Security threats are major barriers in authentication process in Fog Computing. Identification of a user through single signon process like simple password-based authentications are no longer considered secure. Different multi-tier authentication schemes exist in literature that overcome the weakness of single sign-on. This paper surveys state-of-the-art multi-tier authentication techniques, th...

Journal: :Semiconductor science and information devices 2021

Multi-factor Authentication (MFA) often referred to as Two-factor (2FA), which is a subset of MFA, the practice implementing additional security methods on top standard username and password help authenticate identity user increase data.This chapter will investigate problem with logins, different types authentication, current best for multi-factor authentication interpretations about how techno...

Journal: :IACR Cryptology ePrint Archive 2014
Vikram D.

Authentication is the process for identify the correct user or not. The identities enclose mainly the username and passwords for verifying the two entities. The authentication information’s are stored in the form of encryption in a device which is properly registered in the server. At the time of authentication process performs between user and server the intruder can eves-dropping the communic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید