نتایج جستجو برای: authentication data structure
تعداد نتایج: 3694940 فیلتر نتایج به سال:
confidentiality and security to the data is actually provided by an authentication . Authentication involves the confident identification of one party by another party or a process of confirming an identity .But now a days there are various methods for authentication such as Message Authentication Code, Signcryption, Key Aggregate System are emerged very rapidly for better security precaution. ...
Most evaluations of novel authentication mechanisms have been conducted under laboratory conditions. We argue that the results of short-term usage under laboratory conditions do not predict user performance “in the wild”, because there is insufficient time between enrolment and testing, the number of authentications is low, and authentication is presented as a primary task, rather then the seco...
Biometric authentication offers many benefits ranging from strong security guarantees to user convenience, however, remote authentication poses unique challenges which are not fully addressed by biometrics alone. We propose a new remote authentication protocol that combines possessionbased authentication and biometrics in a way that conquers the main weaknesses of both authentication methods. O...
In a Universal Mobile Telecommunications System (UMTS), a user equipment (UE) can access IP multimedia services through IP Multimedia Subsystems (IMS). In addition to passing IMS authentication, called IMS AKA, this UE also needs to pass General Packet Radio Service (GPRS) authentication, called 3GPP AKA, since the data of the IMS service is transmitted through a GPRS network. Many steps in the...
There are various services using mobile devices due to development of communication technology and mobile equipment, regardless of time and place. To secure usage of convenience and smart services, authentication between users’ devices and network is necessary. To achieve this, many researches have been studied about 3 rd Generation Partnership Project Authentication and Key Agreement (3GPP-AKA...
The bit error rate of data signal (data BER) a key-based physical layer authentication (PLA) scheme suffers from non-negligible performance loss, mainly caused by the tags taking power symbols and interfering with demodulation. Considering orthogonality among different orbital angular momentum (OAM) modes, in this paper, an OAM-assisted PLA (OAM-PLA) is proposed to improve BER. BER OAM-PLA over...
In this paper, we empirically evaluate effectiveness of structure learning of Bayesian Network when applying such networks to the domain of Keystroke Dynamics authentication. We compare four structure learning methods of Bayesian Network Classifier – Genetic, TAN, K2, and Hill Climbing algorithms, on our authentication model, namely Classify User via Short-text and IP Model (CUSIM). The results...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید