نتایج جستجو برای: authentication data structure

تعداد نتایج: 3694940  

2014
N. R. Wankhade

confidentiality and security to the data is actually provided by an authentication . Authentication involves the confident identification of one party by another party or a process of confirming an identity .But now a days there are various methods for authentication such as Message Authentication Code, Signcryption, Key Aggregate System are emerged very rapidly for better security precaution. ...

2010
Adam Beautement Angela Sasse

Most evaluations of novel authentication mechanisms have been conducted under laboratory conditions. We argue that the results of short-term usage under laboratory conditions do not predict user performance “in the wild”, because there is insufficient time between enrolment and testing, the number of authentications is low, and authentication is presented as a primary task, rather then the seco...

2012
Ewa Syta Michael J. Fischer Abraham Silberschatz Gina Gallegos Bryan Ford Gina Gallegos García

Biometric authentication offers many benefits ranging from strong security guarantees to user convenience, however, remote authentication poses unique challenges which are not fully addressed by biometrics alone. We propose a new remote authentication protocol that combines possessionbased authentication and biometrics in a way that conquers the main weaknesses of both authentication methods. O...

2011
Hung-Min Sun Bing-Zhe He Shih-Ying Chang Chun-Hua Cho

In a Universal Mobile Telecommunications System (UMTS), a user equipment (UE) can access IP multimedia services through IP Multimedia Subsystems (IMS). In addition to passing IMS authentication, called IMS AKA, this UE also needs to pass General Packet Radio Service (GPRS) authentication, called 3GPP AKA, since the data of the IMS service is transmitted through a GPRS network. Many steps in the...

2014
Minha Park Okyeon Yi

There are various services using mobile devices due to development of communication technology and mobile equipment, regardless of time and place. To secure usage of convenience and smart services, authentication between users’ devices and network is necessary. To achieve this, many researches have been studied about 3 rd Generation Partnership Project Authentication and Key Agreement (3GPP-AKA...

Journal: :International Journal of Advanced Computer Science and Applications 2018

Journal: :IEICE Electronics Express 2022

The bit error rate of data signal (data BER) a key-based physical layer authentication (PLA) scheme suffers from non-negligible performance loss, mainly caused by the tags taking power symbols and interfering with demodulation. Considering orthogonality among different orbital angular momentum (OAM) modes, in this paper, an OAM-assisted PLA (OAM-PLA) is proposed to improve BER. BER OAM-PLA over...

2012
Charoon Chantan Sukree Sinthupinyo Tippakorn Rungkasiri

In this paper, we empirically evaluate effectiveness of structure learning of Bayesian Network when applying such networks to the domain of Keystroke Dynamics authentication. We compare four structure learning methods of Bayesian Network Classifier – Genetic, TAN, K2, and Hill Climbing algorithms, on our authentication model, namely Classify User via Short-text and IP Model (CUSIM). The results...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید