نتایج جستجو برای: authentication

تعداد نتایج: 34927  

Journal: :Computers & Security 2010
Christoforos Ntantogian Christos Xenakis Ioannis Stavrakakis

A user in Beyond 3 Generation (B3G) networks in order to get access to the network services must perform a multi-pass authentication procedure, which includes two or three sequential authentications steps. These multiple authentication steps include a redundant repetition of the same or similar authentication functions, which impose an unnecessary authentication overhead. This paper proposes a ...

Journal: :EURASIP J. Wireless Comm. and Networking 2011
Xinghua Li Jianfeng Ma YoungHo Park Li Xu

With the rapid development of the mobile communication and wireless access technologies, the interworking of heterogeneous networks turns into a trend and various wireless networks are getting connected with the mobile core networks through different measures. At present, in mobile communication, though access authentication methods of various access networks are different from each other, they...

2001
H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP AKA includes optional identity privac...

2008
MASANORI NAKAKUNI HIROSHI DOZONO

The biometrics authentication systems take attentions to cover the weakness of password authentication system. In this paper, we focus attention on the multi modal-biometrics of behavior characteristics. For the integration of multi modal biometrics Supervised Pareto learning SOM(SP-SOM) and its incremental learning method for implementing adaptive authentication system are proposed. Key–Words:...

Journal: :RFC 2015
Rifaat Shekh-Yusef David Ahrens Sophie Bremer

The Hypertext Transfer Protocol (HTTP) provides a simple challenge-response authentication mechanism that may be used by a server to challenge a client request and by a client to provide authentication information. This document defines the HTTP Digest Authentication scheme that can be used with the HTTP authentication mechanism.

2003

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documentsat any time. It is inappropriate to use Internet-Drafts as refere...

Journal: :IJABIM 2015
Qin Wang Huifeng Li

With popularization and development of mobile commerce, the security of mobile commerce has drawn more and more attentions. Identity authentication is the first safety barrier, as communication security almost starts from its handshake process. Authentication protocol based on ciper technology is the safest method to realize identity authentication, and therefore identity authentication protoco...

2014
Sattar J. Aboud Edmond Prakash

Password authentication is one of easiest and most appropriate authentication methods under unprotected channels. The problem of password authentication over unprotected channel is existed in various uses. Computing resources have increased considerably, password authentication is more often needed essential to login to computers, and wireless networks. Many authentication systems that rely on ...

2008
GEOFF SKINNER

The uptake and utility of digital collaboration’s continues to grow as organizations are realizing the diverse range of benefits they provide to not only their organization as a whole but also to individual employees. However, like many information and communication technologies the implementation push often overshadows a proper evaluation of data security and information privacy risks that may...

2014
Pinki Kumari Abhishek Vaish

Despite extensive research conducted in authentication system, security issues are still a challenging task. The most common authentication mechanism is Username and Password. Due to its lack of efficacy, it has been proved as weak method for authentication. In the recent years, Biometric authentication methods have been receiving increasing attention. The design of the biometric system require...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید