نتایج جستجو برای: authentication

تعداد نتایج: 34927  

2013
Poonam Jindal Brahmjit Singh

Authentication can provide security by preventing unauthorized usage and negotiating the credentials for secure communication. Nevertheless, it induces heavy overhead to communications, further deteriorating the quality of service (QoS). Analyzing QoS and security impact of authentication, therefore, becomes critical to developing efficient authentication schemes. In this paper, we propose a sy...

2011
Lars Strand Wolfgang Leister Alan Duric

This paper specifies a two-step migration towards a stronger authentication in the Session Initiation Protocol. First, we add support for a Password Authenticated Key Exchange algorithm that can function as a drop-in replacement for the widely adopted Digest Access Authentication mechanism. This new authentication mechanism adds support for mutual authentication, is considered stronger and can ...

N Kahkeshani, A Hadjiakhoondi , M Khanavi ,

Background: Nepeta menthoides Boiss & Buhse is a species from Lamiaceae family. It is used as a herbal medicine with common name “Ostokhodus” in Iranian traditional and folk medicine but there is not enough information about its quality and quantity control methods. Objective: In this study we use micromorphological and phytochemical evaluations for qualitative and quantitative control of N. ...

This paper proposed an authentication system based on low quality palmprint. For implementation of this system, first the features is extracted by using Contourlet and wavelet transforms. In the second phase, some of the features are selected by using Across Group Variance (AGV) filter. In the last phase by using a classification method, the authentication is completed. For classification we ev...

2012
HongIl Ju JongWook Han

In this paper we describes the authentication for DHCP (Dynamic Host Configuration Protocol) message which provides the efficient key management and reduces the danger replay attack without an additional packet for a replay attack. And the authentication for DHCP message supports mutual authentication and provides both entity authentication and message authentication. We applied the authenticat...

2001
H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the GSM Subscriber Identity Module (SIM). The mechanism specifies enhancements to GSM authentication and key agreement whereby multiple authentication triplets can be combined to create authentication responses and encryption keys of greater strength than the indiv...

2009
Yan-Jiang Yang Jian Weng Feng Bao

Password authentication is the most commonly accepted means for entity authentication. To meet the increasing need of preserving individual privacy, anonymous password authentication has been proposed recently, to augment password authentication with the protection of user privacy. In this paper, we analyze the weaknesses inherent to anonymous password authentication, which make it questionable...

Journal: :Computers & Security 2013
Celia Li Uyen Trang Nguyen Hoang Lan Nguyen Md. Nurul Huda

We propose new authentication protocols to support fast handover in IEEE 802.11-based wireless mesh networks. The authentication server does not need to be involved in the handover authentication process. Instead, mesh access points directly authenticate mobile clients using tickets, avoiding multi-hop wireless communications in order to minimize the authentication delay. Numerical analysis and...

2013
Seung-hwan Ju Hee-suk Seo Sung-hyu Han Jae-cheol Ryou Jin Kwak

The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if ...

Journal: :Mobile Information Systems 2011
Yi-Fu Ciou Fang-Yie Leu Yi-Li Huang Kangbin Yim

In this paper, we propose a handover authentication mechanism, called the handover key management and authentication scheme (HaKMA for short), which as a three-layer authentication architecture is a new version of our previous work, the Diffie-Hellman-PKDS-based authentication method (DiHam for short), improving its key generation flow and adding a handover authentication scheme to respectively...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید