نتایج جستجو برای: authentication

تعداد نتایج: 34927  

Journal: :JNW 2010
Shen-Ho Lin Jung-Hui Chiu Sung-Shiou Shen

In GSM-WLAN heterogeneous networks, the authentication efficiency is one of the drawbacks for message transaction and processing in the RADIUS server. This paper proposed two fast authentication schemes, based on the EAP-SIM mechanism, to improve the authentication efficiency by balancing the message transaction loads and processing loads among the RADIUS server and individual APs. In this pape...

2006

Pre-boot authentication on HP Compaq business notebooks ...................................................................... 3 Power-on password authentication overview........................................................................................ 4 Enabling power-on password......................................................................................................... 4 Sm...

2009
Stuart Schechter Robert W. Reeder

Backup authentication systems verify the identity of users who are unable to perform primary authentication—usually as a result of forgetting passwords. The two most common authentication mechanisms used for backup authentication by webmail services, personal authentication questions and email-based authentication, are insufficient. Many webmail users cannot benefit from email-based authenticat...

2016
R. Chithra B. Kalaavathi

E-Learning enables the users to learn at anywhere at any time. In E-Learning systems, authenticating the E-Learning user has security issues. The usage of appropriate communication networks for providing the internet connectivity for E-learning is another challenge. WiMAX networks provide Broadband Wireless Access through the Multicast Broadcast Service so these networks can be most suitable fo...

2001
Hong Chen Miroslav Živković Dirk-Jaap Plas

With the increasing number of mobile and wireless networks that are deployed, the handovers between these systems take place more often. In order to provide end-users with uninterrupted access to services, support for fast handover is essential. One of the prerequisites of a fast-handover is transparent end-user authentication. In this paper we address end-user authentication at network level. ...

Journal: :JCIT 2009
Changsheng Wan Aiqun Hu Juan Zhang

Mobility management is the key feature of wireless network. When the mobile node roams from the home network to the foreign network, the foreign network access server usually does not have the security material of the mobile node, and can not authenticate the mobile node by itself. Thus the three-party authentication is used, and the foreign network access server consults the home authenticatio...

Journal: :CoRR 2010
Qasim Siddique

We proposed an authentication mechanism in the wireless sensor network. Sensor network uses the Kerberos authentication scheme for the authentication of bases station in the network. Kerberos provides a centralized authentication server whose function is to authenticate user by providing him the ticket to grant request to the base station. In this paper we have provided architecture for the aut...

2003
Joseph P. Campbell William M. Campbell Douglas A. Jones Scott M. Lewandowski Douglas A. Reynolds Clifford J. Weinstein

Software-defined radios and cognitive radios offer tremendous promise, while having great need for user authentication. Authenticating users is essential to ensuring authorized access and actions in private and secure communications networks. User authentication for software-defined radios and cognitive radios is our focus here. We present various means of authenticating users to their radios a...

2014
S. YAMINI

Authentication is possible in several ways namely textual, graphical, bio-metric, 3D password and third party authentication. In this paper, the authentication system is presented by introducing the multi-level authentication technique which generates the password in multiple levels to access the services. The details of proposed multilevel authentication techniques are presented along with dat...

Journal: :Computer Communications 2007
Ja'afer Al-Saraireh Sufian Yousef

This paper analyses the authentication and key agreement (AKA) protocol for UMTS mobile networks, where a new authentication protocol which is able to reduce the network traffic and signaling message between entities, and consequently the bottleneck at authentication centre is avoided, this is achieved by reducing the number of messages between mobile and authentication centre, and then reducin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید