نتایج جستجو برای: authentication data structure

تعداد نتایج: 3694940  

Journal: :فصلنامه علمی پژوهشی گیاهان دارویی 0
n kahkeshani tehran university of medical sciences m khanavi tehran university of medical sciences a hadjiakhoondi department of pharmacognosy and medicinal plants research center, faculty of pharmacy, tehran university of medical sciences, tehran, iran tel: tel/fax: +98 21 66494996

background: nepeta menthoides boiss & buhse is a species from lamiaceae family. it is used as a herbal medicine with common name “ostokhodus” in iranian traditional and folk medicine but there is not enough information about its quality and quantity control methods. objective: in this study we use micromorphological and phytochemical evaluations for qualitative and quantitative control of n. me...

2003
Roberto Tamassia Nikos Triandopoulos

Authenticated data structures provide a model for data authentication, where answers to queries contain extra information that can produce a cryptographic proof about their validity. In this paper, we study the authentication cost that is associated with this model when authentication is performed through hierarchical cryptographic hashing. We introduce measures that precisely model the computa...

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

2015
Lin Li Lanju Kong Qingzhong Li Zhongmin Yan Hui Li

In SaaS, most tenants rely on the service provider for data maintenance and computation. As tenants no longer possess their application and data locally, it is of critical importance for the tenants to ensure that their data are being correctly stored and maintained. However, the customized multi-tenants sharing storage mode makes it hard for tenants to guarantee their data integrity because mu...

2013
Ch. Krishna Prasad A. Ramesh Babu

This paper presents an evolution of authentication mechanisms from textual passwords to graphical authentication mechanisms. For security concerns password must be protected from the unauthorized users. Authentication and authorization is necessary for essential data, this requires authentication mechanisms. An important goal for authentication is user has easy to memorize their passwords and r...

Journal: :CoRR 2003
Petros Maniatis Mary Baker

In this work we describe, design and analyze the security of a tamper-evident, append-only data structure for maintaining secure data sequences in a loosely coupled distributed system where individual system components may be mutually distrustful. The resulting data structure, called an Authenticated Append-Only Skip List (AASL), allows its maintainers to produce one-way digests of the entire d...

2012
Patrik Bichsel Jan Camenisch Bart De Decker Jorn Lapon Vincent Naessens Dieter Sommer

Authentication is a prerequisite for proper access control to many e-services. Often, it is carried out by identifying the user, while generally, verification of certified attributes would suffice. Even worse, this kind of authentication makes all the user’s transactions linkable and discloses an excessive amount of personal information, and thus erodes the user’s privacy. This is in clear cont...

2001
Aris Anagnostopoulos Michael T. Goodrich Roberto Tamassia

We introduce the notion of persistent authenticated dictionaries, that is, dictionaries where the user can make queries of the type “was element e in set S at time t?” and get authenticated answers. Applications include credential and certificate validation checking in the past (as in digital signatures for electronic contracts), digital receipts, and electronic tickets. We present two data str...

2014
Maheswara Rao Valluri

A zero-knowledge authentication scheme is a type of authentication scheme, which gives no knowledge beyond the authenticity identifying an entity and is probabilistic than deterministic authentication scheme. This paper proposes Diffie-Hellman and Fiat-Shamir like zero-knowledge authentication schemes on general non-commutative groups. The key idea of our proposal is that for a given non-commut...

Journal: :RFC 2015
Michael B. Jones John Bradley Nat Sakimura

JSON Web Signature (JWS) is a means of representing content secured with digital signatures or Message Authentication Codes (MACs) using JavaScript Object Notation (JSON) data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification. Related encryption capabilities are described in the separate JSO...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید