نتایج جستجو برای: authentication

تعداد نتایج: 34927  

Journal: :IBM Systems Journal 2001
Nalini K. Ratha Jonathan H. Connell Ruud M. Bolle

Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications su...

Journal: :JNW 2011
Keshou Wu Lizhao Liu Jian Liu Weifeng Li Gang Xie Xiaona Tong Yun Lin

Focusing on multi-machine distributed computing security problems in cloud computing, the paper has proposed a grid distributed parallel authentication model based on trusted computing, which can realize simultaneous verification of grid authentication and grid behavior on upper layer of SSL and TLS protocols. Adaptive grid authentication method is established applying adaptive stream cipher fr...

2014
Han-Ul Jang Heung-Kyu Lee

A digital certificate under Public Key Infrastructure has a defect of Man-in-the-Middle Attack that performs hash collision attacks. In this paper, we propose a robust biometric-PKI authentication system against Man-in-the-Middle Attack. The biometric-PKI authentication system consists of current PKI authentication and biometric authentication, which employs biometric data and a public key from...

Journal: :RFC 2017
Yutaka Oiwa Hajime Watanabe Hiromitsu Takagi Kaoru Maeda Tatsuya Hayashi Yuichi Ioku

This document specifies a mutual authentication method for the Hyper-text Transfer Protocol (HTTP). This method provides a true mutual authentication between an HTTP client and an HTTP server using password-based authentication. Unlike the Basic and Digest authentication methods, the Mutual authentication method specified in this document assures the user that the server truly knows the user’s ...

Journal: :Journal of The Korea Internet of Things Society 2015

Journal: :International Journal of Security and Networks 2021

The fifth-generation mobile network (5G) will enable interconnectivity between the home (HN) and data (DN) whereby users with their user equipment (UE) be able to access services provided by external service providers (SP) seamlessly. SP rely on security assurances authentication protocols used. For 5G, primary UE HN has been defined specified Third Generation Partnership Project (3GPP) while s...

Journal: :J. Network and Computer Applications 2018
Mohamed Amine Ferrag Leandros A. Maglaras Antonios Argyriou Dimitrios Kosmanos Helge Janicke

This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks again...

2017
Muhammad Bilal Shin-Gak Kang

Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exc...

2012
Yueming Deng Guojun Wang Jiannong Cao

3G-WLAN interworking is an emerging technology for the convergence of heterogeneous wireless networks. Solutions to unified authentication using Universal Subscriber Identity Module (USIM) card are urgent demands for wireless network operators, wireless service providers, and mobile users. However, it is a challenging issue to achieve unified authentication based on current network infrastructu...

2003
Apostol Vassilev Michael Hutchinson

This paper introduces a generalized authentication framework for smart cards. The framework abstracts the authentication services on the card and allows flexible configuration of authentication policies and technologies. This paper also makes recommendations for extensions to current authentication APIs.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید