نتایج جستجو برای: authentication data structure

تعداد نتایج: 3694940  

2008
Philip Basford

Recent technological developments have enabled an increasing number of sensor networks to be deployed. Despite this rapid increase in the number of deployed sensor networks there has been relatively little research into how to prevent third parties injecting false data into the system. This paper summarises the existing solutions available however none can provide protection all the way from th...

2012
Juhan Kim Soohyung Kim Kiyoung Moon

In this paper, we design an integration security system that provides authentication service, authorization service, and management service of security data and a unified interface for the management service. The interface is originated from XKMS protocol and is used to manage security data such as XACML policies, SAML assertions and other authentication security data including public keys. The...

2004
Zinaida Benenson Felix Gärtner Dogan Kesdogan

If the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We focus on user authentication, a central problem when trying to build access control mechanisms for sensor networks. We first sketch some security issues in the context of user authentication in sensor networks. We then introduce the notion of...

2004
Zinaida Benenson Felix C. Freiling Dogan Kesdogan

If the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We focus on user authentication, a central problem when trying to build access control mechanisms for sensor networks. We first sketch some security issues in the context of user authentication in sensor networks. We then introduce the notion of...

2009
James Hollenbach

The structure of the Semantic Web gives users the power to share and collaboratively generate decentralized linked data. In many cases, though, collaboration requires some form of authentication and authorization to ensure the security and integrity of the data being generated. Traditional authorization systems that rely on centralized databases are insufficient in this scenario, since they rel...

Journal: :International Journal of Computer Theory and Engineering 2010

Journal: :TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 2016

2004
Zinaida Benenson Felix Gärtner Dogan Kesdogan

If the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We focus on user authentication, a central problem when trying to build access control mechanisms for sensor networks. We first sketch some security issues in the context of user authentication in sensor networks. We then introduce the notion of...

Journal: :TIIS 2014
Chia-Chen Lin Yuehong Huang Wei-Liang Tai

In this paper, we present a high-quality image authentication scheme based on absolute moment block truncation coding. In the proposed scheme, we use the parity of the bitmap (BM) to generate the authentication code for each compressed image block. Data hiding is used to authenticate whether the content has been altered or not. For image authentication, we embed the authentication code to quant...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید