Asynchronous Group Authentication Based on Geometric Approach

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach

In 1995, Wu proposed a remote login authentication scheme based on geometric approach. However, Chien, Jan and Tseng presented a cryptanalysis of Wu’s scheme to show that it is not secure. Moreover, they proposed a modified version of Wu’s scheme. This paper presents there is a serious weakness in this modified remote login authentication scheme. We show that an illegal user can easily forge a ...

متن کامل

A Geometric Approach for Personal Authentication based on Finger Back Knuckle Surface using Tangents and Secants

Biometric based Personal authentication is still active research problem due to various issues such as providing high accuracy, computationally less complex feature extraction method and fusion strategy of multiple feature information. In this work we propose a personal authentication system using one such hand based biometric trait, Finger Back Knuckle Surface (FBKS). The texture pattern produ...

متن کامل

Weaknesses of Password Authentication Scheme Based on Geometric Hashing

We show that a recently proposed password authentication scheme based on geometric hashing has several security weaknesses, and that the use of this scheme should be avoided in practice.

متن کامل

A Simple Password Authentication Scheme Based on Geometric Hashing Function

Password authentication protocol is one of most important mechanisms to prevent resources from accessing by unauthorized users. Many password authentication schemes have been developed in last decades, and many of them are based on the use of smart card. However, nowadays it is not applicable for many applications on the Internet to adopt the smart card in their authentication scheme due to its...

متن کامل

Geometric authentication codes

Authentication codes were introduced by Simmons in [1]. A good survey of the current status can be found in [3]. We start by explaining what authentication codes, with and without arbitration, are and mention some important properties of them. We illustrate these concepts by showing some known schemes. Next we discuss generalised dual arcs, since they can serve as a tool to construct authentica...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2018

ISSN: 1939-0114,1939-0122

DOI: 10.1155/2018/5289383