Asynchronous Group Authentication Based on Geometric Approach
نویسندگان
چکیده
منابع مشابه
Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach
In 1995, Wu proposed a remote login authentication scheme based on geometric approach. However, Chien, Jan and Tseng presented a cryptanalysis of Wu’s scheme to show that it is not secure. Moreover, they proposed a modified version of Wu’s scheme. This paper presents there is a serious weakness in this modified remote login authentication scheme. We show that an illegal user can easily forge a ...
متن کاملA Geometric Approach for Personal Authentication based on Finger Back Knuckle Surface using Tangents and Secants
Biometric based Personal authentication is still active research problem due to various issues such as providing high accuracy, computationally less complex feature extraction method and fusion strategy of multiple feature information. In this work we propose a personal authentication system using one such hand based biometric trait, Finger Back Knuckle Surface (FBKS). The texture pattern produ...
متن کاملWeaknesses of Password Authentication Scheme Based on Geometric Hashing
We show that a recently proposed password authentication scheme based on geometric hashing has several security weaknesses, and that the use of this scheme should be avoided in practice.
متن کاملA Simple Password Authentication Scheme Based on Geometric Hashing Function
Password authentication protocol is one of most important mechanisms to prevent resources from accessing by unauthorized users. Many password authentication schemes have been developed in last decades, and many of them are based on the use of smart card. However, nowadays it is not applicable for many applications on the Internet to adopt the smart card in their authentication scheme due to its...
متن کاملGeometric authentication codes
Authentication codes were introduced by Simmons in [1]. A good survey of the current status can be found in [3]. We start by explaining what authentication codes, with and without arbitration, are and mention some important properties of them. We illustrate these concepts by showing some known schemes. Next we discuss generalised dual arcs, since they can serve as a tool to construct authentica...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2018
ISSN: 1939-0114,1939-0122
DOI: 10.1155/2018/5289383