Multifactor Authentication Protocol in a Mobile Environment
نویسندگان
چکیده
منابع مشابه
Multifactor Biometric Sketch Authentication
In this paper we propose a multifactor biometric sketch authentication method based on biometric sketch recognition and a user’s personal knowledge about the sketch‘s content, which is negotiated between the biometric authentication system and the user during enrollment. The used sketch recognition algorithm is based on the active shape structural model (ASSM) for analyzing the structural varia...
متن کاملMobile Node Authentication Protocol for Proxy Mobile
We are now going to the 4G network and in the 4G network environment, there are so many devices connected to the Internet while they move. We have protocol that can support movement of communicating node without any disruption of their connection status named Mobile IP(MIP). But, the major problem of this MIP is too heaviness of the protocol for small mobile nodes. So, IETF now propose PMIP to ...
متن کاملMultifactor Authentication for Software Protection
Software protection is a mechanism to make software systems more difficult (or impossible) to be accessed by attackers. Such mechanisms are gaining more importance nowadays for increasing number of attacks on the software systems in the large internet networked environment. Hence, in this paper, two schemes are proposed to achieve effective software protection tools. They are based on the use o...
متن کاملA fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment
With fast evolution of mobile devices and mobile network, the need of protecting user sensitive information locally and performing secure user authentication remotely become evermore increasing. Bio-cryptography is emerging as a powerful solution which can combine the advantages of conventional cryptography and biometric security. In this paper, we present an efficient bio-cryptographic securit...
متن کاملA Design of Authentication Protocol for a Limited Mobile Network Environment
Many people demand more convenience and smarter service. Due to demand, smart devices have begun to take center stage in terms of portability and functionality in wireless environments, especially mobile communications. To provide secure service, authentication between networks and users’ devices is necessary with proper efficiency. In this paper, we propose an advanced authentication protocol ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2948922