Secure Authentication: Eliminating Possible Backdoors in Client-Server Endorsement
نویسندگان
چکیده
منابع مشابه
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approaches based on identity or capabilities do not solve the problem of establishing trust between strangers. New approaches to trust establishment are required that are secure, scalable, and portable. One new approach to m...
متن کاملClient-Server Multi-Factor Authentication Using Pairings
What would be the ideal attributes of a client-server authentication scheme? One might like an identity based scheme not requiring PKI, plus support for multi-factor authentication based on a token, a PIN number, and optionally a biometric. The former might hold a high-entropy secret, and the latter may be represented as relatively lowentropy parameters. However it would be preferred if the tok...
متن کاملSecure and Automated Communication in Client and Server Environment
The unstoppable mass of the internet and the networkbased applications has gratuitous to obese stability leaks. Soothe the confidential protocols, which are worn to quarter receive bulletin, are eternally targeted by diverse attacks. So there is the need of secure framework for content attack detection. Content attackers suit the position or the dawning encipher of strengthen a choose pages wor...
متن کاملAuthentication and Virus Detection Enhancement for Client and Server Applications
Security issues are a core part of distributed computing systems, and are part of everyday life since they are used in web servers, email, mobile phones, bank transactions etc. Applications which send an unencrypted password over a communication channel are extremely vulnerable. In addition, the only techniques that have been applied to most systems are security properties such as secrecy and a...
متن کاملSwitchboard: Secure, Monitored Connections for Client-Server Communication
Prolonged secure communication requires trust relationships that extend throughout a connection’s life cycle. Current tools to establish secure connections such as SSL/TLS and SSH authenticate PKI identities, validate credentials and authorize a trust relationship at the time a connection is established, but do not monitor the trust relationship there-
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2016
ISSN: 1877-0509
DOI: 10.1016/j.procs.2016.05.227