Secure Authentication Scheme for Social Networking

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure authentication scheme for session initiation protocol

Department of Management Information System, National Chung Hsing University, 250, Kuo Kuang Rd., Taichung, 413 Taiwan, ROC Department of Information Management, Chaoyang University of Technology, 168, Gifeng E. Rd., Wufeng, Taichung County, 413 Taiwan, ROC Graduate Institute of Networking and Communication Engineering, Chaoyang University of Technology, 168, Gifeng E. Rd., Wufeng, Taichung Cou...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

A Secure YS-Like User Authentication Scheme

Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choose password freely. (2) The server does not need to maintain a password table. (3) There is no need to involve a trusted third party. Although there were several variants of the YS-like schemes claimed to address the forgery attac...

متن کامل

A secure human-computer authentication scheme

We introduce a protocol for authentication between a human and a computer, where the human is able to use no special hardware other than a dumb terminal. Authentication is based on a shared secret which can be reused polynomially often with no danger of exposure, assuming the conjectured uniform hardness of learning parity functions in the presence of noise. Under this conjecture, the protocol ...

متن کامل

Secure Authentication Scheme based on IBE

Wireless sensor networks are confronted with unique challenges. Absence of infrastructure support, the key distribution is one of the most challenging security problems in wireless sensor networks, and the traditional security techniques used in tradition networks cannot be applied directly. We propose an IBE-based authentication protocol as the security scheme, which can achieve the key establ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IARJSET

سال: 2017

ISSN: 2393-8021

DOI: 10.17148/iarjset.2017.4207