Secure Authentication Scheme for Social Networking
نویسندگان
چکیده
منابع مشابه
Secure authentication scheme for session initiation protocol
Department of Management Information System, National Chung Hsing University, 250, Kuo Kuang Rd., Taichung, 413 Taiwan, ROC Department of Information Management, Chaoyang University of Technology, 168, Gifeng E. Rd., Wufeng, Taichung County, 413 Taiwan, ROC Graduate Institute of Networking and Communication Engineering, Chaoyang University of Technology, 168, Gifeng E. Rd., Wufeng, Taichung Cou...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملA Secure YS-Like User Authentication Scheme
Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choose password freely. (2) The server does not need to maintain a password table. (3) There is no need to involve a trusted third party. Although there were several variants of the YS-like schemes claimed to address the forgery attac...
متن کاملA secure human-computer authentication scheme
We introduce a protocol for authentication between a human and a computer, where the human is able to use no special hardware other than a dumb terminal. Authentication is based on a shared secret which can be reused polynomially often with no danger of exposure, assuming the conjectured uniform hardness of learning parity functions in the presence of noise. Under this conjecture, the protocol ...
متن کاملSecure Authentication Scheme based on IBE
Wireless sensor networks are confronted with unique challenges. Absence of infrastructure support, the key distribution is one of the most challenging security problems in wireless sensor networks, and the traditional security techniques used in tradition networks cannot be applied directly. We propose an IBE-based authentication protocol as the security scheme, which can achieve the key establ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IARJSET
سال: 2017
ISSN: 2393-8021
DOI: 10.17148/iarjset.2017.4207