Authentication: a primer
نویسنده
چکیده
In the electronic version of this interchange, two other concerns arise. Since the authentication belongs to the near end of a communication channel, we must assure that the other end of the channel is not diverted after authentication; and we must assure that the channel is confidential, so no third party can eavesdrop and learn the password. Finally, the assurance of authentication is only a probability. Plato can, with a certain probability, guess Socretes’ password, and then be accepted as Socretes.
منابع مشابه
Comparison of Two Multiplex PCR Systems for Meat Species Authentication
Background: Meat species adulteration has become a problem of concern. This study aimed to compare two previously published multiplex Polymerase Chain Reaction (PCR) methods for meat species authentication. Methods: The primers used in the first multiplex PCR involved species-specific reverse primer for sheep, goat, cattle, pig, and donkey with universal forward primer. In the second multiple...
متن کاملA Primer on Biometric Technology
Here we provide a primer on biometric technology.1 In particular, this chapter introduces the technical terminology and the major concepts related to biometric applications. We first define the terms, “biometrics” and “biometric authentication.” Next, we discuss three universal components present in the operation of all biometric technologies, including the difference between applications that ...
متن کاملMeasuring Strength of Authentication
This document serves as a primer for discussions to be held at the “Advanced Identity Workshop” at the National Institute of Standards and Technology (NIST) in Gaithersburg, Maryland, on January 12 and 13, 2016. The workshop will convene federal agencies, commercial relying parties, and identity solution providers to collaborate on improving standards, guidance, and practices related to identit...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملA Solution for the Allocation of Customers Authentication Methods (The Case of Multimedia Contact Center in Agriculture Bank of Iran)
In order to provide different services for the customers, banks embark on a multimedia contact center. Considering that, in this center, where several services such as transferring money, getting statement information and asking for check books are provided, the authentication is of high importance. How to allocate the appropriate authentication method for each customer is one of the challe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002