Authentication: a primer

نویسنده

  • Burton Rosenberg
چکیده

In the electronic version of this interchange, two other concerns arise. Since the authentication belongs to the near end of a communication channel, we must assure that the other end of the channel is not diverted after authentication; and we must assure that the channel is confidential, so no third party can eavesdrop and learn the password. Finally, the assurance of authentication is only a probability. Plato can, with a certain probability, guess Socretes’ password, and then be accepted as Socretes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparison of Two Multiplex PCR Systems for Meat Species Authentication

Background: Meat species adulteration has become a problem of concern. This study aimed to compare two previously published multiplex Polymerase Chain Reaction (PCR) methods for meat species authentication.  Methods: The primers used in the first multiplex PCR involved species-specific reverse primer for sheep, goat, cattle, pig, and donkey with universal forward primer. In the second multiple...

متن کامل

A Primer on Biometric Technology

Here we provide a primer on biometric technology.1 In particular, this chapter introduces the technical terminology and the major concepts related to biometric applications. We first define the terms, “biometrics” and “biometric authentication.” Next, we discuss three universal components present in the operation of all biometric technologies, including the difference between applications that ...

متن کامل

Measuring Strength of Authentication

This document serves as a primer for discussions to be held at the “Advanced Identity Workshop” at the National Institute of Standards and Technology (NIST) in Gaithersburg, Maryland, on January 12 and 13, 2016. The workshop will convene federal agencies, commercial relying parties, and identity solution providers to collaborate on improving standards, guidance, and practices related to identit...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

A Solution for the Allocation of Customers Authentication Methods (The Case of Multimedia Contact Center in Agriculture Bank of Iran)

In order to provide different services for the customers, banks embark on a multimedia contact center. Considering that, in this center, where several services such as transferring money, getting statement information and asking for check books are provided, the authentication is of high importance. How to allocate the appropriate authentication method for each customer is one of the challe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002