نتایج جستجو برای: authentication

تعداد نتایج: 34927  

2003
Anna Vapen David Byers

Authentication methods offer varying levels of security. Methods with one-time credentials generated by dedicated hardware tokens can reach a high level of security, whereas passwordbased authentication methods have a low level of security since passwords can be eavesdropped and stolen by an attacker. Password-based methods are dominant in web authentication since they are both easy to implemen...

2013
Rajeev Singh Teek Parval Sharma

Authentication is one of the essential tools available for security in WLANs. Access control authentication mechanisms provides entity authentication, access into the network and key evolving for data frames protection. Secure WLAN Authentication Scheme (SWAS) is one such access control authentication mechanism. It provides entity authentication along with per frame authentication. All the part...

2010
Ramaswamy Chandramouli

Authentication assurance level taxonomies that have been specified in many real-world smart identity token deployments do not fully reflect all the security properties associated with their underlying authentication mechanisms. In this paper we describe the development and application of a new methodology called SID-AAM (where the abbreviation stands for Smart Identity Token Authentication Assu...

Journal: :journal of computer and robotics 0
soheila mirzagholi faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran karim faez electrical engineering department, amirkabir university of technology, tehran, iran

mobile ad-hoc networks have attracted a great deal of attentions over the past few years. considering their applications, the security issue has a great significance in them. security scheme utilization that includes prevention and detection has the worth of consideration. in this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

Journal: :Computer Networks 2013

Journal: :International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2019

Journal: :Procedia Computer Science 2014

2015
Gianluigi Me Roberto Sarrecchia

Currently the most popular attacks to the E-Banking Web applications target the authentication systems relying on the single-side client authentication, showing their definitively ineffectiveness for financial services. Furthermore, most of the Web authentication systems have been developed on the classic username/password mechanism or One time Password systems using a single channel, either mo...

2014
Audun Jøsang

Several nations and organisations have published frameworks for assurance of user authentication in the context of eGovermnent. This reflects the importance that governments see in guaranteeing that only authorized users can access eGovernment services. However, in order to ensure trusted online interaction it is equally important to obtain assurance of authentication of service providers. Unil...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید