نتایج جستجو برای: authentication
تعداد نتایج: 34927 فیلتر نتایج به سال:
Distributed embedded systems are becoming increasingly vulnerable to attack as they are connected to external networks. Unfortunately, they often have no built-in authentication capability. Multicast authentication mechanisms required to secure embedded networks must function within the unique constraints of these systems, making it difficult to apply previously proposed schemes. We propose an ...
In this paper, we present a new authentication method in the wavelet domain of JPEG2000, which is robust to re-compression, resolution changes and noise. We show that, because of its bit plane oriented processing, JPEG2000 is more suitable for the integration of an authentication watermarking algorithm than JPEG. The disadvantages of JPEG-based authentication schemes are discussed. It is shown ...
The conventional authentication technologies, like RFID tags and authentication cards/badges, suffer from different weaknesses, therefore a prompt replacement to use biometric method of authentication should be applied instead. Biometrics, such as fingerprints, voices, and ECG signals, are unique human characters that can be used for authentication processing. In this work, we present an IoT re...
Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied twofactor authentication suitable for WSNs. In user authentication protocols based on the symmetric key approach, a number of elliptic curve cryptography (ECC)-based authentication protocols have been prop...
The use of biometrics as a secure remote authentication mechanism is hindered by a series of issues. In the case of fingerprints, an attacker can make physical copies of fingerprints by ‘lifting’ latent fingerprints off a non-porous surface. These lifted fingerprints can be used to illegitimately gain access to an authentication system. Password authentication systems only accept passwords that...
As home devices have various functions and have improved computing power and networking ability, home device authentication has become increasingly important for improving the security of home network users. Moreover, device authentication supplies user convenience for the home network service user because it can replace the user authentication required for the used home network service. In add...
Multi-Factor Authentication (MFA) is the current trend to genuinely identify authorized users through the active authentication process using passwords, biometrics, cognitive behavior, etc. As new and improved authentication modalities of various types are becoming available, these are opening up options for security researchers to devise solutions facilitating continuous authentication to onli...
Authentication is the most important component to protect information system from unauthorized access. Because mobile devices have resource limitations, current existing authentication methods experience security, efficiency, flexibility and scalability problems in wireless network services. Although many access control methods utilize both individuals and groups while validating authorization,...
Most of the existing authentication schemes for mobile communication are static in nature, and principally dependent on strength of authenticating identifiers for users identity. The acceptance of all the transactions of a user under a single authentication level is vulnerable. We propose a novel transaction based authentication scheme (TBAS) for mobile communication using cognitive agents. The...
User authentication refers to user identification based on something a user knows, something a user has, something a user is or something the user does; it can also take place based on a combination of two or more of such factors. With the increasingly diverse risks in online environments, user authentication methods are also becoming more diversified. This research analyzes user authentication...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید