نتایج جستجو برای: authentication

تعداد نتایج: 34927  

2008
Chris Szilagyi Philip Koopman

Distributed embedded systems are becoming increasingly vulnerable to attack as they are connected to external networks. Unfortunately, they often have no built-in authentication capability. Multicast authentication mechanisms required to secure embedded networks must function within the unique constraints of these systems, making it difficult to apply previously proposed schemes. We propose an ...

2005
T. Palfner M. Schlauweg E. Müller

In this paper, we present a new authentication method in the wavelet domain of JPEG2000, which is robust to re-compression, resolution changes and noise. We show that, because of its bit plane oriented processing, JPEG2000 is more suitable for the integration of an authentication watermarking algorithm than JPEG. The disadvantages of JPEG-based authentication schemes are discussed. It is shown ...

Journal: :CoRR 2017
Ahmed F. Hussein Abbas K. AlZubaidi Ali Al-Bayaty Qais A. Habash

The conventional authentication technologies, like RFID tags and authentication cards/badges, suffer from different weaknesses, therefore a prompt replacement to use biometric method of authentication should be applied instead. Biometrics, such as fingerprints, voices, and ECG signals, are unique human characters that can be used for authentication processing. In this work, we present an IoT re...

2017
Younsung Choi

Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied twofactor authentication suitable for WSNs. In user authentication protocols based on the symmetric key approach, a number of elliptic curve cryptography (ECC)-based authentication protocols have been prop...

2007
Colby G. Crossingham Sebastiaan H. von Solms

The use of biometrics as a secure remote authentication mechanism is hindered by a series of issues. In the case of fingerprints, an attacker can make physical copies of fingerprints by ‘lifting’ latent fingerprints off a non-porous surface. These lifted fingerprints can be used to illegitimately gain access to an authentication system. Password authentication systems only accept passwords that...

2008
Yun-kyung Lee Jong-wook Han Deok Gyu Lee Jeong-nyeo Kim

As home devices have various functions and have improved computing power and networking ability, home device authentication has become increasingly important for improving the security of home network users. Moreover, device authentication supplies user convenience for the home network service user because it can replace the user authentication required for the used home network service. In add...

2014
Abhijit Kumar Nag Dipankar Dasgupta Kalyanmoy Deb

Multi-Factor Authentication (MFA) is the current trend to genuinely identify authorized users through the active authentication process using passwords, biometrics, cognitive behavior, etc. As new and improved authentication modalities of various types are becoming available, these are opening up options for security researchers to devise solutions facilitating continuous authentication to onli...

Journal: :JCIT 2010
Huy Hoang Ngo Xianping Wu Phu Dung Le Bala Srinivasan

Authentication is the most important component to protect information system from unauthorized access. Because mobile devices have resource limitations, current existing authentication methods experience security, efficiency, flexibility and scalability problems in wireless network services. Although many access control methods utilize both individuals and groups while validating authorization,...

Journal: :I. J. Network Security 2009
B. Sathish Babu Pallapa Venkataram

Most of the existing authentication schemes for mobile communication are static in nature, and principally dependent on strength of authenticating identifiers for users identity. The acceptance of all the transactions of a user under a single authentication level is vulnerable. We propose a novel transaction based authentication scheme (TBAS) for mobile communication using cognitive agents. The...

Journal: :JIPS 2011
Jae-Jung Kim Seng-Phil Hong

User authentication refers to user identification based on something a user knows, something a user has, something a user is or something the user does; it can also take place based on a combination of two or more of such factors. With the increasingly diverse risks in online environments, user authentication methods are also becoming more diversified. This research analyzes user authentication...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید