نتایج جستجو برای: authentication

تعداد نتایج: 34927  

2015
Jongho Mun Jiye Kim Donghoon Lee Jaewook Jung Younsung Choi Dongho Won

Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data over insecure channel. During the last couple of decades, many researchers have proposed a remote user authentication schemes which are ID-based, password-based, and smart card-based. Above all, smart card-based authentication schemes are becoming day by day more popular. One of the b...

2003
A. F. Al Shahri D. G. Smith J. M. Irvine

Both the size, and the interconnectivity of computer networks are increasing tremendously. However, the possibility of an attack compromising the network is also increasing, making network security critical. Strong authentication protocols are needed to restrict network access to only authorised users. Most existing protocols for authentication and network access are based on centralised authen...

Journal: :American Journal of Islam and Society 2010

Journal: :Journal of Information Technology Research 2022

This manuscript presents the design of a new approach human skin color authentication. Skin is one most popular soft biometric modalities. Since modality alone cannot reliably authenticate an individual, this system designed to combine results with other pure modalities increase recognition performance. In classification process, we first perform facial detection by segmentation using threshold...

2007
Saber Zrelli Yoichi Shinoda

The Extensible Authentication protocol (EAP), is the main component of the standard AAA (Authentication Authorization and Accounting) framework for network access control. AAA frameworks support cross-domain authentication that enables a certain access network to authenticate a roaming client that belongs to a remote network. The cross-domain authentication requires message exchange between the...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2018

2005
Hua Wang Zhongwei Zhang David Lai

When an IP network is unable to provide users with demanded services, it usually outsources to other networks. Outsourcing will involve the process of authenticating users for services over IP networks. The process can become complex when different networks have different authentication schemes, in which users are required to provide varying sets of information for service authentication. In th...

Journal: :CoRR 2010
V. Ruckmani G. Sudha Sadasivam

In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multi-domain. Authentication remains as the signi...

2015
G. B Ogunniye O. M Afolabi

This paper presents multifactor authentication method for securing access to e-banking systems in Nigeria using fingerprint recognition and SiteKey authentication. Fingerprint authentication is based on the notion of fingerprint individuality; the idea that fingerprint image of an individual is unique and can be used to uniquely identify him/her. SiteKey authentication on the other hand, uses a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید