نتایج جستجو برای: authentication
تعداد نتایج: 34927 فیلتر نتایج به سال:
Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data over insecure channel. During the last couple of decades, many researchers have proposed a remote user authentication schemes which are ID-based, password-based, and smart card-based. Above all, smart card-based authentication schemes are becoming day by day more popular. One of the b...
Both the size, and the interconnectivity of computer networks are increasing tremendously. However, the possibility of an attack compromising the network is also increasing, making network security critical. Strong authentication protocols are needed to restrict network access to only authorised users. Most existing protocols for authentication and network access are based on centralised authen...
This manuscript presents the design of a new approach human skin color authentication. Skin is one most popular soft biometric modalities. Since modality alone cannot reliably authenticate an individual, this system designed to combine results with other pure modalities increase recognition performance. In classification process, we first perform facial detection by segmentation using threshold...
The Extensible Authentication protocol (EAP), is the main component of the standard AAA (Authentication Authorization and Accounting) framework for network access control. AAA frameworks support cross-domain authentication that enables a certain access network to authenticate a roaming client that belongs to a remote network. The cross-domain authentication requires message exchange between the...
When an IP network is unable to provide users with demanded services, it usually outsources to other networks. Outsourcing will involve the process of authenticating users for services over IP networks. The process can become complex when different networks have different authentication schemes, in which users are required to provide varying sets of information for service authentication. In th...
In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multi-domain. Authentication remains as the signi...
This paper presents multifactor authentication method for securing access to e-banking systems in Nigeria using fingerprint recognition and SiteKey authentication. Fingerprint authentication is based on the notion of fingerprint individuality; the idea that fingerprint image of an individual is unique and can be used to uniquely identify him/her. SiteKey authentication on the other hand, uses a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید