نتایج جستجو برای: unilateral authentication

تعداد نتایج: 74220  

2014
Narishige Abe Takashi Shinzaki N. Abe T. Shinzaki

Biometric authentication technologies, such as fingerprint, face, iris, and vein, have been widespread in many applications from individual portable devices to national ID management systems. Furthermore, relatively newer biometric authentication modalities including eye movement, lip-motion, etc., have been also researched and developed in order to improve an authentication accuracy and an usa...

2012
Naveed Ahmed Christian Damsgaard Jensen

Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session. In this paper, we consider the case of post-session authentication, where parties authenticate each other...

2009
MOISES SALINAS GALLEGOS GARCIA GONZALO DUCHEN SANCHEZ

This paper describes a solution for nodes and message authentication problems in wireless sensor networks, this solution allows effectively avoiding node-impersonation and messaging falsification among the WSN nodes. The resulting protocol address authentication at two level using identity based cryptography and message authentication codes with SHA-1, for node and message authentication respec...

2010
L. Krishna Bharathi Gnanou Florence Sudha

Even though CDMA2000 wireless networks are being widely deployed as a cellular digital standard around the world, it has some hidden vulnerabilities concerned with security issues. The existing CDMA systems use authentication mechanism by CAVE (Cellular Authentication and Voice Encryption) algorithm. This authentication method has several disadvantages. Only one way authentication is provided, ...

Journal: :iranian rehabilitation journal 0
faranak aliabadi faculty of rehabilitation siences,tehran university of medical sciences, tehran, iran. khatereh borhani faculty of rehabilitation siences,tehran university of medical sciences, tehran, iran. mehdi alizadeh faculty of rehabilitation siences,tehran university of medical sciences, tehran, iran. nasrin amiri university of social welfare and rehabilitation sciences, tehran, iran.

objectives: the purpose of the present study was comparing visuo-spatial attention between children with attention deficit hyperactivity disorder-inattentive (adhd-i) type and normal children. methods: in this cross-sectional study fifteen (7-10 years of age) children were classified with adhd-i type and 15 normal children were matched for age, sex, and iq. they were selected trough simple rand...

Journal: :Journal of Multimedia 2014
Lihua Zhang Xichang Dai Youjin Shen

In order to solve network security problem, we need identity authentication protocol to ensure legal user’s authority. Multi-factor identity authentication protocols have more merits than the common identity authentication protocol. This paper analyzes the shortcomings of existing network identity authentication methods, and proposes a new authentication protocol based on SM2 and fingerprint US...

2003
Hahnsang Kim Walid Ben-Ameur Hossam Afifi

Many hierarchical mobility schemes have been proposed for the Internet. They all seek to improve the hand-off especially when the mobile terminal is moving relatively far from its point of attachment. Some simulations have been presented for their models, but none has addressed security problems. Moreover, these solutions address only the improvement of mobility without studying the impact of a...

Journal: :IEEE Journal on Selected Areas in Communications 1993
Li Gong

Authentication is a process by which one satisses another about one's claim of identity. Typically an authentication server provides the authentication service via an authentication protocol. The authentication service is a security bottleneck in that its compromise can lead to the compromise of the whole system. The service is also a performance bottleneck because many activities cannot procee...

Journal: :Journal of Multimedia 2014
Zhongsheng Qiu Fangfang Zhang Yuan Zhou

In order to solve network security problem, we need identity authentication protocol to ensure legal user’s authority. Multi-factor identity authentication protocols have more merits than the common identity authentication protocol. This paper analyzes the shortcomings of existing network identity authentication methods, and proposes a new authentication protocol based on SM2 and fingerprint US...

2011
Hung-Min Sun Bing-Zhe He Shih-Ying Chang Chun-Hua Cho

In a Universal Mobile Telecommunications System (UMTS), a user equipment (UE) can access IP multimedia services through IP Multimedia Subsystems (IMS). In addition to passing IMS authentication, called IMS AKA, this UE also needs to pass General Packet Radio Service (GPRS) authentication, called 3GPP AKA, since the data of the IMS service is transmitted through a GPRS network. Many steps in the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید