نتایج جستجو برای: unilateral authentication

تعداد نتایج: 74220  

Journal: :Digital Signal Processing 2020

2012
Alain Forget Sonia Chiasson Kirstie Hawkey Timothy Lethbridge Gabriel Wainer

Usability and security challenges with standard text passwords have led researchers and professionals to consider alternative authentication schemes. This thesis explores the various challenges inherent in supporting a practical reality of authentication scheme diversity. We address these challenges by proposing the following solutions aimed at providing users with a usable and secure authentic...

2004
Zinaida Benenson Felix Gärtner Dogan Kesdogan

If the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We focus on user authentication, a central problem when trying to build access control mechanisms for sensor networks. We first sketch some security issues in the context of user authentication in sensor networks. We then introduce the notion of...

2015

Are security issues about biometric authentication, which must be taken into consid. Paper presents security concerns about biometric authentication and its.of studying biometric authentication systems and their security. Our research on security and reliability issues related to biometric authentication started in 1999. Http:www.ecom-monitor.compapersbiometricsTR2000.pdf.Please help improve it...

2014
Shin-Jia Hwang Cheng-Han You

For portable communication systems, the delegation-based authentication protocol provides efficient subsequent login authentication, data confidentiality, user privacy protection, and non-repudiation. However, in all proposed protocols, the non-repudiation of mobile users is based on an unreasonable assumption that home location registers are always trusted. To weaken this assumption and enhanc...

2015
Andrew J. Klosterman Gregory R. Ganger

Biometrics have the potential to solidify person-authentication by examining \unforgeable" features of individuals. This paper explores issues involved with e ective integration of biometric-enhanced authentication into computer systems and design options for addressing them. Because biometrics are not secrets, systems must not use them like passwords; otherwise, biometric-based authentication ...

2014
S. Vanitha J. Jayachitra K. Elavarasi

Kerberos is the widely deployed authentication protocol. This document gives you comparison between NTLM and Kerberos authentication. And it gives information on how Kerberos authentication plays a vital role in authentication and delegation scenarios, and the situations where Kerberos authentication should be used or may be required in solution designs. Scenarios include business intelligence ...

2013
Parampreet Singh

WiMAX networks have advantages over the wired network, such as convenience, mobility, and flexibility. The security concerns in this network may prevent its further widespread adoption. Hence, improving the security of WiMAX is of considerable importance. In WiMAX networks by providing security features like authentication, authorization and encryption. The absence of proper authentication mech...

Journal: :Computer Networks 2006
Vivek Pathak Liviu Iftode

We describe Byzantine Fault Tolerant Authentication, a mechanism for public key authentication in peer-to-peer systems. Authentication is done without trusted third parties, tolerates Byzantine faults and is eventually correct if more than a threshold of the peers are honest. This paper addresses the design, correctness, and fault tolerance of authentication over insecure asynchronous networks....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید