نتایج جستجو برای: unilateral authentication

تعداد نتایج: 74220  

2000
Andrew J. Klosterman Gregory R. Ganger

Biometrics have the potential to solidify person-authentication by examining "unforgeable" features of individuals. This paper explores issues involved with effective integration of biometric-enhanced authentication into computer systems and design options for addressing them. Because biometrics are not secrets, systems must not use them like passwords; otherwise, biometric-based authentication...

2006
Alec Yasinsac

Traditional authentication is two valued. Unfortunately, authentication mechanisms cannot perfectly establish electronic participant’s identity. Despite years of research and its manifestations such as digital signatures, zero knowledge proofs, public key infrastructures, certificates, biometric tools, etc. the best authentication evidence is a combination of multiple factors. All authenticatio...

2013
L. Morand

The EAP Re-authentication Protocol (ERP) defines extensions to the Extensible Authentication Protocol (EAP) to support efficient re-authentication between the peer and an EAP Re-authentication (ER) server through a compatible authenticator. This document specifies Diameter support for ERP. It defines a new Diameter ERP application to transport ERP messages between an ER authenticator and the ER...

2016
Julien Hatin Estelle Cherrier Jean-Jacques Schwartzmann V. Frey Christophe Rosenberger

The trust provided by authentication systems is commonly expressed with a Level of Assurance (LoA see 3). If it can be considered as a first process to simplify the expression of trust during the authentication step, it does not handle all the aspects of the authentication mechanism and especially it fails to integrate continuous authentication systems. In this paper, we propose a model based o...

1998
Aura Ganz Se Hyun Park Zvi Ganz

In this paper we introduce a robust re-authentication and key exchange protocol for IEEE 802.11 Wireless LANs. Based on an authentication protocol that we have previously published, we introduce a low computational complexity re-authentication and key exchange procedure that provides enhanced robustness in face of cryptographic attacks. This procedure accounts for the wireless media limitations...

Journal: :RFC 2013
Julien Bournelle Lionel Morand Sebastien Decugis Qin Wu Glen Zorn

The EAP Re-authentication Protocol (ERP) defines extensions to the Extensible Authentication Protocol (EAP) to support efficient re-authentication between the peer and an EAP Re-authentication (ER) server through a compatible authenticator. This document specifies Diameter support for ERP. It defines a new Diameter ERP application to transport ERP messages between an ER authenticator and the ER...

2004
J. Arkko H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP-AKA includes optional identity privac...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

Journal: :Indian Journal of Science and Technology 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید