نتایج جستجو برای: unilateral authentication
تعداد نتایج: 74220 فیلتر نتایج به سال:
This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the GSM Subscriber Identity Module (SIM). The mechanism specifies enhancements to GSM authentication and key agreement whereby multiple authentication triplets can be combined to create authentication responses and encryption keys of greater strength than the indiv...
Password authentication is the most commonly accepted means for entity authentication. To meet the increasing need of preserving individual privacy, anonymous password authentication has been proposed recently, to augment password authentication with the protection of user privacy. In this paper, we analyze the weaknesses inherent to anonymous password authentication, which make it questionable...
We propose new authentication protocols to support fast handover in IEEE 802.11-based wireless mesh networks. The authentication server does not need to be involved in the handover authentication process. Instead, mesh access points directly authenticate mobile clients using tickets, avoiding multi-hop wireless communications in order to minimize the authentication delay. Numerical analysis and...
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if ...
In this paper, we propose a handover authentication mechanism, called the handover key management and authentication scheme (HaKMA for short), which as a three-layer authentication architecture is a new version of our previous work, the Diffie-Hellman-PKDS-based authentication method (DiHam for short), improving its key generation flow and adding a handover authentication scheme to respectively...
Unilateral cleft lip repair, over the last century, has seen both revolutionary changes and subtle technical refinements. Millard's rotation/advancement technique stands among the most striking of these innovations. We review the evolution of unilateral cleft lip repair including a look at straight-line, geometric and rotation/advancement type of repairs, while looking closely at the underlying...
In GSM-WLAN heterogeneous networks, the authentication efficiency is one of the drawbacks for message transaction and processing in the RADIUS server. This paper proposed two fast authentication schemes, based on the EAP-SIM mechanism, to improve the authentication efficiency by balancing the message transaction loads and processing loads among the RADIUS server and individual APs. In this pape...
Though the human eye generally creates a single image on the retina, the literature contains many examples showing perceptual monocular diplopia. Previously, monocular diplopia resulting from astigmatic defocus has been demonstrated to cause a notch (local minimum) in the contrast sensitivity function (CSF). We examine Verhoeff's (1900) model which explains how monocular diplopia can occur thro...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید