نتایج جستجو برای: unilateral authentication

تعداد نتایج: 74220  

2001
H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the GSM Subscriber Identity Module (SIM). The mechanism specifies enhancements to GSM authentication and key agreement whereby multiple authentication triplets can be combined to create authentication responses and encryption keys of greater strength than the indiv...

2009
Yan-Jiang Yang Jian Weng Feng Bao

Password authentication is the most commonly accepted means for entity authentication. To meet the increasing need of preserving individual privacy, anonymous password authentication has been proposed recently, to augment password authentication with the protection of user privacy. In this paper, we analyze the weaknesses inherent to anonymous password authentication, which make it questionable...

Journal: :Computers & Security 2013
Celia Li Uyen Trang Nguyen Hoang Lan Nguyen Md. Nurul Huda

We propose new authentication protocols to support fast handover in IEEE 802.11-based wireless mesh networks. The authentication server does not need to be involved in the handover authentication process. Instead, mesh access points directly authenticate mobile clients using tickets, avoiding multi-hop wireless communications in order to minimize the authentication delay. Numerical analysis and...

2013
Seung-hwan Ju Hee-suk Seo Sung-hyu Han Jae-cheol Ryou Jin Kwak

The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if ...

Journal: :Mobile Information Systems 2011
Yi-Fu Ciou Fang-Yie Leu Yi-Li Huang Kangbin Yim

In this paper, we propose a handover authentication mechanism, called the handover key management and authentication scheme (HaKMA for short), which as a three-layer authentication architecture is a new version of our previous work, the Diffie-Hellman-PKDS-based authentication method (DiHam for short), improving its key generation flow and adding a handover authentication scheme to respectively...

Journal: :Journal of plastic, reconstructive & aesthetic surgery : JPRAS 2011
Joshua C Demke Sherard A Tatum

Unilateral cleft lip repair, over the last century, has seen both revolutionary changes and subtle technical refinements. Millard's rotation/advancement technique stands among the most striking of these innovations. We review the evolution of unilateral cleft lip repair including a look at straight-line, geometric and rotation/advancement type of repairs, while looking closely at the underlying...

Journal: :JNW 2010
Shen-Ho Lin Jung-Hui Chiu Sung-Shiou Shen

In GSM-WLAN heterogeneous networks, the authentication efficiency is one of the drawbacks for message transaction and processing in the RADIUS server. This paper proposed two fast authentication schemes, based on the EAP-SIM mechanism, to improve the authentication efficiency by balancing the message transaction loads and processing loads among the RADIUS server and individual APs. In this pape...

Journal: :Vision Research 1996
RUSSELL L. WOODS ARTHUR BRADLEY DAVID A. ATCHISON

Though the human eye generally creates a single image on the retina, the literature contains many examples showing perceptual monocular diplopia. Previously, monocular diplopia resulting from astigmatic defocus has been demonstrated to cause a notch (local minimum) in the contrast sensitivity function (CSF). We examine Verhoeff's (1900) model which explains how monocular diplopia can occur thro...

Journal: :Canadian Urological Association journal = Journal de l'Association des urologues du Canada 2009
Karen Psooy

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید