• No results found

Two-Way Authentication

Two Way Authentication for Web Services using Video CAPTCHA and Kerberos

Two Way Authentication for Web Services using Video CAPTCHA and Kerberos

... Internet has become an indispensable part of daily transactions including shopping, education, Commerce and industrial sector. All these transactions mainly needs to enter individual information in certain registration ...

6

An Efficient Data Sharing in Public Cloud using
          two way Authentication & Encryption

An Efficient Data Sharing in Public Cloud using two way Authentication & Encryption

... Abstract— Cloud computing enables various users to share their data over secure channel. Although various security algorithms are implemented for the security of shared data over public clouds. Here in this paper a new ...

5

ITCP based Security Enhancement for IoT Devices in IPV6 Protocol

ITCP based Security Enhancement for IoT Devices in IPV6 Protocol

... it can be used with 6LoWPAN and standard Internet protocols to build a wireless embedded Internet. Wi-Fi , WiMax etc. Second Step – After the discussion of physical layer and media layer. Next layer is network layer. In ...

5

A Robust Scheme for Secure Communication in Internet of Things

A Robust Scheme for Secure Communication in Internet of Things

... nodes authentication and dynamic cipher generation ensures safe and secure communication between nodes by implementing two-way authentication scheme between terminal node and platform which ...

6

Password Authentication System using New Intense Secure Algorithm in Mobile and Server in Two way Communications

Password Authentication System using New Intense Secure Algorithm in Mobile and Server in Two way Communications

... the two way authentication method and its advantages over the one way authentication ...traditional authentication systems and how passwords are compromised in such systems and ...

5

An Anti Eavesdropping Method in Data Collection of Smart Meter

An Anti Eavesdropping Method in Data Collection of Smart Meter

... the authentication result is sent to the collection ...the two authentications are successful, the meter data center transmits an acquisition in- struction to the meter which requires the smart meter to ...

12

One way and two way cost allocation in hub network problems

One way and two way cost allocation in hub network problems

... Several classes of hub problems have been studied. We mention some of them. Aykin (1994) considers that hubs have limited capacities and direct connections between nohubs are allowed. Ernst and Krishnamoorthy (1999) ...

40

One way and two way cost allocation in hub network problems

One way and two way cost allocation in hub network problems

... consider two cases. In the one-way flow case, we assume that the cost paid by a set of nodes depends only on the flow they send to other nodes (including nodes outside the set), but not on the flow they ...

38

bh-ad-12-over-the-air-dmitrienko-WP.pdf

bh-ad-12-over-the-air-dmitrienko-WP.pdf

... The code which contains the vulnerability is shown in Listing 1.2 (more specic, in line 15). The code is vulnerable, because part_num is not checked for negative values (only top boundary is enforced at line 11). The ...

12

Copy-move digital image forgery detection techniques: a review

Copy-move digital image forgery detection techniques: a review

... Based on whether the original image is available or not, image authentication (detection) methods are classified into two methods: Active authentication and Passive[r] ...

5

Two-factor  authentication  for  the  Bitcoin  protocol

Two-factor authentication for the Bitcoin protocol

... secure way to implement two-factor au- thentication is to share the private key and to create transaction signatures with a two-party signature ...one-time-password two-factor ...

18

SECURITY TECHNIQUES FOR DATA PROTECTION IN CLOUD COMPUTING

SECURITY TECHNIQUES FOR DATA PROTECTION IN CLOUD COMPUTING

... Authorization in the cloud computing is important for the users when they login to some cloud service because it enables prove of their identities. So, authorization is usually employed after the authentication. ...

8

Energy efficiency analysis of one way and two way relay systems

Energy efficiency analysis of one way and two way relay systems

... Relaying is viewed as an energy saving technique because it can reduce the transmit power by breaking one long range transmission into several short range transmissions [3]. In fact, relaying has been extensively studied ...

18

Simulation of two-way computations on arrays with one-way data flow

Simulation of two-way computations on arrays with one-way data flow

... In the next section it is shown that any such array in which cells are required to be initialized to different states can be simulated by a two-way array (input first cell, output last) [r] ...

21

12 Probability and two-way tables

12 Probability and two-way tables

... a two-way table are normally placed on the right and the bottom of the ...simplest two-way tables have only two categories for each ...

16

Different Techniques of Biometric Authentication

Different Techniques of Biometric Authentication

... In this technique, the user places the palm of his hand on a metal surface, positions his or her fingers according to a set of pins on the device and waits approximately for 1.2 seconds. The hand is properly aligned so ...

6

Restaurant acoustics – the science behind verbal

Restaurant acoustics – the science behind verbal

... the number of people in the room exceeds the acoustic capacity, the ambient noise level may exceed 442. 71 dB and the quality of verbal communication in a distance of 1 m is insufficien[r] ...

17

Two Level Authentication System Based on Pair Based Authentication and Image Selection

Two Level Authentication System Based on Pair Based Authentication and Image Selection

... People select predictable passwords, while setting textual and/or graphical passwords. Users tend to select passwords that are memorable in some way, which unfortunately often means that the passwords tend to ...

8

Two-Way Radio User's Guide

Two-Way Radio User's Guide

... Your Motorola radio is designed to comply with the following national and international standards and guidelines regarding exposure of human beings to radio frequency electromagnetic [r] ...

20

Multi-way Authentication Scheme for User Verification in  Cloud-Web Services

Multi-way Authentication Scheme for User Verification in Cloud-Web Services

... Unfortunately, two serious issues in this paradigm are: users will inevitably forget their passwords and their passwords could be compromised and changed by attackers, which result in the failures to access their ...

6

Show all 10000 documents...

Related subjects