• No results found

[PDF] Top 20 An Authentication mechanism for stateless communication

Has 10000 "An Authentication mechanism for stateless communication" found on our website. Below are the top 20 most common "An Authentication mechanism for stateless communication".

An Authentication mechanism for stateless communication

An Authentication mechanism for stateless communication

... security mechanism that allows systems to identify the user as a reg- istered user by proving information to proof the user is who he/she claims to ...different authentication mechanisms based on ... See full document

47

Key Management Mechanism and Authentication Impact on Network Layers

Key Management Mechanism and Authentication Impact on Network Layers

... mutual authentication scheme of ...the authentication server using PKI infrastructure mechanism by utilizing an initial password to the registered users in ...key mechanism and enhanced its ... See full document

8

Adaptive authentication and key agreement mechanism for future cellular systems

Adaptive authentication and key agreement mechanism for future cellular systems

... adaptive authentication and key distribution protocol (AAKA) was presented that can be applied in future mobile communication ...an authentication type (AT) can be assigned based on the level of ... See full document

5

A Novel Smart Card based Remote User Authentication Mechanism

A Novel Smart Card based Remote User Authentication Mechanism

... user authentication schemes, we see that most of the remote user authentication schemes that are password-based are impractical due to the fact that they are either very expensive in terms of computation or ... See full document

5

Dynamic Confidentiality Authentication at Multi Hop Communication

Dynamic Confidentiality Authentication at Multi Hop Communication

... hop communication in wireless sensor network considered to provable for vulnerability of data ...hop communication increased cost for packet ...security mechanism as node to node ... See full document

5

A Secure SCAM (Smart Card based Authentication Mechanism)

A Secure SCAM (Smart Card based Authentication Mechanism)

... mutual authentication, early wrong password detection and secure session key ...multi-server authentication, Internet protocol television broadcasting, wireless communication and healthcare ... See full document

6

Vehicular Ad Hoc Networks Authentication Mechanism

Vehicular Ad Hoc Networks Authentication Mechanism

... the authentication server ...wireless communication capability, while RSUs are deployed on intersections or hotspots as an infrastructure to provide information or access to the Internet for vehicles within ... See full document

8

Study of Prediction Based Authentication for Vehicle to Vehicle Communication

Study of Prediction Based Authentication for Vehicle to Vehicle Communication

... Timely authentication: With the authentication mechanism receivers can ensure that a message was sent by a valid vehicle and it has not been modified during the ... See full document

7

Defended Data Communication in VANET Using Dual Authentication

Defended Data Communication in VANET Using Dual Authentication

... main mechanism of authenticating the ...the communication from one vehicle to another vehicle or one vehicle to RSUs while they entering into the VANET ...the authentication is performed in trusted ... See full document

6

Improved High Definition Multimedia Interface Authentication Mechanism

Improved High Definition Multimedia Interface Authentication Mechanism

... The issue of content protection is as a result of the introduction of the HDMI standard which is used in digital communication of high definition content. Content providers involved in the traditional analogue ... See full document

9

A Secure Authentication mechanism for Wireless Sensor Networks

A Secure Authentication mechanism for Wireless Sensor Networks

... • Authentication: It ensures that the entities involved in the communication are authenticated prior to the transmission of ...proper mechanism to avoid a number of attacks possible such as ... See full document

7

Transitive Trust Extended Authentication Mechanism
          in Wireless Sensor Networks

Transitive Trust Extended Authentication Mechanism in Wireless Sensor Networks

... the communication range of the radio present in each node is short, the nodes usually employ a multi hop transmission pattern to propagate the information to the base ... See full document

5

Attack Resistant User Authentication using Visual Verification Mechanism

Attack Resistant User Authentication using Visual Verification Mechanism

... During authentication, a panel of candidate faces is presented for the user to select the face belonging to her ...Cognitive Authentication [5] requires a user to generate a path through a panel of images ... See full document

7

BioSmart: An advanced user authentication mechanism on touch screen devices

BioSmart: An advanced user authentication mechanism on touch screen devices

... smart mobile devices for storing sensitive information and accessing online services is increasing nowadays. At the same time, methods for authenticating users into their devices and online services should not only be ... See full document

6

A Lightweight Authentication and Key Sharing Protocol for Satellite Communication

A Lightweight Authentication and Key Sharing Protocol for Satellite Communication

... of authentication and key exchange protocols have been proposed to be used for different ...an authentication system for satellite networks in 1996 using a combination of Public key cryptography (PKC) and ... See full document

8

SECURE COMMUNICATION BASED ON AUTHENTICATION TECHNIQUES USING NIDS.

SECURE COMMUNICATION BASED ON AUTHENTICATION TECHNIQUES USING NIDS.

... crackers, authentication is the major phase in network ...networks. Authentication is one of the primary techniques of ensuring that the person who is transmitting the information is whom he says he ... See full document

9

Secure Communication Based On Authentication Techniques Using NIDS

Secure Communication Based On Authentication Techniques Using NIDS

... Ever increasing demand of good quality communication relies heavily on Network Intrusion Detection System (NIDS). Intrusion detection for network security demands high performance. Network Intrusion detection ... See full document

9

Authentication and Access Control for Cloud Computing Using RBDAC Mechanism

Authentication and Access Control for Cloud Computing Using RBDAC Mechanism

... The Proposed trust models used for owners and roles in RBDAC systems which are using cryptographic RBDAC schemes to secure stored data.. R ELATED WORK.[r] ... See full document

7

AuthFlow: Authentication and Access Control Mechanism for Software Defined Networking

AuthFlow: Authentication and Access Control Mechanism for Software Defined Networking

... trol mechanism of ...the authentication procedure by sending the start ...for authentication. As authentication is successfully confirmed, POX moves the host to the Authenticated ... See full document

7

Multilayer Authentication for  Communication Systems Based on  Physical Layer Attributes

Multilayer Authentication for Communication Systems Based on Physical Layer Attributes

... layer authentication has been formulated as binary hypothesis testing by exploiting the unique attributes related to the signal propa- gation environment such as, received signal strength (RSS) [1] and the channel ... See full document

13

Show all 10000 documents...