• No results found

[PDF] Top 20 Mobile Agent Based Authentication: A Model for User Authentication in a Distributed System

Has 10000 "Mobile Agent Based Authentication: A Model for User Authentication in a Distributed System" found on our website. Below are the top 20 most common "Mobile Agent Based Authentication: A Model for User Authentication in a Distributed System".

Mobile Agent Based Authentication: A Model for User Authentication in a Distributed System

Mobile Agent Based Authentication: A Model for User Authentication in a Distributed System

... a authentication protocols are the heart of many security techniques used in the distributed ...systems. Authentication Protocols are used to convince parties of each other’s identity and to exchange ... See full document

6

Anonymous Authentication for Secure Mobile Agent Based Internet Business

Anonymous Authentication for Secure Mobile Agent Based Internet Business

... on authentication that are present in the literature ...new mobile agent model with an improved digital signature algorithm to support the execution of mobile code at mobile ... See full document

9

Mobile Based Secure Authentication using TLS and Offline OTP

Mobile Based Secure Authentication using TLS and Offline OTP

... security model. Every user wants secure Authentication with the server and also to maintain security so they do not lost message ...integrity. Authentication It is the process to confirm the ... See full document

5

Transparent User Authentication For Secure System

Transparent User Authentication For Secure System

... a distributed architecture to realize a protected and usable confirmation support, and it supports security-critical web solutions accessible over the ...Online. User confirmation into a consistent process ... See full document

8

Mobile Agent Security Based on Mutual Authentication and Elliptic Curve Cryptography

Mobile Agent Security Based on Mutual Authentication and Elliptic Curve Cryptography

... Abstract: Mobile agent system is a satisfying solution for the implementation and maintenance of applications distributed over large-scale networks, this solution is very used in solving ... See full document

9

Secure user authentication based on the trusted platform for mobile devices

Secure user authentication based on the trusted platform for mobile devices

... communication agent. The NZ communication agent calls the secure functions through the SZ communication agent and the SZ-security API, receives the return value of the SZ- security API from the SZ ... See full document

15

Advanced User Authentication System on Mobile for Signing Digital Transactions

Advanced User Authentication System on Mobile for Signing Digital Transactions

... and authentication requirements are steadily increasing in both the online and off-line ...security model is used mainly for the verification of identity, protection of information, and authorization to ... See full document

8

Mobile distributed authentication protocol

Mobile distributed authentication protocol

... secure system. Strong authentication protocols are needed to restrict network access to only authorised ...existing authentication protocols are centralised, using a single authentication ... See full document

5

A Survey on Single Sign-On Mechanism for Multiple Service Authentications

A Survey on Single Sign-On Mechanism for Multiple Service Authentications

... of authentication to permit an authorized user to access all related, but independent software systems or applications without being prompted to log in again at each of them during a particular ...some ... See full document

5

Elliptic Curve Cryptography based Secure and Efficient Authentication Protocol for Smart Card Users

Elliptic Curve Cryptography based Secure and Efficient Authentication Protocol for Smart Card Users

... efficient user authentication protocol is proposed which uses the smart card based user authentication using elliptic curve ...proposed authentication method is more efficient ... See full document

5

Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications   Challenges and Evolution

Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications Challenges and Evolution

... on authentication mechanism built into the process of issuance of payment token which acts as one-time-use virtual ...existing authentication standards and token service provider has the option of choosing ... See full document

6

INFORMATION TECHNOLOGY FOR NUMERICAL SIMULATION OF CONVECTIVE FLOWS OF A VISCOUS 
INCOMPRESSIBLE FLUID IN CURVILINEAR MULTIPLY CONNECTED DOMAINS

INFORMATION TECHNOLOGY FOR NUMERICAL SIMULATION OF CONVECTIVE FLOWS OF A VISCOUS INCOMPRESSIBLE FLUID IN CURVILINEAR MULTIPLY CONNECTED DOMAINS

... Biometric based Authentication plays a vital role for signature verification and user access control in the distributed cloud ...biometric based authentication models use single ... See full document

8

An Advanced Smart ATM Monitoring System using Raspi

An Advanced Smart ATM Monitoring System using Raspi

... Security Based ATM theft project is born with the observation inour real life incidents happening around ...This system uses Arduino controller based embedded system to process real time data ... See full document

5

New Authentication and Key Agreement Protocol for LTE WLAN Interworking

New Authentication and Key Agreement Protocol for LTE WLAN Interworking

... Authentication of the mobile node is done by using Extensible Authentication Protocol–Authentication and Key Agreement EAP-AKA, was developed as a secure authentication mechanism through[r] ... See full document

5

FreeHand Sketch-based Authenticated Security System Using Levenshtein Distance And Coordinates-Similarity

FreeHand Sketch-based Authenticated Security System Using Levenshtein Distance And Coordinates-Similarity

... and mobile phone using some techniques like social ...biometric system can also be hacked by unauthorized users using the artificial fingerprints of an authorized ...Security System using ... See full document

9

Next Level User Authentication In Android

Next Level User Authentication In Android

... Recognition Based Authentication System: The second stage of authenticating the administrator user on the device is Pattern Recognition Based Authentication ...the user is ... See full document

5

NFC Based Privacy Preserving User Authentication Scheme in Mobile Office

NFC Based Privacy Preserving User Authentication Scheme in Mobile Office

... for authentication [9]. Won argued that the authentication method is secure, which prevents from unauthorized users by generating session key using random key and ...security system and investigate ... See full document

10

Mobile Based User Authentication for Guaranteed Password Security Using key

Mobile Based User Authentication for Guaranteed Password Security Using key

... of user authentication on websites due to its convenience and ...a user authentication protocol named oPass which leverages a user’s cellphone and short message service to thwart password ... See full document

9

 INTELLIGENT SELF TUNING PID CONTROLLER USING HYBRID IMPROVED PARTICLE 
SWARM OPTIMIZATION FOR ULTRASONIC MOTOR

 INTELLIGENT SELF TUNING PID CONTROLLER USING HYBRID IMPROVED PARTICLE SWARM OPTIMIZATION FOR ULTRASONIC MOTOR

... Vehicular Ad hoc Network (VANET) is an emerging intelligent network that provides safety and comfort to the public. This network includes a centralized Trusted Authority (TA), several Road Side Units (RSUs) and vehicles ... See full document

9

3683 0 ssh1 pdf

3683 0 ssh1 pdf

... the user logs in from is listed in ...the user names are the same on both sides, the user is immediately permitted to log ...the user on that machine, the user is permitted to log ...of ... See full document

11

Show all 10000 documents...