Showing 1 - 10 of 50
system security and resources. The author's mechanism should be design in such way, the Confidentiality, Integrity …
Persistent link: https://www.econbiz.de/10012043937
Standards and Technology. It is still a powerful data integrity and authentication tool that provides better protection than … data security techniques were developed to ensure privacy, integrity and authenticity. One of the techniques developed was … to fulfill authentication with a message authentication code (MAC) that was defined by the National Institute of …
Persistent link: https://www.econbiz.de/10012045717
Persistent link: https://www.econbiz.de/10012416431
Persistent link: https://www.econbiz.de/10013547707
This paper presents a robust and imperceptible methodology of watermark embedding. It uses two vital techniques, firstly the Multi-Resolution Singular Value Decomposition (MR-SVD) and an image adaptive algorithm on the lines of the human visual system (HVS), called Noise Visibility Function...
Persistent link: https://www.econbiz.de/10012042710
In this article, the authors have proposed a secure two-factor remote user authentication and session key agreement … scheme provides the amenity of mutual authentication and session key agreement safely. The informal security verification has …
Persistent link: https://www.econbiz.de/10012043263
through peer to peer connections (ad hoc mode). Authentication is one among the most primary research challenges for the … authentication process, which are of major concern for real-time applications and media streaming application. In the same way, it is … traditional authentication mechanisms frequently adopted the names and passwords of clients as login authentication. However …
Persistent link: https://www.econbiz.de/10012043265
In remote user authentication, a server confirms the authenticity of a user via unreliable channel. Several … authentication protocols are devised in the literature relied on the identity, password and biometric of a user. But, most of the … authentication protocols are either computationally expensive or not-secure from several kinds of malicious threats. In this document …
Persistent link: https://www.econbiz.de/10012043272
Recently, Om et al. proposed three-factor remote user authentication protocol using ElGamal cryptosystem and ensured … robust anonymous identity based authentication scheme for multi-server environment. The authentication proof of the proposed … scheme has validated using BAN (Burrows-Abadi-Needham) logic, which confirms the protocol facilitates mutual authentication …
Persistent link: https://www.econbiz.de/10012043273
The session initiation protocol is one the most popular protocols that is used in Internet protocol multimedia subsystems and adopted by a wide range of networking vendors. This research suggests a secure distributed session initiation protocol-based architectural model that can be deployed in...
Persistent link: https://www.econbiz.de/10012043352