Showing 1 - 10 of 30
ensure the data privacy of a tag. The framework will use a sanitization technique with a mutual authentication in the reader … stop execution of the code in the RFIF system. Here shared unique parameters are used for authentication. It will be …
Persistent link: https://www.econbiz.de/10009483982
Persistent link: https://www.econbiz.de/10012271208
websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later … is to present a conceptual model for authentication, data entry and transaction verification. It is suggested that the … to an attacker. The model is based on a graphical authentication application previously developed called Authentigraph. …
Persistent link: https://www.econbiz.de/10009440800
(Class1). To protect users and organization we are proposing an enhanced RFID mutual authentication scheme. In this protocol … we use authentication based on shared unique parameters as a method to protect privacy. This protocol will be capable of …
Persistent link: https://www.econbiz.de/10009483920
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerningcurrent transactions. One category of such systems is represented by the reputation systems. However, despite the growing body of experience in...
Persistent link: https://www.econbiz.de/10009430549
Persistent link: https://www.econbiz.de/10011438552
Persistent link: https://www.econbiz.de/10011508083
Persistent link: https://www.econbiz.de/10010491939
Persistent link: https://www.econbiz.de/10011478487
Persistent link: https://www.econbiz.de/10012547784