Showing 21 - 30 of 6,780
security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out …The most challenging issues in cloud computing are access control and data security because users of the cloud … throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authentication is the …
Persistent link: https://www.econbiz.de/10012044942
several security threats. A number of authentication protocols have been proposed in the literature but if existing practices … performance is the secure communication delay. An authentication technique having significant delay may enhance the possibility of … prove the integrity of proposed work, the performance is measured theoretically and analyzed experimentally over ns2 …
Persistent link: https://www.econbiz.de/10012045707
and evaluated for its performance with security and execution time or primary parameters. Various scenarios are also …
Persistent link: https://www.econbiz.de/10012045715
algorithms. Intended method will implement a basic idea of completeness verification and authentication approach in which the … efficiency by reducing time. In authentication process CaRP is both a captcha and a graphical password scheme. CaRP addresses a … number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual …
Persistent link: https://www.econbiz.de/10012047567
websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later … continue to influence the way society makes payment for goods and services, the requirement for more advanced security … is to present a conceptual model for authentication, data entry and transaction verification. It is suggested that the …
Persistent link: https://www.econbiz.de/10009440800
RFID authentication protocols based on symmetric key cryptography. We identify the security and privacy requirements for an … healthcare applications to e-passport. The expansion of RFID technology, however, gives rise to severe security and privacy … concerns. To ensure the widespread deployment of this technology, the security and privacy threats must be addressed. However …
Persistent link: https://www.econbiz.de/10009484555
have several essential security and privacy properties. We present a basic yet reasonably expressive language which …
Persistent link: https://www.econbiz.de/10009430549
Persistent link: https://www.econbiz.de/10011438552
Persistent link: https://www.econbiz.de/10012520006
Persistent link: https://www.econbiz.de/10012887818