The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
New media has increased communication between people all over the world and the Internet. Problems can be solved by centralized management of SDN controller in 5G, such as security and limited bandwidth in new media. An authentication server and a database server are connecting to the same switch. SDN controller generates a flow table routing to the authentication server, when it receives requirements...
To better protect the security of the core site, such as precious material storage or the place to be visited by important figure, and to improve the efficiency of the security system of the core site, this paper proposes an identity authentication scheme based on fingerprint authentication and pulse. According to fingerprint and the dynamic password, and on the condition of the pulse for ensuring...
The traditional Kerberos protocol exists some limitations in achieving clock synchronization and storing key, meanwhile, it is vulnerable from password guessing attack and attacks caused by malicious software. In this paper, a new authentication scheme is proposed for wireless mesh network. By utilizing public key encryption techniques, the security of the proposed scheme is enhanced. Besides, timestamp...
An identity authentication scheme is proposed combining with biometric encryption, public key cryptography of homomorphism and predicate encryption technology under the cloud computing environment. Identity authentication scheme is proposed based on the voice and homomorphism technology. The scheme is divided into four stages, register and training template stage, voice login and authentication stage,...
Various information systems in the heterogeneous environment have resulted in a lot of discrete business data, and this type of storing method decreased the sharing of the data. In this paper, we designed and implement a secure data transmission scheme in the context of High Education Examination Management Information System of Shandong Province (HEEMISSP), in which all kinds of factors in the heterogeneous...
The rapid development of the Internet facilitates our lives in many aspects. More and more business will be done through Internet. Under such circumstances, enough attention must be given to the information security, of which the identity authentication is one important problem. In the traditional authentication scheme, the user provides the username and static password to service provider, but there...
A mobile terminal voting system based on android platform is presented and implemented to solve the problems of traditional voting and e-voting system in this paper. Joining the static-password mechanism and the dynamic-password mechanism, a double identity authentication scheme is presented based on the symmetric algorithm, which conquers challenge-response protocol weakness. It achieves double identity...
An identity authentication scheme specially designed for cloud storage via USB token is presented in this paper. Meanwhile, a secure cloud storage model, in which the excellent features of the proposed scheme are fully displayed, is introduced and detailed cryptanalysis are implemented to illustrate that the scheme is able to achieve all the existing criteria of the USB token-based identity authentication...
SSL protocol realize identity authentication through verifying both sides' certificate, but there are still some drawbacks. Through applying attribute certificate and improving SSL handshake process, we can improve the function of the SSL identity authentication, let SSL apply more widely.
To guarantee the security of the private keys of PKI users, a scheme of accessing and storing the private key is proposed in this paper. The trustee-boxes storing the private key are introduced to meet the roaming users accessing to the private key in the cross-regions; Making use of the characteristics of threshold technology, the divided private key slices are encrypted and stored into the n trustee-boxes,...
Combining ElGamal's signature scheme, ElGamal's sequential multi-signature scheme and blind signature scheme, an identity authentication scheme based on USB Key for Trusted Network Connect (UKTNC-IAS) is established to resolve the problem of the limitation of TPM in the identity authentication. Because the authentication to relatively fixed TPM only stands for the machine authentication which is not...
Identity authentication is the key point for secure communications in cognitive radio networks (CRN). PPP Extensible Authentication Protocols are widely used in wireless networks recently. Cognitive radio networks are able to merge various wireless network standards whose security certification requirements are different. Therefore, current authentication mechanisms are not suitable for cognitive...
Achieving trust relationship with privacy preservation is one of the key purposes of identity management. A novel identity management model is proposed to build trust relationship among different parties through identity validation and authentication. A two-way handshake process with two variants is introduced to implement strong mutual authentication between users and service providers without revealing...
In the Digital Rights Management (DRM) platform, the weak security of user authentication online and the digital content usage offline are analyzed, and a dual-factor dynamic authentication scheme is designed, which is based on the Personal Identity Number (PIN) authentication and the hardware USB Key digital certificate authentication. On this basis, the architecture of the dynamic certification...
We propose a trusted computing module based secure electronic transaction architecture, which uses trusted equipment as the identity authentication and transaction authorization terminal. The framework binds authentication and authorization in e-transaction operations and guarantee the secure sensitive operation is executed properly in an isolated, trusted, auditable environment. Our approach thwarts...
In this paper, we introduce the feasibility of using fingerprint as media in authentication; then describe the design and C# implementation of a highly reliable authentication system in networking environment, combining principles of identity authentication protocol, Diffie-Hellman key agreement protocol, encryption-decryption and digital signature algorithm.
Due to some security issues of varieties of mobile access technologies, we need a new supporting infrastructure that can be able to support more efficient and secure ways to authenticate users and devices arises. To meet this goal, in view of current security issues of mobile terminals, we analyzed the idea of trusted computing, describe the user authentication model of TCG(Trusted Computing Group)...
The main weakness of passwords is that it is vulnerable to dictionary attacks implemented by automated programs. As the EKE protocol could resist the offline dictionary attack and the CAPTCHA could avoid automatic on-line dictionary attack implemented by the attacker, in this paper, based on the two protocols, we proposed the hybrid password authentication protocols. Our new password authentication...
This paper analyzed the shortages of S/KEY OTP system in mobile commerce identity authentication and suggested an improved one-time password system based on bidirectional virtual authorization in mobile application systems. On one hand, this suggestion can reduce the calculation stress of both client and server, accordingly increases the efficiency of authorization and withstands the DoS attack. On...
This paper describes a new type of authentication protocol and a system based on the protocol. Input transformation module is an universal service program installed in the client's. The module putout distinct output password or account for different website according to the same original user password or account and the secret website's identification code, And then, by using non-symmetric encryption,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.