• 沒有找到結果。

[PDF] Top 20 EFFICIENT DYNAMIC ID-BASED AUTHENTICATION FOR USER ANONIMITY

Has 10000 "EFFICIENT DYNAMIC ID-BASED AUTHENTICATION FOR USER ANONIMITY" found on our website. Below are the top 20 most common "EFFICIENT DYNAMIC ID-BASED AUTHENTICATION FOR USER ANONIMITY".

EFFICIENT DYNAMIC ID-BASED AUTHENTICATION FOR USER ANONIMITY

EFFICIENT DYNAMIC ID-BASED AUTHENTICATION FOR USER ANONIMITY

... Abstract. User authentication is an important technology to guarantee that only the legal users can access resources from the remote ...protect user from tracing, we proposed a new efficient ... See full document

5

An Efficient ID-Based User Identification Scheme for Mutual Authentication in Mobile Environments

An Efficient ID-Based User Identification Scheme for Mutual Authentication in Mobile Environments

... In addition, their scheme cannot accomplish the requirement of mutual authentication because the computation load on the mobile device is too heavy.. Therefore, in this paper, we impro[r] ... See full document

1

Cryptanalysis of Hsiang-Shih’s Secure Dynamic ID Based Remote User Authentication Scheme

Cryptanalysis of Hsiang-Shih’s Secure Dynamic ID Based Remote User Authentication Scheme

... secure dynamic ID based remote user authentication scheme for multi-server ...achieved user's anonym- ity by using secure dynamic ID instead of static ... See full document

4

Security Weaknesses of Two Dynamic ID-based User Authentication and Key Agreement Schemes for Multi-server Environment

Security Weaknesses of Two Dynamic ID-based User Authentication and Key Agreement Schemes for Multi-server Environment

... remote user authentication scheme for multi-server environment provides mutual authentication and session key establishment between users and multiple ...two dynamic ... See full document

8

A Smart Card Based Authentication Scheme for Remote User Login and Verification

A Smart Card Based Authentication Scheme for Remote User Login and Verification

... remote user authentication schemes using smart ...legal user can negotiate a specific session key with his remote authentication server by executing mutual ...room for security ... See full document

23

Advanced Smart Card Based Password Authentication with User Anonymity

Advanced Smart Card Based Password Authentication with User Anonymity

... card based password authentication ...card based password authentication protocol should not only have strong security but also be efficient ...more efficient than previous ... See full document

1

A New Remote User Authentication Scheme based on Bilinear Pairings for Multi-server Environment

A New Remote User Authentication Scheme based on Bilinear Pairings for Multi-server Environment

... remote user authentication scheme using bilinear pairings over elliptic ...password authentication scheme based on bilinear pairings for multi-serve ...the efficient computation ... See full document

9

An Efficient and Secure User Authentication Scheme for Multi-server Environments 謝燦榮、曹偉駿

An Efficient and Secure User Authentication Scheme for Multi-server Environments 謝燦榮、曹偉駿

... An authentication scheme is often used to verify the user’s ...the user’s authentication message is stored in the server, which is easily vulnerable to stolen the verifier attack and ... See full document

3

An efficient authentication protocol for mobile networks

An efficient authentication protocol for mobile networks

... intra-domain authentication protocol, which efficiently supports both initial and subsequent ...authentication. Based on the existence of continuous and transparent mobile network layer protocols ... See full document

16

Lip Reading-based User Authentication through Acoustic Sensing on Smartphones

Lip Reading-based User Authentication through Acoustic Sensing on Smartphones

... reading-based user authenti- cation system, LipPass, by extracting unique behavioral char- acteristics of users’ speaking mouths through acoustic sensing on ...support user authentication in ... See full document

14

AN EFFICIENT AND SECURE ELECTRONIC SUBSCRIPTION SYSTEM WITH USER AUTHENTICATION 邱信富、曹偉駿

AN EFFICIENT AND SECURE ELECTRONIC SUBSCRIPTION SYSTEM WITH USER AUTHENTICATION 邱信富、曹偉駿

... COEXIST. BASED ON THE PRINCIPLE OF "USAGE-BASED PAYMENT", THE THESIS DEVELOPS AN ELECTRONIC SUBSCRIPTION SYSTEM PERMITTING USERS TO PAY FOR THE RIGHTS OF READING PART OF ELECTRONIC PERIODICALS ... See full document

3

An ID-based remote user authentication scheme without using smart cards for multi-server environment

An ID-based remote user authentication scheme without using smart cards for multi-server environment

... remote user authentication scheme using smart cards for multi-server environment has been received much attention ...an ID-based remote user authentication scheme without ... See full document

10

Efficient User Authentication and Key Agreement With Privacy Protection

Efficient User Authentication and Key Agreement With Privacy Protection

... two user authentication and key agreement schemes with privacy protection for single server and multi-server ...cost for user au- thentication by only using symmetric cryp- tosystems ... See full document

15

Provably Secure ID-based Mutual Authentication and Key Agreement for Multi-server Environment

Provably Secure ID-based Mutual Authentication and Key Agreement for Multi-server Environment

... mutual authentication and key agreement for multi -server environment and low-power mobile ...model for multi-server environ- ment. We then propose two ID-based mutual authentica- tion ... See full document

12

Efficient GSM Authentication and Key Agreement Protocols with Robust User Privacy Protection

Efficient GSM Authentication and Key Agreement Protocols with Robust User Privacy Protection

... Mutual authentication, Network security, Mobile security ...illegal user enters the territory of the radio interface of a network provider, he is easy to intercept the transferred messages over this radio ... See full document

6

An ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem

An ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem

... remote user authentication schemes are implemented on elliptic curve cryptosystem (ECC) to reduce the computation loads for mobile ...remote user authentication schemes on ECC are ... See full document

1

FingerPass: Finger Gesture-based Continuous User               Authentication for Smart Homes Using Commodity WiFi

FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi

... of user authentication to not only protecting user privacy but also facilitating personalized services to ...integrate user authentication with human-computer in- teractions between ... See full document

10

A Remote User Authentication Scheme Based on Strong Graphical Passwords

A Remote User Authentication Scheme Based on Strong Graphical Passwords

... remote user strong-password authentication schemes have the common drawback that the user has to memorize a hard-to-remember textual password, and therefore their applications are ...remote ... See full document

6

Efficient Computation of the Weil Pairing in ID-based Cryptosystems

Efficient Computation of the Weil Pairing in ID-based Cryptosystems

... in ID-based Cryptosystems Abstract - Although identity-based (ID-based) cryptography has a number of advantages over conventional public key methods; the computational cost is ... See full document

5

An Efficient Image Authentication Method Based on Hamming Code

An Efficient Image Authentication Method Based on Hamming Code

... According to our experimental results, our new hybrid method can effectively eliminate burst bit errors, and our recovered pixels in detail areas can actually gain very high clarity.. [r] ... See full document

1

Show all 10000 documents...