Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Aditya Kaushal Ranjan"'
Publikováno v:
Procedia Computer Science. 89:34-42
Security and Privacy is a major concern in IoT and within terminal authentication is a major issue in M2M communications. Here we have proposed a set of protocols and its associated mechanism for terminal authentication in M2M systems in the context
Autor:
Binay Kumar, Aditya Kaushal Ranjan
Publikováno v:
COMPUTE
Generally, user authentication performs through user's Id and password. In this process, user id remains visible and password remains secret. But through shoulder surfing and other attacks, the password can also be traced due to exact password charac
Autor:
Gaurav Somani, Aditya Kaushal Ranjan
Publikováno v:
Computer Communications and Networks ISBN: 9783319331225
This chapter focuses on access control, authentication techniques, and their related aspects with respect to the Internet of Things (IoT). Access control is for managing interaction and communication between users and systems. Authentication is a way
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::546eaadc0b17eac4988dcb0ed721e490
https://doi.org/10.1007/978-3-319-33124-9_12
https://doi.org/10.1007/978-3-319-33124-9_12
Autor:
Binay Kumar, Aditya Kaushal Ranjan
Publikováno v:
ICACCI
In this Paper, we have proposed a new captcha based on digits and symbols. It is based on the facts that it is difficult for the machine to interpret symbols and perform the tasks accordingly from two different datasets. We have also pointed out the
Publikováno v:
2015 Second International Conference on Advances in Computing and Communication Engineering.
Today most of the enterprises are outsourcing their data backups onto online cloud storage, services offered by third party. In such environment, security of offsite data is most prominent requirement. Tang et el. Has proposed, designed and implement
Publikováno v:
2014 International Conference on Contemporary Computing and Informatics (IC3I).
TLS is the cryptographic protocol used in the internet. It consists of set of protocols which are used for negotiation of cryptographic parameters, encryption-decryption and reporting errors during the process. Security Analysis of any cryptographic
Publikováno v:
Procedia Computer Science. :255-262
This paper tries to model the code obfuscation as satisfiability problem. In this paper, we try to develop the model to represent the obfuscated code as the satisfiable problem which could be then checked by the SAT solver to check whether at certain