Zobrazeno 1 - 10
of 2 775
pro vyhledávání: '"Challenge–response authentication"'
Autor:
Krzysztof Gołofit, Piotr Z. Wieczorek
Publikováno v:
Applied Sciences, Vol 9, Iss 5, p 991 (2019)
The concept presented in this paper fits into the current trend of highly secured hardware authentication designs utilizing Physically Unclonable Functions (PUFs) or Physical Obfuscated Keys (POKs). We propose an idea that the PUF cryptographic keys
Externí odkaz:
https://doaj.org/article/36cabd60100d4a398be7b286fb17c0ef
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Kapil Juneja
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 32, Iss 1, Pp 11-23 (2020)
Graphical passwords are already examined as the reliable authentication scheme over the textual passwords. These passwords promise the better robustness and memorability. Various available applications use the image and graphical passwords based auth
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 17:51-64
Challenge-response (CR) is an effective way to authenticate users even if the communication channel is insecure. Traditionally CR authentication relies on one-way hashes and shared secrets to verify the identities of users. Such a method cannot cope
Publikováno v:
Nuclear Engineering and Technology, Vol 51, Iss 7, Pp 1791-1798 (2019)
Instrumentation and Control (I&C) systems of nuclear power plants (NPPs) have been continuously digitalized. These systems have a critical role in the operation of nuclear facilities by functioning as the brain of NPPs. In recent years, as cyber secu
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 16:625-634
Authenticated key exchange (AKE) is one of the most important applications in applied cryptography, where a user interacts with a server to set up a session key where pre-registered information (aka. authentication factor), such as a password or biom
Autor:
Chenglu Jin, Marten van Dijk
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 16:156-173
With the globalization of semiconductor production, out-sourcing IC fabrication has become a trend in various aspects. This, however, introduces serious threats from the entire untrusted supply chain. To combat these threats, Defense Advanced Researc
Publikováno v:
IEEE Systems Journal. 12:3279-3290
We propose a new authentication factor based on network round trip time ( $\rm {NRTT}$ ). We show how $\rm {NRTT}$ can be used to uniquely and securely identify login locations and hence can support location-based web authentication mechanisms. The f
Publikováno v:
ICT Analysis and Applications ISBN: 9789811583537
Challenge–response authentication mechanism (CRAM) is a procedure to verify the genuineness of a claimant entity and involves the claimant to prove that he/she knows a secret without actually revealing it to the verifier. It involves sending a time
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b338c65a190afd20fc03c7d445709ab7
https://doi.org/10.1007/978-981-15-8354-4_57
https://doi.org/10.1007/978-981-15-8354-4_57
Publikováno v:
ICSPCS
In this paper, we propose a physical layer aided authentication and key agreement (PL-AKA) protocol for massive Internet of things (IoT) scenarios. Conventional AKA protocols such as evolved packet system AKA used in long-term evolution (LTE) systems