Zobrazeno 1 - 10
of 539
pro vyhledávání: '"Generic Bootstrapping Architecture"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Communications Standards Magazine. 5:142-148
3GPP has finalized the publication of 5G specifications in Release 16, also called 5G phase 2 in 3GPP, which focuses on the enhancements of 5G basis to address more use cases in the 5G ecosystem. In Release 16, 3GPP took into account a variety of ver
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 16:113-126
Motivated by the great potential of implicit and seamless user authentication, we attempt to build an implicit authentication (IA) system with adaptive sampling that automatically selects dynamic sets of activities for user behavior extraction. Vario
Autor:
Rifaat Shekh-Yusef
This document updates RFC 3261 by updating the Digest Access Authentication scheme used by the Session Initiation Protocol (SIP) to add support for more secure digest algorithms, e.g., SHA-256 and SHA-512-256, to replace the obsolete MD5 algorithm.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0f32bd94d825f394b5f8ba0b3547676b
https://doi.org/10.17487/rfc8760
https://doi.org/10.17487/rfc8760
Publikováno v:
Computers & Security. 77:627-641
Due to the ease of use, face authentication could be a promising way to replace hard-to-remember passwords to access web services. However, to make face authentication suitable for web services, there are still several critical security and privacy c
Publikováno v:
Journal of Parallel and Distributed Computing. 118:107-117
Vehicle-to-Grid (V2G) systems promoted by the federated Internet of Things (IoT) technology will be ubiquitous in the future; therefore, it is crucial to provide trusted, flexible and efficient operations for V2G services using high-quality measures
Publikováno v:
IEEE Systems Journal. 12:2039-2042
Recently, Tsai and Lo proposed a privacy aware authentication scheme for distributed mobile cloud computing services. It is claimed that the scheme achieves mutual authentication and withstands all major security threats. However, we first identify t
Publikováno v:
Information and Software Technology. 96:27-37
Context There are many techniques for performing authentication, such as text passwords and biometrics. Combining two factors into one technique is known as multi-factor authentication. The lack of a proper method for comparing and selecting these te
Publikováno v:
IEEE Transactions on Mobile Computing. 17:251-264
User authentication is the critical first step in detecting identity-based attacks and preventing subsequent malicious attacks. However, the increasingly dynamic mobile environments make it harder to always apply cryptographic-based methods for user
Autor:
Asahiko Yamada, Tatsuro Ikeda
Publikováno v:
Computers & Security. 67:324-334
A data structure to enhance PKI (Public Key Infrastructure) authentication is proposed.With the data structure, the PKI authentication server can distinguish the execution environment of PKI authentication.The proposal covers all of the use cases of