Zobrazeno 1 - 10
of 2 169
pro vyhledávání: '"Lightweight Extensible Authentication Protocol"'
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 16:113-126
Motivated by the great potential of implicit and seamless user authentication, we attempt to build an implicit authentication (IA) system with adaptive sampling that automatically selects dynamic sets of activities for user behavior extraction. Vario
Autor:
Chenglu Jin, Marten van Dijk
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 16:156-173
With the globalization of semiconductor production, out-sourcing IC fabrication has become a trend in various aspects. This, however, introduces serious threats from the entire untrusted supply chain. To combat these threats, Defense Advanced Researc
Publikováno v:
IEEE Systems Journal. 12:3279-3290
We propose a new authentication factor based on network round trip time ( $\rm {NRTT}$ ). We show how $\rm {NRTT}$ can be used to uniquely and securely identify login locations and hence can support location-based web authentication mechanisms. The f
The emergence and ubiquity of mobile computing has placed powerful capabilities in one's hand providing a wide range of applications such as email, calendar, photos, browsers, social network, communication, shopping, health and fitness, games etc., w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5bece8f8ab22eb38bc6100de848ab98f
https://doi.org/10.4018/978-1-7998-1204-3.ch062
https://doi.org/10.4018/978-1-7998-1204-3.ch062
Autor:
Ashok Kumar Das, Samiran Chattopadhyay, Athanasios V. Vasilakos, Neeraj Kumar, Santanu Chatterjee, Sandip Roy
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 15:824-839
Multi-server environment is the most common scenario for a large number of enterprise class applications. In this environment, user registration at each server is not recommended. Using multi-server authentication architecture, user can manage authen
Publikováno v:
Computers & Security. 77:627-641
Due to the ease of use, face authentication could be a promising way to replace hard-to-remember passwords to access web services. However, to make face authentication suitable for web services, there are still several critical security and privacy c
Publikováno v:
Journal of Parallel and Distributed Computing. 118:107-117
Vehicle-to-Grid (V2G) systems promoted by the federated Internet of Things (IoT) technology will be ubiquitous in the future; therefore, it is crucial to provide trusted, flexible and efficient operations for V2G services using high-quality measures
Autor:
Mythili Boopathi, M. Aramudhan
Publikováno v:
Alexandria Engineering Journal, Vol 57, Iss 2, Pp 819-829 (2018)
The distributed environment insists the protection of servers, while information sharing is achieved. The conventional biometrics-based password authentication mechanisms use single server, which can be compromised easily. The dual stage authenticati
Publikováno v:
IEEE Systems Journal. 12:2039-2042
Recently, Tsai and Lo proposed a privacy aware authentication scheme for distributed mobile cloud computing services. It is claimed that the scheme achieves mutual authentication and withstands all major security threats. However, we first identify t
Publikováno v:
IEEE Transactions on Intelligent Transportation Systems. 19:1065-1079
Vehicular ad-hoc networks (VANETs) have been researched with regard to enhance driver’s safety and comfort. In VANETs, all vehicles share their status and road conditions with neighboring nodes by periodically generating safety messages. To provide