Zobrazeno 1 - 10
of 1 305
pro vyhledávání: '"password authentication"'
Publikováno v:
IEEE Access, Vol 11, Pp 18121-18133 (2023)
The regular PIN-entry method has been still the most common method of authentication for systems and networks. However, PINs are easy to be captured through various attacks, including shoulder-surfing, video-recording, and spyware. This could be attr
Externí odkaz:
https://doaj.org/article/89295dc3c03b41a3a6d77435cbc5bbb7
Publikováno v:
Symmetry, Vol 15, Iss 9, p 1750 (2023)
With the rapid development of quantum theory, the discrete logarithm problem and significant integer factorization problem have polynomial solution algorithms under quantum computing, and their security is seriously threatened. Therefore, a three-par
Externí odkaz:
https://doaj.org/article/ffb1666f039648ee8c87783e9a5de9c0
Publikováno v:
Sensors, Vol 23, Iss 15, p 6685 (2023)
The paper addresses issues concerning secure authentication in computer systems. We focus on multi-factor authentication methods using two or more independent mechanisms to identify a user. User-specific behavioral biometrics is widely used to increa
Externí odkaz:
https://doaj.org/article/ebe217952f1544ed8e30075db7f2cf8d
Autor:
M. N. Bobov, A. V. Kurylovich
Publikováno v:
Informatika, Vol 17, Iss 3, Pp 64-71 (2020)
The article discusses distributed infocommunication networks, in which the interaction of users, application servers and databases is carried out. When accessing an infocommunication network, the first procedure is to authenticate the agents through
Externí odkaz:
https://doaj.org/article/2e95ae700ff74cd2a105b806a7154ad9
Publikováno v:
IEEE Access, Vol 9, Pp 10925-10939 (2021)
In this paper, to increase the attack success rate, we analyzed the distribution of all collected keyboard data based on the distance of time and keyboard scancode data, which presents the crucial data from the previous study. To achieve this, we der
Externí odkaz:
https://doaj.org/article/5d57da8278a54d08968536a5f85faeee
Publikováno v:
International Journal of Applied Mathematics and Computer Science, Vol 29, Iss 4, Pp 797-815 (2019)
Password-authenticated key exchange (PAKE) protocols allow users sharing a password to agree upon a high entropy secret. Thus, they can be implemented without complex infrastructures that typically involve public keys and certificates. In this paper,
Externí odkaz:
https://doaj.org/article/b2c701af66ca409eb3dec6a80e50f5eb
Autor:
Fairuz Shohaimay, Eddie Shahril Ismail
Publikováno v:
Mathematics, Vol 11, Iss 1, p 5 (2022)
The remote authentication scheme is a cryptographic protocol incorporated by user–server applications to prevent unauthorized access and security attacks. Recently, a two-factor authentication scheme using hard problems in elliptic curve cryptograp
Externí odkaz:
https://doaj.org/article/6dee1d274c3c48a7ac9f693bb43c7159
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Mathematical Biosciences and Engineering, Vol 16, Iss 5, Pp 3623-3640 (2019)
Anonymous password-authenticated key exchange (APAKE) allows a client to authenticate herself and to establish a secure session key with a remote server via only a low-entropy password, while keeping her actual identity anonymous to the third party a
Externí odkaz:
https://doaj.org/article/59f8359aef6a441aaf38b424ac3eaaa2
Publikováno v:
IEEE Access, Vol 7, Pp 51014-51027 (2019)
The Internet of Things (IoT) forms a foundation for cyber-physical systems. We propose an efficient and secure authentication scheme for machine-to-machine (M2M) networks in IoT enabled cyber-physical systems. Smart objects and smart devices over CPS
Externí odkaz:
https://doaj.org/article/690ee25ecc3a4557997dd94e12b4c504