A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is application/pdf
.
Filters
Dynamic Identity Based Authentication Protocol for Two-Server Architecture
2012
Journal of Information Security
In 2009, Liao and Wang proposed a dynamic identity based remote user authentication protocol for multi-server environment. ...
This paper presents a novel dynamic identity based authentication protocol for multi-server architecture using smart cards that resolves the aforementioned flaws, while keeping the merits of Liao and Wang's ...
On receiving the message (M i k 1, N k ), the malicious server S J computes In this section, we propose a dynamic identity based authentication protocol for multi-server architecture using smart cards ...
doi:10.4236/jis.2012.34040
fatcat:im3qkyungzg7pmwg4ksvekj5eu
A Secure Dynamic Identity based Single Sign-On Authentication Protocol
2014
Journal of Software
So we propose a secure dynamic identify based Single Sign-On authentication protocol using smart card. ...
In the current Internet world, most of the Internet services are based on the single server model and use the password identity authentication to provide application service for the users, this means that ...
In the same year, Li Xiong et al. proposed an efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards on the basis of Sood et al.' ...
doi:10.4304/jsw.9.1.154-161
fatcat:lhaobizinzbldocicgwi7tw33i
Security authentication of 3G-WLAN interworking
2006
20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)
Then, we present two schemes by applying authentication based on EAP-TLS (Extensible Authentication Protocol -Transport Layer Security) and EAP-TTLS (Tunneled TLS) into integrated 3G and WLAN to achieve ...
high end-to-end security and authentication for the users. ...
Fig. 4 shows a typical EAP-TTLS authentication protocol, which is composed of the TLS protocol for the purpose of server authentication and the passwordbased protocol such as CHAP for the purpose of client ...
doi:10.1109/aina.2006.300
dblp:conf/aina/ZhaoLY06
fatcat:capc2vww7rcwpok5lurteh3jha
Security Enhancement on a Lightweight Authentication Scheme with Anonymity for Fog Computing Architecture
2020
IEEE Access
This paper proposes a secure authentication scheme for dynamic key generation capability, which can enhance the security of the entire heterogeneous network without the constraints on device types, attributes ...
During the authentication process, the cloud device (e.g., the server) uses the pseudonym information to match the recorded random numbers. ...
CONCLUSION In this paper, we propose a protocol that can authenticate devices and dynamically generate session key in FC architecture. ...
doi:10.1109/access.2020.2996264
fatcat:6t75ptphu5coxdzva6krxv6mk4
Global identity management of virtual machines based on remote secure elements
2014
2014 International Conference on Computer, Information and Telecommunication Systems (CITS)
The SecFuNet identity model addresses two kinds of elements: users and nodes. For each of them an identity platform is provided dealing with OpenID Server, and grids of secure elements. ...
The objective is to develop a highly secure identification scheme based on Authentication and Authorization Infrastructures. ...
We also thank CAPES for the financial support with PhD scholarship. ...
doi:10.1109/cits.2014.6878954
dblp:conf/cits/Aissaoui-Mehrez14
fatcat:bq762mst7zbqvhkyfz2j3hrgkm
Enhance Efficiency of EAP-TTLS Protocol Through the Simultaneous Use of Encryption and Digital Signature Algorithms
2017
International journal of network security and its applications
As a result, this article aimed to introduce a new security solution for cloud computing environments through employing the EAP-TTLS protocol, replacing the common Data Encryption Algorithm (DEA) with ...
This process blocks attacks where the objective is to authenticate a user and when the user requests for cloud computing services. ...
This protocol transmits authentication messages between the supplicant and the authentication server [1] . • Extensible Authentication Protocol (EAP) over LAN: Each EAP-based protocol defines a way to ...
doi:10.5121/ijnsa.2017.9404
fatcat:hixsordowfe3pf56crigvxtjny
Role-Based Access Control on the Web Using LDAP
[chapter]
2002
Database and Application Security XV
This paper gives a framework for hc;>w to leverage Lightweight Directory Access Protocol (LDAP) to implement Role-based Access Control (RBAC) on the Web in the server-pult architecture. ...
The role information in the role server is referred to by Web servers for access control purposes through LDAP in a secure manner (over SSL). ...
Park and Sandhu identified two different approaches for obtaining user's attributes· on the Web: user-pull and server-pull architectures [PS99] . ...
doi:10.1007/978-0-387-35587-0_2
fatcat:f4oryi2ujbgwjbge7gupy6ggfu
Secure authentication system for public WLAN roaming
2003
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03
This is dominated primarily by our use of industry-standard XML-based protocols, yet are still small enough for practical use. ...
We have designed and implemented a comprehensive single sign-on (SSO) authentication architecture that confederates WLAN service providers through trusted identity providers. ...
Two of the authentication servers act as service providers and other two act as identity providers, and the last acts as an 802.1X authentication server. ...
doi:10.1145/941326.941343
dblp:conf/wmash/MatsunagaMSK03
fatcat:zgvge7s7bjgqvdppqobo5ilbuy
Secure Authentication System for Public WLAN Roaming
2005
Journal on spesial topics in mobile networks and applications
This is dominated primarily by our use of industry-standard XML-based protocols, yet are still small enough for practical use. ...
We have designed and implemented a comprehensive single sign-on (SSO) authentication architecture that confederates WLAN service providers through trusted identity providers. ...
Two of the authentication servers act as service providers and other two act as identity providers, and the last acts as an 802.1X authentication server. ...
doi:10.1007/s11036-005-6428-y
fatcat:7cmrartqong5zd7x4xumubea3q
A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment
[article]
2010
arXiv
pre-print
In the proposed protocol, the password is interpreted and alienated into more than one unit and these units are stored in two different servers, namely, Authentication Server and Backend Server. ...
The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. ...
We also thank the management of Sri Ramakrishna College of engineering for their support. ...
arXiv:1001.1975v1
fatcat:2kjb3xa4azazxeegd4qlzmsb7m
Authentication protocols for ad hoc networks
2005
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks - Q2SWinet '05
We also motivate the need for an authentication management architecture and discuss some open research issues. ...
Consequently, authentication is a precursor to any secure interactions in these networks. Recently, numerous authentication protocols have been proposed for ad hoc networks. ...
Credentials can be classified into two classes: identity-based and context-based. ...
doi:10.1145/1089761.1089777
dblp:conf/mswim/AboudaggaREDQ05
fatcat:l2ae7xi3kzdpvcwvatols3qnhi
An Integrated Accounting and Charging Architecture for Mobile Grids
2006
2006 3rd International Conference on Broadband Communications, Networks and Systems
Based on the relevant set of requirements derived, a new and extended A4C Architecture (Authentication, Authorization, Accounting, Auditing, Charging) has been developed, implemented, and evaluated for ...
Additionally, using the same communication protocols and standard interfaces, enables different providers to coordinate any type of resources in Virtual Organizations (VO) and supports the composition ...
If it proves to be valid, the A4C Server can return the real identity of the user or a virtual identity, based on previously defined policies.
B. ...
doi:10.1109/broadnets.2006.4374430
dblp:conf/broadnets/MorariuWS06
fatcat:zwapmedw6rbl7oq6wnjoacbaby
Kerberized handover keying
2007
Proceedings of first ACM/IEEE international workshop on Mobility in the evolving internet architecture - MobiArch '07
With the proposed architecture, signaling for key distribution is based on re-keying and is decoupled from re-authentication that requires EAP (Extensible Authentication Protocol) and AAA (Authentication ...
This paper proposes a media-independent handover key management architecture that uses Kerberos for secure key distribution among a server, an authenticator, and a mobile node. ...
By establishing "inter-realm" keys, the administrators of two realms can allow a client authenticated in the local realm to prove its identity to the servers in other realms. ...
doi:10.1145/1366919.1366932
fatcat:tk3sm3uovjf5vdtdjhn5d5oakm
Secure authentication system for public WLAN roaming
2003
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03
This is dominated primarily by our use of industrystandard XML-based protocols, yet are still small enough for practical use. ...
We have designed and implemented a comprehensive single sign-on (SSO) authentication architecture that confederates WLAN service providers through trusted identity providers. ...
Two of the authentication servers act as service providers and other two act as identity providers, and the last acts as an 802.1X authentication server. ...
doi:10.1145/941340.941343
fatcat:37j26yjopbb5xchetvdtidlnuq
A distributed authentication architecture and protocol
2017
Tehnički Vjesnik
Each server independently performs its own authentication of the user, for example by asking the user to complete a challenge in order to prove his claim to a digital identity. ...
The proposed architecture allows each server to use any authentication factor. ...
We also note that the proposed architecture has no single point of compromise. Also, the same DAS can be used in two different modes by two different FAS servers. ...
doi:10.17559/tv-20151114105745
fatcat:2cmps37kn5eztpzv7oj5c57gii
« Previous
Showing results 1 — 15 out of 21,488 results