Filters








21,488 Hits in 9.4 sec

Dynamic Identity Based Authentication Protocol for Two-Server Architecture

Sandeep K. Sood
2012 Journal of Information Security  
In 2009, Liao and Wang proposed a dynamic identity based remote user authentication protocol for multi-server environment.  ...  This paper presents a novel dynamic identity based authentication protocol for multi-server architecture using smart cards that resolves the aforementioned flaws, while keeping the merits of Liao and Wang's  ...  On receiving the message (M i k 1, N k ), the malicious server S J computes  In this section, we propose a dynamic identity based authentication protocol for multi-server architecture using smart cards  ... 
doi:10.4236/jis.2012.34040 fatcat:im3qkyungzg7pmwg4ksvekj5eu

A Secure Dynamic Identity based Single Sign-On Authentication Protocol

Qingqi Pei, Jie Yu
2014 Journal of Software  
So we propose a secure dynamic identify based Single Sign-On authentication protocol using smart card.  ...  In the current Internet world, most of the Internet services are based on the single server model and use the password identity authentication to provide application service for the users, this means that  ...  In the same year, Li Xiong et al. proposed an efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards on the basis of Sood et al.'  ... 
doi:10.4304/jsw.9.1.154-161 fatcat:lhaobizinzbldocicgwi7tw33i

Security authentication of 3G-WLAN interworking

Yao Zhao, Chuang Lin, Hao Yin
2006 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)  
Then, we present two schemes by applying authentication based on EAP-TLS (Extensible Authentication Protocol -Transport Layer Security) and EAP-TTLS (Tunneled TLS) into integrated 3G and WLAN to achieve  ...  high end-to-end security and authentication for the users.  ...  Fig. 4 shows a typical EAP-TTLS authentication protocol, which is composed of the TLS protocol for the purpose of server authentication and the passwordbased protocol such as CHAP for the purpose of client  ... 
doi:10.1109/aina.2006.300 dblp:conf/aina/ZhaoLY06 fatcat:capc2vww7rcwpok5lurteh3jha

Security Enhancement on a Lightweight Authentication Scheme with Anonymity for Fog Computing Architecture

Lin Wang, Haonan An, Zhuo Chang
2020 IEEE Access  
This paper proposes a secure authentication scheme for dynamic key generation capability, which can enhance the security of the entire heterogeneous network without the constraints on device types, attributes  ...  During the authentication process, the cloud device (e.g., the server) uses the pseudonym information to match the recorded random numbers.  ...  CONCLUSION In this paper, we propose a protocol that can authenticate devices and dynamically generate session key in FC architecture.  ... 
doi:10.1109/access.2020.2996264 fatcat:6t75ptphu5coxdzva6krxv6mk4

Global identity management of virtual machines based on remote secure elements

Hassane Aissaoui-Mehrez, Pascal Urien, Guy Pujolle
2014 2014 International Conference on Computer, Information and Telecommunication Systems (CITS)  
The SecFuNet identity model addresses two kinds of elements: users and nodes. For each of them an identity platform is provided dealing with OpenID Server, and grids of secure elements.  ...  The objective is to develop a highly secure identification scheme based on Authentication and Authorization Infrastructures.  ...  We also thank CAPES for the financial support with PhD scholarship.  ... 
doi:10.1109/cits.2014.6878954 dblp:conf/cits/Aissaoui-Mehrez14 fatcat:bq762mst7zbqvhkyfz2j3hrgkm

Enhance Efficiency of EAP-TTLS Protocol Through the Simultaneous Use of Encryption and Digital Signature Algorithms

Seyed Milad Dejamfar, Sara Najafzadeh
2017 International journal of network security and its applications  
As a result, this article aimed to introduce a new security solution for cloud computing environments through employing the EAP-TTLS protocol, replacing the common Data Encryption Algorithm (DEA) with  ...  This process blocks attacks where the objective is to authenticate a user and when the user requests for cloud computing services.  ...  This protocol transmits authentication messages between the supplicant and the authentication server [1] . • Extensible Authentication Protocol (EAP) over LAN: Each EAP-based protocol defines a way to  ... 
doi:10.5121/ijnsa.2017.9404 fatcat:hixsordowfe3pf56crigvxtjny

Role-Based Access Control on the Web Using LDAP [chapter]

Joon S. Park, Gail-Joon Ahn, Ravi Sandhu
2002 Database and Application Security XV  
This paper gives a framework for hc;>w to leverage Lightweight Directory Access Protocol (LDAP) to implement Role-based Access Control (RBAC) on the Web in the server-pult architecture.  ...  The role information in the role server is referred to by Web servers for access control purposes through LDAP in a secure manner (over SSL).  ...  Park and Sandhu identified two different approaches for obtaining user's attributes· on the Web: user-pull and server-pull architectures [PS99] .  ... 
doi:10.1007/978-0-387-35587-0_2 fatcat:f4oryi2ujbgwjbge7gupy6ggfu

Secure authentication system for public WLAN roaming

Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuki, Randy H. Katz
2003 Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03  
This is dominated primarily by our use of industry-standard XML-based protocols, yet are still small enough for practical use.  ...  We have designed and implemented a comprehensive single sign-on (SSO) authentication architecture that confederates WLAN service providers through trusted identity providers.  ...  Two of the authentication servers act as service providers and other two act as identity providers, and the last acts as an 802.1X authentication server.  ... 
doi:10.1145/941326.941343 dblp:conf/wmash/MatsunagaMSK03 fatcat:zgvge7s7bjgqvdppqobo5ilbuy

Secure Authentication System for Public WLAN Roaming

Ana Sanz Merino, Yasuhiko Matsunaga, Manish Shah, Takashi Suzuki, Randy H. Katz
2005 Journal on spesial topics in mobile networks and applications  
This is dominated primarily by our use of industry-standard XML-based protocols, yet are still small enough for practical use.  ...  We have designed and implemented a comprehensive single sign-on (SSO) authentication architecture that confederates WLAN service providers through trusted identity providers.  ...  Two of the authentication servers act as service providers and other two act as identity providers, and the last acts as an 802.1X authentication server.  ... 
doi:10.1007/s11036-005-6428-y fatcat:7cmrartqong5zd7x4xumubea3q

A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment [article]

V. Ruckmani, Dr G Sudha Sadasivam
2010 arXiv   pre-print
In the proposed protocol, the password is interpreted and alienated into more than one unit and these units are stored in two different servers, namely, Authentication Server and Backend Server.  ...  The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed.  ...  We also thank the management of Sri Ramakrishna College of engineering for their support.  ... 
arXiv:1001.1975v1 fatcat:2kjb3xa4azazxeegd4qlzmsb7m

Authentication protocols for ad hoc networks

Nidal Aboudagga, Mohamed Tamer Refaei, Mohamed Eltoweissy, Luiz A. DaSilva, Jean-Jacques Quisquater
2005 Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks - Q2SWinet '05  
We also motivate the need for an authentication management architecture and discuss some open research issues.  ...  Consequently, authentication is a precursor to any secure interactions in these networks. Recently, numerous authentication protocols have been proposed for ad hoc networks.  ...  Credentials can be classified into two classes: identity-based and context-based.  ... 
doi:10.1145/1089761.1089777 dblp:conf/mswim/AboudaggaREDQ05 fatcat:l2ae7xi3kzdpvcwvatols3qnhi

An Integrated Accounting and Charging Architecture for Mobile Grids

Cristian Morariu, Martin Waldburger, Burkhard Stiller
2006 2006 3rd International Conference on Broadband Communications, Networks and Systems  
Based on the relevant set of requirements derived, a new and extended A4C Architecture (Authentication, Authorization, Accounting, Auditing, Charging) has been developed, implemented, and evaluated for  ...  Additionally, using the same communication protocols and standard interfaces, enables different providers to coordinate any type of resources in Virtual Organizations (VO) and supports the composition  ...  If it proves to be valid, the A4C Server can return the real identity of the user or a virtual identity, based on previously defined policies. B.  ... 
doi:10.1109/broadnets.2006.4374430 dblp:conf/broadnets/MorariuWS06 fatcat:zwapmedw6rbl7oq6wnjoacbaby

Kerberized handover keying

Yoshihiro Ohba, Subir Das, Ashutosh Dutta
2007 Proceedings of first ACM/IEEE international workshop on Mobility in the evolving internet architecture - MobiArch '07  
With the proposed architecture, signaling for key distribution is based on re-keying and is decoupled from re-authentication that requires EAP (Extensible Authentication Protocol) and AAA (Authentication  ...  This paper proposes a media-independent handover key management architecture that uses Kerberos for secure key distribution among a server, an authenticator, and a mobile node.  ...  By establishing "inter-realm" keys, the administrators of two realms can allow a client authenticated in the local realm to prove its identity to the servers in other realms.  ... 
doi:10.1145/1366919.1366932 fatcat:tk3sm3uovjf5vdtdjhn5d5oakm

Secure authentication system for public WLAN roaming

Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuki, Randy H. Katz
2003 Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03  
This is dominated primarily by our use of industrystandard XML-based protocols, yet are still small enough for practical use.  ...  We have designed and implemented a comprehensive single sign-on (SSO) authentication architecture that confederates WLAN service providers through trusted identity providers.  ...  Two of the authentication servers act as service providers and other two act as identity providers, and the last acts as an 802.1X authentication server.  ... 
doi:10.1145/941340.941343 fatcat:37j26yjopbb5xchetvdtidlnuq

A distributed authentication architecture and protocol

2017 Tehnički Vjesnik  
Each server independently performs its own authentication of the user, for example by asking the user to complete a challenge in order to prove his claim to a digital identity.  ...  The proposed architecture allows each server to use any authentication factor.  ...  We also note that the proposed architecture has no single point of compromise. Also, the same DAS can be used in two different modes by two different FAS servers.  ... 
doi:10.17559/tv-20151114105745 fatcat:2cmps37kn5eztpzv7oj5c57gii
« Previous Showing results 1 — 15 out of 21,488 results