Literature Review from the year 2015 in the subject Engineering - Computer Engineering, grade: 8.0, Marwadi Education Foundation (GTU), course: Computer Engineering (M.E.), language: English, abstract: In today's insecure world we are surrounded by public channels which are insecure for data transfer to each other. So it requires some type of remote user authentication mechanism to verify the legitimate user. In remote user authentication schemes, the server checks the credentials of the user and decides that the user is legitimate and genuine or not. Remote user also validates the server for mutual authentication purposes. In today's web-enabled world, two parameters are most important which are security and privacy. For that many researchers work on this field and proposed a schemes which is based on different aspects likes password table, biometric and smart card for authenticating the remote user. But these are not enough for perfect remote authentication, so a scheme is required which has stronger and accurate then old existing schemes. To make most reliable scheme, it is important to calculate computational and communication cost. Also it requires resistance against many other threats. For these mutual authentication and communication privacy are most essential requirements for remote user authentication scheme. In this survey, we analyze some papers and make survey on different aspects like types of attacks, computational cost and communication cost.
"Sinopsis" puede pertenecer a otra edición de este libro.
Literature Review from the year 2015 in the subject Engineering - Computer Engineering, grade: 8.0, Marwadi Education Foundation (GTU), course: Computer Engineering (M.E.), language: English, abstract: In today's insecure world we are surrounded by public channels which are insecure for data transfer to each other. So it requires some type of remote user authentication mechanism to verify the legitimate user. In remote user authentication schemes, the server checks the credentials of the user and decides that the user is legitimate and genuine or not. Remote user also validates the server for mutual authentication purposes. In today's web-enabled world, two parameters are most important which are security and privacy. For that many researchers work on this field and proposed a schemes which is based on different aspects likes password table, biometric and smart card for authenticating the remote user. But these are not enough for perfect remote authentication, so a scheme is required which has stronger and accurate then old existing schemes. To make most reliable scheme, it is important to calculate computational and communication cost. Also it requires resistance against many other threats. For these mutual authentication and communication privacy are most essential requirements for remote user authentication scheme. In this survey, we analyze some papers and make survey on different aspects like types of attacks, computational cost and communication cost.
"Sobre este título" puede pertenecer a otra edición de este libro.
Librería: Majestic Books, Hounslow, Reino Unido
Condición: New. Print on Demand pp. 46. Nº de ref. del artículo: 388977350
Cantidad disponible: 4 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - Literature Review from the year 2015 in the subject Engineering - Computer Engineering, grade: 8.0, Marwadi Education Foundation (GTU), course: Computer Engineering (M.E.), language: English, abstract: In today's insecure world we are surrounded by public channels which are insecure for data transfer to each other. So it requires some type of remote user authentication mechanism to verify the legitimate user. In remote user authentication schemes, the server checks the credentials of the user and decides that the user is legitimate and genuine or not. Remote user also validates the server for mutual authentication purposes. In today's web-enabled world, two parameters are most important which are security and privacy.For that many researchers work on this field and proposed a schemes which is based on different aspects likes password table, biometric and smart card for authenticating the remote user. But these are not enough for perfect remote authentication, so a scheme is required which has stronger and accurate then old existing schemes. To make most reliable scheme, it is important to calculate computational and communication cost.Also it requires resistance against many other threats. For these mutual authentication and communication privacy are most essential requirements for remote user authentication scheme. In this survey, we analyze some papers and make survey on different aspects like types of attacks, computational cost and communication cost. Nº de ref. del artículo: 9783668152717
Cantidad disponible: 1 disponibles
Librería: preigu, Osnabrück, Alemania
Taschenbuch. Condición: Neu. An Improved Three Factor Remote User Authentication Scheme Using Smart Card. A Review | Manish Shingala (u. a.) | Taschenbuch | 44 S. | Englisch | 2016 | GRIN Verlag | EAN 9783668152717 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu. Nº de ref. del artículo: 103890242
Cantidad disponible: 5 disponibles