The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to achieve secure authentication, an asynchronous challenge-response authentication solution is proposed. SD key, encryption cards or encryption machine provide encryption service. Hash function, symmetric algorithm and combined secret key method are adopted while authenticating. The authentication security is guaranteed due to the properties of hash function, combined secret key method and...
In this information age, providing security over the Internet is a major issue. Internet security is all about trust at a remote distance, because we are dealing with everyone remotely and not able to confirm identity or authenticity in the traditional sense. To increase the password authentication a scheme was proposed by Chun-Ta Li which is basically a smart card-based password authentication and...
This paper aims at creation of a voting system by providing a cost effective solution to the government along with ensuring non-traceability and integrity of the votes cast while providing great convenience to voters. This system is developed robustly to ensure that all eligible voters having a Universal Identification Number of their country (For Example the Smart Card in USA) is allowed to cast...
One of the most commonly used two-factor user authentication mechanisms nowadays is based on smart card and personal identity number or password. A scheme of this type is usually known as, a smart card based password authentication. The core feature of such a scheme is to enforce two-factor authentication in the sense that, the client must have the smart card and know the card PIN number in order...
Authentication and key agreement protocols are the essential guardians of the distributed applications. They help the servers and users establish mutual trust and create secure communication channels. In this paper, we propose an authentication and key agreement scheme that is secure and has low communication and computation costs. Besides its efficiency, the most significant feature of the scheme...
To conduct secure communications in wireless networks, clients must create safer keys from the recorded less secure passwords -- known as Password-Authenticated Key Exchange (PAKE). As attacker capability has evolved quickly, PAKE protocols must progress with time to fight against possible attacks. This paper makes an analytical survey on current cross-realm client-to-client (C2C) PAKE protocols and...
Nowadays, the authentication methods of physical access control such as key, smart card, and OTP (One Time Password) card require extra hardware, and it is not easy to be aware of if they are lost because of the low using rate. Nowadays, mobile phone is one of the most common used and carry-on device. It would be detected in a shorter time when a mobile phone is lost because it was frequently used...
Electronic data access control in conventional digital rights management (DRM) systems is not suitable for company oriented DRM systems. Many enterprise digital rights management (EDRM) systems have therefore been developed, aiming to fulfill the requirements of companies. Using such systems, companies are able to regulate their digital content, allowing only authorized users to access and execute...
Chun-I-Fan and Yi-Hui-Lin proposed a remote three-factor authentication scheme in 2009 based on smart card, password and biometric. The scheme emphasized mainly on the privacy protection of biometrics This paper emphasizes on the flaws of their scheme as well as proposes an improved secure three-factor authentication protocol which addresses the concerns of user's privacy, template protection and...
Near Field Communication (NFC) is a short-range communication technology and has been applied around the world. The most common service of NFC will be micropayments. Technically, the card emulation mode of NFC will simulate mobile devices such as cell phones into stored value cards, and then debit from external readers. Apart from simulating cell phones as stored value cards, read-write mode of NFC...
In this paper, we evaluate the security properties of multi-factor biometric authentication (MFBA) and define the notion of User Privacy, where the biometrics is assumed as a set of features that can be either ordered or unordered depending on the biométrie modality. We propose efficient schemes for MFBA, which do not incorporate secure sketches, thus, different template extraction methods are applicable...
A digital documents management scheme based on three-layer structure is presented. Symmetric cryptography, combined key and hardware encryption technology are adopted to implement the functions of encryption, digital signature, authentication and authorization. Therefore, the security of digital documents is guaranteed. Documents management system based on the above technique can be easily integrated...
With the popularity of the third-generation and fourth-generation mobile phone services, the security of m-commerce operations already received more attentions. At present, the security mechanism of m-commerce operations rely on the encryption technology of subscriber identity module (SIM) card or the smart card textual password. Despite its security mechanism is stronger than the current Internet,...
This paper describes the design and implementation of a secure, high assurance and very reliable Email system. The system handles standard Email security services - signing and encryption of Email letters and, in addition, provides a number of extended and innovative security features. These new features are: transparent handling of certificates, strong authentication between Secure Email client and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.