Results 1 - 10
of
31,644
Table 5: Authentication Methods for authentication service
"... In PAGE 2: ... For task minimum authentication security level required is 0.2 and this is compared with security level and corresponding overhead given in Table5 . Incase security requirement does not directly match with table value next higher security level is being considered.... In PAGE 5: ... The authentication service insured that all task must be submitted by authorized users. Three authentication methods are used in paper which is shown in Table5 where each authentication method is assigned a security level value. Security level of a required authentication method (other than given in table 4) can be calculated using equation 5.... In PAGE 9: ... These results are shown in the table 5. Table5 : Feasibility analysis after improvement phase with modified approach Task Authentication overhead(security value) Confidentiality overhead(security value) Integrity overhead(security value) Finish time ( +Overhead+ wi ) Deadli ne 90(0.2) 5.... ..."
Table 13 - Content of the New-AP-ACK-Authenticator...........................................................................................47 40
2002
"... In PAGE 51: ....8.13 New-AP-ACK-Authenticator (48-byte) 24 The New-AP-ACK-Authenticator information element contains a date/time stamp, an ACK nonce and an HMAC authentication 25 block. 26 Table13 - Content of the New-AP-ACK-Authenticator 27 Length Information 8 Date/Time stamp 32 ACK nonce 16 HMAC authentication block 28 6.8.... ..."
Table 13 - Content of the New-AP-ACK-Authenticator 27
2002
"... In PAGE 4: ...able 12 - IAPP Information Elements .........................................................................................................................46 39 Table13 - Content of the New-AP-ACK-Authenticator.... ..."
Table 3. SAP v3 authentication protocol
"... In PAGE 5: ...4.2 SAP v3 authentication The protocol of SAP v3 is shown in Table3 . This quick 2- way SAP authentication (steps 1-5) temporarily associates MT with the new AP.... ..."
Table 12 - ESP Authentication Algorithm Identifiers 3
"... In PAGE 4: ...able 11 - ESP Authentication Algorithm Identifiers ................................................................................................55 44 Table12 - IAPP Information Elements .... In PAGE 48: ....3.7.5 Supported-ESP-Authentication-Algorithms 9 The Supported-ESP-Authentication-Algorithms VSA is a list of consecutive one-byte values that are ISAKMP ESP 10 Authentication IDs corresponding to the ESP Authentication algorithms supported by this AP (see Table12 for values). 11 5.... In PAGE 49: ....3.7.12 ESS-ESP-Authentication-ID 6 The ESS-ESP-Authentication-ID VSA is a one-byte attribute that denotes the ESP Authentication algorithm chosen by the 7 RADIUS server for authenticating the ADD-Notify packets, using values selected from Table12 . The selected authentication 8 algorithm is also used to authenticate the New-BSSID-Security-Block and Old-BSSID-Security-Block attributes sent in the 9 RADIUS packets.... ..."
Table 11 - ESP Authentication Algorithm Identifiers 1
2002
"... In PAGE 4: ...able 10 - ESP Transform Identifiers............................................................................................................................44 37 Table11 - ESP Authentication Algorithm Identifiers .... In PAGE 40: ....3.7.5 Supported-ESP-Authentication-Algorithms 9 The Supported-ESP-Authentication-Algorithms VSA is a list of consecutive one-byte values that are ISAKMP ESP 10 Authentication IDs corresponding to the ESP Authentication algorithms supported by this AP (see Table11 for values). 11 5.... In PAGE 41: ....3.7.12 ESS-ESP-Authentication-ID 6 The ESS-ESP-Authentication-ID VSA is a one-byte attribute that denotes the ESP Authentication algorithm chosen by the 7 RADIUS server for authenticating the ADD-Notify packets, using values selected from Table11 . The selected authentication 8 algorithm is also used to authenticate the New-BSSID-Security-Block and Old-BSSID-Security-Block attributes sent in the 9 RADIUS packets.... ..."
Table 1 Methods for personal authentication using palmprint
2004
"... In PAGE 2: ... A detailed de- scription of these approaches is beyond the scope of this paper. However a summary of these approaches with the typical references can be seen in Table1 . Researchers have shown promising results on inked images [2], images ac- quired directly from the scanner [3] and images acquired from digital camera [4] using constrained pegged setup.... In PAGE 2: ... Therefore this paper utilizes such images to inves- tigate the performance improvement. A summary of prior work in Table1 shows that there has not been any attempt to investigate the palmprint authentication using its multiple representations. Several matching score level fusion strategies for com- bining various biometric modalities have been presented in the literature.... ..."
Table 6: Guidelines for an Authentication Attribute Certificate.
1998
"... In PAGE 58: ... If additional fields are added (such as extensions) simply add the length of the new field to the total. Table 5: Contents of Attribute Cert - Identification amp; Authentication Cert item item size # of items Total Size version 5 octets 1 5 octets owner (baseCertificateID) 8 octets 1 8 octets issuer (AA) 183 octets 1 183 octets signature 9 octets 1 9 octets serialNumber 6 octets 1 6 octets validity 32 octets 1 32 octets authenticationInfo -biometricInfo 500 octets 1 500 octets issuerUniqueID (Token Serial #) 16 octets 1 16 octets algorithmIdentifier 9 octets 1 9 octets signatureValue 70 octets 1 70 octets Total 838 octets Table6 : Contents of CertHost item item size # of items Total Size version 5 octets 1 5 octets serialNumber 6 octets 1 6 octets signature 9 octets 1 9 octets issuer 183 octets 1... In PAGE 59: ...Appendix D: Certificates 9/28/98 17 validity 32 octets 1 32 octets subject 183 octets 1 183 octets subjectPublicKeyInfo 82 octets 1 82 octets algorithmIdentifier 9 octets 1 9 octets signatureValue 70 octets 1 70 octets Total 579 octets Table6 : Contents of CertHost item item size # of items... ..."
Table 2. Development of somatosensory response properties in multisensory SC neurons
1997
Cited by 4
Results 1 - 10
of
31,644