• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,584
Next 10 →

The Battle Against Phishing: Dynamic Security Skins

by Rachna Dhamija, J. D. Tygar - IN SOUPS ’05: PROCEEDINGS OF THE 2005 SYMPOSIUM ON USABLE PRIVACY AND SECURITY , 2005
"... Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misguide) users. We propose a new scheme, Dynamic Security Skins, that allows a remote web server to prove its identity in a w ..."
Abstract - Cited by 202 (7 self) - Add to MetaCart
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misguide) users. We propose a new scheme, Dynamic Security Skins, that allows a remote web server to prove its identity in a

Enabling public verifiability and data dynamics for storage security in cloud computing

by Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou - in Proc. of ESORICS’09, Saint , 2009
"... Abstract. Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about man ..."
Abstract - Cited by 177 (10 self) - Add to MetaCart
features in our protocol design. In particular, to achieve efficient data dynamics, we improve the Proof of Retrievability model [1] by manipulating the classic Merkle Hash Tree (MHT) construction for block tag authentication. Extensive security and performance analysis show that the proposed scheme

An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks

by Huei-ru Tseng, Rong-hong Jan, Wuu Yang
"... Abstract—Over the last few years, many researchers have paid a lot of attention to the user authentication problem. However, to date, there has been relatively little research suited for wireless sensor networks. Recently, Wong et al. proposed a dynamic user authentication scheme for WSNs that allow ..."
Abstract - Cited by 20 (1 self) - Add to MetaCart
Abstract—Over the last few years, many researchers have paid a lot of attention to the user authentication problem. However, to date, there has been relatively little research suited for wireless sensor networks. Recently, Wong et al. proposed a dynamic user authentication scheme for WSNs

Using Alert Levels to enhance Keystroke Dynamic Authentication

by Alex Andersen, Simen Hagen
"... Authentication and verification of users in computer security are areas which gains a lot of attention. A reason for this is the high number of inside attacks, where already authenticated user accounts are used to gain access to prohibited information or privileges. Session hijacking, password steal ..."
Abstract - Add to MetaCart
stealing/guessing or perimeter possession are examples of areas where ordinary authentication has been known to fail. A secret password and public username is the most widespread authentication and verification scheme used. This research will purpose to add layers of software biometrics

An Enhanced Secure Remote User Authentication Scheme without Verification Table

by Sumitra Binu
"... With the significant advances in communication networks over the last few decades, smart cards have been widely used in many e-commerce applications and network security protocols due to their low cost, portability, efficiency and cryptographic properties. In this paper, we analyze Sood et al.‟s sma ..."
Abstract - Add to MetaCart
smart card based authentication scheme and demonstrate that the scheme is vulnerable to masquerade user attack, offline password guessing attack, time concurrency weaknesses and fails to achieve mutual authentication. A secure dynamic identity based remote user authentication scheme without verification

A Secure Dynamic Authentication Scheme for Smart Card based Networks

by Dr. S. Santhosh Baboo, K. Gokulraj - International Journal of Computer Applications, Number 8Article , 2010
"... Authentication is one of the essential security features in network communication. Authentication process ascertains the legitimacy of the communicating partners in communication. In authentication process, the originator of the communication and the respondent transacts some identification codes of ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
of each other prior to start of the message transaction. Several methods have been proposed regarding the authentication process from time to time. Here, we introduce a new authentication scheme based on dynamicity which is relatively a different approach to ensure and enhance the smart card based remote

Dynamic Provable Data Possession

by C. Chris Erway , Alptekin Küpçü , Charalampos Papamanthou, Roberto Tamassia , 2009
"... As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has received increased attention. In the provable data possession (PDP) model, the client preprocesses the data and then sends it to ..."
Abstract - Cited by 123 (8 self) - Add to MetaCart
definitional framework and efficient constructions for dynamic provable data possession (DPDP), which extends the PDP model to support provable updates to stored data. We use a new version of authenticated dictionaries based on rank information. The price of dynamic updates is a performance change from O(1

Dynamic Key-Scheduling and Authentication Scheme for Distributed Wireless Network

by T. Surya Prakash Reddy, T. Sunil, Kumar Reddy
"... --------------------------------------------------------------------ABSTRACT---------------------------------------------------------------A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security stan ..."
Abstract - Add to MetaCart
standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for monitoring of these authentication in a distributed architecture. For the efficient monitoring of the authentication

THE DYNAMIC NONCE BASED AUTHENTICATION SCHEME TO DEFEND INTERMEDIARY ATTACK FOR WEB SERVICES

by Elangovan Uma, Arputharaj Kannan
"... Nowadays, Web services have used drastically for various online applications like banking, e-bill processing. All online services need robust security architecture for handling sensitive data like user name, password. But, The Web service has security problems that need to be solved. The existing se ..."
Abstract - Add to MetaCart
security scheme lacks to defend the attacks from replay and password guessing attacks. In this study we proposed a new scheme for a secure authentication procedure for the web service to enhance the security of the existing schemes. The proposed system has been implemented with the Dynamic Nonce

Fingerprint Quality Indices for Predicting Authentication Performance

by Yi Chen, Sarat Dass, Anil Jain - In: Proc. AVBPA, Springer LNCS-3546 , 2005
"... Abstract. The performance of an automatic fingerprint authentication system relies heavily on the quality of the captured fingerprint images. In this paper, two new quality indices for fingerprint images are developed. The first index measures the energy concentration in the frequency domain as a gl ..."
Abstract - Cited by 81 (8 self) - Add to MetaCart
Abstract. The performance of an automatic fingerprint authentication system relies heavily on the quality of the captured fingerprint images. In this paper, two new quality indices for fingerprint images are developed. The first index measures the energy concentration in the frequency domain as a
Next 10 →
Results 1 - 10 of 2,584
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University