Search Results - Message authentication method

Refine Results
  1. 1

    A lightweight secure authentication for vehicular ad-hoc networks by message encapsulation and trusted authority dependency-less scheme / Tarak Nandy by Tarak , Nandy

    Published 2022
    “…This proposed method, in return, needs less message transfer during authentication as well as communication. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A new tunnelled EAP based authentication method for WiMAX networks by Alezabi, Kamal Ali Ahmed, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Mohd Ali, Borhanuddin

    Published 2013
    “…This authentication method is proposed for a single EAP based authentication to achieve both user and device authentications between Mobile Station (MS) and Authentication Server (AS) by using strong and fast authentication methods. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Character property method with biometric multifactor authentication for arabic text steganography by Roslan, Nuur Alifah

    Published 2018
    “…The biometric multi factor authentication is implemented through a custom Arduino smart watch with a fingerprint and heartbeat sensor as a proof of concept device which increases capacity in hiding the secret message by up to 23.5% compared to the previous methods. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.] by Mat Abu, Nur Ainaa, Mohamad Sarif, Siti Nurfazliana, Mohammad Zuki, Intan Nur Athirah, Udin, Md Nizam

    Published 2021
    “…Cryptography is a method that guarantees the authenticity and integrity of a message between the communication parties. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Authentication process enhancements in WiMAX networks by Alezabi, Kamal Ali, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Mohd Ali, Borhanuddin, Jamalipour, Abbas

    Published 2016
    “…A number of algorithms and methods have been proposed to improve the security level of authentication in WiMAX networks. …”
    Get full text
    Get full text
    Article
  7. 7

    Security and performance enhancement of authentication protocols in heterogeneous wireless networks by Alezabi, Kamal Ali Ahmed

    Published 2017
    “…This method embeds the transmission of security messages in a secure tunnel. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The second step is to apply the hash method on this message by using shuffle mechanism. …”
    Get full text
    Get full text
    Thesis
  9. 9

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The main steps in this algorithm started with reading the plain text "Original Message" from the user. The second step is to apply the hash method on this message by using shuffle mechanism. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection by Roslan, Nuur Alifah, Udzir, Nur Izura, Mahmod, Ramlan, Ahmad Zukarnain, Zuriati, Ninggal, Mohd Izuan Hafez, Thabit, Reema Ahmed Abdalla

    Published 2020
    “…The results for the biometric authentication showed that the proposed method correctly authenticates users, having a false rejection rate of only 4%, and a 0% false acceptance rate. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Authentication securing methods for mobile identity: issues, solutions and challenges by Ahmad Zukarnain, Zuriati, Muneer, Amgad, Ab Aziz, Mohd Khairulanuar

    Published 2022
    “…Most regular mobile users’ authentication methods used are passwords and short messages. …”
    Get full text
    Get full text
    Article
  13. 13

    Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges by Zukarnain, Z.A., Muneer, A., Ab Aziz, M.K.

    Published 2022
    “…Most regular mobile usersâ�� authentication methods used are passwords and short messages. …”
    Get full text
    Get full text
    Article
  14. 14

    Enhancing Security in Mobile IPv6 with Private Key-Based Binding Update Protocol / Hero Modares by Modares, Hero

    Published 2013
    “…The proposed PKBU protocol incorporates: (a) a method to assert the address ownership of the MN by creating a 128-bit MIPv6 address based on the MN‘s private key, and computing one-way hash function in order to authenticate the MNs authority, thus, allowing the CN to validate that the MN is not a malicious node. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm by Li, Man, Liu, Fang, Abdullah, Zulhamri

    Published 2024
    “…In this context, it has become an important topic to study the relationship between the authenticity of online CSR communication messages and consumers’ purchase intentions. …”
    Get full text
    Get full text
    Article
  16. 16

    An efficient authentication and key agreement protocol for 4G (LTE) networks by Alezabi, Kamal Ali, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Mohd Ali, Borhanuddin

    Published 2014
    “…Compared to previous proposed methods, our method is faster, since it uses a secret key method which is faster than certificate-based methods, In addition, the size of messages exchanged between User Equipment (UE) and Home Subscriber Server (HSS) is reduced, this reduces authentication delay and storage overhead effectively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A cryptographic-biometric mechanism for enhancing SET authentication by Awadelkarim, Awad M., Md Johar, Md Gapar

    Published 2005
    “…In addition, recently, a great deal of interest has been expressed in implementing and extending cryptography and biometric into standard authentication protocols and distributed systems. This paper proposes an alternative authentication mechanism for supporting and enhancing the cardholder authentication technique used by SET.A cryptographic-biometric mechanism is proposed to offer a more secure and suitable method for authentication/verification of the SET participant identity.A software implementation of the proposed mechanism uses SHA-1 for message digest authentication and DSA/RSA approach for digital signature.A simulated application is presented with results showing the advantageous features of the proposed mechanism and its potential for SET implementation.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Congratulatory Messages Strategy in Facebook and Twitter by Irahim, Nur Hamimah Muhammad, Bakar, Norsofiah Abu

    Published 2019
    “…Data from Facebook and Twitter are also authentic data and can be considered as language corpus. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A lightweight authentication scheme with privacy preservation for vehicular networks by Rawat, G.S., Singh, K., Arshad, N.I., Hadidi, K., Ahmadian, A.

    Published 2022
    “…The primary security requirements in a vehicular network are vehicle authentication, message integrity, and privacy preservation. …”
    Get full text
    Get full text
    Article
  20. 20