Search Results - message authentication (methods OR method)
-
1
A lightweight secure authentication for vehicular ad-hoc networks by message encapsulation and trusted authority dependency-less scheme / Tarak Nandy
Published 2022“…This proposed method, in return, needs less message transfer during authentication as well as communication. …”
Get full text
Get full text
Get full text
Thesis -
2
A new tunnelled EAP based authentication method for WiMAX networks
Published 2013“…This authentication method is proposed for a single EAP based authentication to achieve both user and device authentications between Mobile Station (MS) and Authentication Server (AS) by using strong and fast authentication methods. …”
Get full text
Get full text
Conference or Workshop Item -
3
Character property method with biometric multifactor authentication for arabic text steganography
Published 2018“…The biometric multi factor authentication is implemented through a custom Arduino smart watch with a fingerprint and heartbeat sensor as a proof of concept device which increases capacity in hiding the secret message by up to 23.5% compared to the previous methods. …”
Get full text
Get full text
Thesis -
4
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
Published 2017“…This method embeds the transmission of security messages in a secure tunnel. …”
Get full text
Get full text
Thesis -
5
Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.]
Published 2021“…Cryptography is a method that guarantees the authenticity and integrity of a message between the communication parties. …”
Get full text
Get full text
Monograph -
6
Authentication process enhancements in WiMAX networks
Published 2016“…A number of algorithms and methods have been proposed to improve the security level of authentication in WiMAX networks. …”
Get full text
Get full text
Article -
7
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
Published 2020“…The results for the biometric authentication showed that the proposed method correctly authenticates users, having a false rejection rate of only 4%, and a 0% false acceptance rate. …”
Get full text
Get full text
Get full text
Article -
8
Authentication securing methods for mobile identity: issues, solutions and challenges
Published 2022“…Most regular mobile users’ authentication methods used are passwords and short messages. …”
Get full text
Get full text
Article -
9
Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges
Published 2022“…Most regular mobile usersâ�� authentication methods used are passwords and short messages. …”
Get full text
Get full text
Article -
10
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The second step is to apply the hash method on this message by using shuffle mechanism. …”
Get full text
Get full text
Thesis -
11
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
12
Token Based Authentication Method Using Bluetooth Enabled Mobile Phone
Published 2004Get full text
Get full text
Thesis -
13
New approach of cryptography algorithm for e- mail applications
Published 2005“…The main steps in this algorithm started with reading the plain text "Original Message" from the user. The second step is to apply the hash method on this message by using shuffle mechanism. …”
Get full text
Get full text
Conference or Workshop Item -
14
Enhancing Security in Mobile IPv6 with Private Key-Based Binding Update Protocol / Hero Modares
Published 2013“…The proposed PKBU protocol incorporates: (a) a method to assert the address ownership of the MN by creating a 128-bit MIPv6 address based on the MN‘s private key, and computing one-way hash function in order to authenticate the MNs authority, thus, allowing the CN to validate that the MN is not a malicious node. …”
Get full text
Get full text
Thesis -
15
An efficient authentication and key agreement protocol for 4G (LTE) networks
Published 2014“…Compared to previous proposed methods, our method is faster, since it uses a secret key method which is faster than certificate-based methods, In addition, the size of messages exchanged between User Equipment (UE) and Home Subscriber Server (HSS) is reduced, this reduces authentication delay and storage overhead effectively. …”
Get full text
Get full text
Conference or Workshop Item -
16
An enhanced group mobility managemnt method in wireless body area networks
Published 2019“…This paper presents an approach aims at overcome these limitations using improved group mobility management method. The method emphasizes on incorporation of authentication, authorization, and accounting (AAA) service into the local mobility anchor (LMA) as an alternative to independent practice. …”
Get full text
Get full text
Get full text
Article -
17
Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm
Published 2024“…In this context, it has become an important topic to study the relationship between the authenticity of online CSR communication messages and consumers’ purchase intentions. …”
Get full text
Get full text
Article -
18
A cryptographic-biometric mechanism for enhancing SET authentication
Published 2005“…In addition, recently, a great deal of interest has been expressed in implementing and extending cryptography and biometric into standard authentication protocols and distributed systems. This paper proposes an alternative authentication mechanism for supporting and enhancing the cardholder authentication technique used by SET.A cryptographic-biometric mechanism is proposed to offer a more secure and suitable method for authentication/verification of the SET participant identity.A software implementation of the proposed mechanism uses SHA-1 for message digest authentication and DSA/RSA approach for digital signature.A simulated application is presented with results showing the advantageous features of the proposed mechanism and its potential for SET implementation.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Congratulatory Messages Strategy in Facebook and Twitter
Published 2019“…Data from Facebook and Twitter are also authentic data and can be considered as language corpus. …”
Get full text
Get full text
Get full text
Article -
20
An enhanced group mobility management method in wireless body area networks
Published 2019“…This paper presents an approach aims at overcome these limitations using improved group mobility management method. The method emphasizes on incorporation of authentication, authorization, and accounting (AAA) service into the local mobility anchor (LMA) as an alternative to independent practice. …”
Get full text
Get full text
Get full text
Get full text
Article
