๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Authentication using cryptography

โœ Scribed by Chris Mitchell


Publisher
Elsevier Science
Year
1997
Tongue
English
Weight
891 KB
Volume
2
Category
Article
ISSN
1363-4127

No coin nor oath required. For personal study only.

โœฆ Synopsis


The purpose of this paper is to describe the nature of user au then tica tion and entity au then tica tion based on the use of cryptographic methods. The relationship between key distribution and entity au then tication is described, and examples of practical au then tica tion protocols are given, together with some of the pitfalls awaiting designers of such protocols. References to the growing body of standardized au then tication techniques are also provided.


๐Ÿ“œ SIMILAR VOLUMES


Cryptography and authentication on RFID
โœ Kirk H.M. Wong; Patrick C.L. Hui; Allan C.K. Chan ๐Ÿ“‚ Article ๐Ÿ“… 2006 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 479 KB

Public authorities and business communities in apparel industry of Hong Kong are looking for an effective method to identify counterfeited products. RFID technology provides a tool to address these problems. This paper presents a new approach using lightweight cryptography and a simple authenticatio

Personal authentication using hand image
โœ Ajay Kumar; David C.M. Wong; Helen C. Shen; Anil K. Jain ๐Ÿ“‚ Article ๐Ÿ“… 2006 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 720 KB

This paper presents a new approach for personal authentication using hand images. The proposed method attempts to improve the performance of palmprint-based verification system by integrating hand geometry features. Unlike prior bimodal biometric systems, the users do not have to undergo the inconve