Authentication using cryptography
โ Scribed by Chris Mitchell
- Publisher
- Elsevier Science
- Year
- 1997
- Tongue
- English
- Weight
- 891 KB
- Volume
- 2
- Category
- Article
- ISSN
- 1363-4127
No coin nor oath required. For personal study only.
โฆ Synopsis
The purpose of this paper is to describe the nature of user au then tica tion and entity au then tica tion based on the use of cryptographic methods. The relationship between key distribution and entity au then tication is described, and examples of practical au then tica tion protocols are given, together with some of the pitfalls awaiting designers of such protocols. References to the growing body of standardized au then tication techniques are also provided.
๐ SIMILAR VOLUMES
Public authorities and business communities in apparel industry of Hong Kong are looking for an effective method to identify counterfeited products. RFID technology provides a tool to address these problems. This paper presents a new approach using lightweight cryptography and a simple authenticatio
This paper presents a new approach for personal authentication using hand images. The proposed method attempts to improve the performance of palmprint-based verification system by integrating hand geometry features. Unlike prior bimodal biometric systems, the users do not have to undergo the inconve