Literature Review from the year 2015 in the subject Engineering - Computer Engineering, grade: 8.0, Marwadi Education Foundation (GTU), course: Computer Engineering (M.E.), language: English, abstract: In today's insecure world we are surrounded by public channels which are insecure for data transfer to each other. So it requires some type of remote user authentication mechanism to verify the legitimate user. In remote user authentication schemes, the server checks the credentials of the user and decides that the user is legitimate and genuine or not. Remote user also validates the server for mutual authentication purposes. In today's web-enabled world, two parameters are most important which are security and privacy. For that many researchers work on this field and proposed a schemes which is based on different aspects likes password table, biometric and smart card for authenticating the remote user. But these are not enough for perfect remote authentication, so a scheme is required which has stronger and accurate then old existing schemes. To make most reliable scheme, it is important to calculate computational and communication cost. Also it requires resistance against many other threats. For these mutual authentication and communication privacy are most essential requirements for remote user authentication scheme. In this survey, we analyze some papers and make survey on different aspects like types of attacks, computational cost and communication cost.
"synopsis" may belong to another edition of this title.
£ 6.78 shipping from Germany to United Kingdom
Destination, rates & speedsSeller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - Literature Review from the year 2015 in the subject Engineering - Computer Engineering, grade: 8.0, Marwadi Education Foundation (GTU), course: Computer Engineering (M.E.), language: English, abstract: In today's insecure world we are surrounded by public channels which are insecure for data transfer to each other. So it requires some type of remote user authentication mechanism to verify the legitimate user. In remote user authentication schemes, the server checks the credentials of the user and decides that the user is legitimate and genuine or not. Remote user also validates the server for mutual authentication purposes. In today's web-enabled world, two parameters are most important which are security and privacy.For that many researchers work on this field and proposed a schemes which is based on different aspects likes password table, biometric and smart card for authenticating the remote user. But these are not enough for perfect remote authentication, so a scheme is required which has stronger and accurate then old existing schemes. To make most reliable scheme, it is important to calculate computational and communication cost.Also it requires resistance against many other threats. For these mutual authentication and communication privacy are most essential requirements for remote user authentication scheme. In this survey, we analyze some papers and make survey on different aspects like types of attacks, computational cost and communication cost. Seller Inventory # 9783668152717
Quantity: 1 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand pp. 46. Seller Inventory # 388977350
Quantity: 4 available
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9783668152717
Quantity: Over 20 available
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. An Improved Three Factor Remote User Authentication Scheme Using Smart Card. A Review | Manish Shingala (u. a.) | Taschenbuch | 44 S. | Englisch | 2016 | GRIN Verlag | EAN 9783668152717 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu. Seller Inventory # 103890242
Quantity: 5 available