Academic literature on the topic 'Attribute authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attribute authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Attribute authentication"

1

Dolev, Shlomi, Łukasz Krzywiecki, Nisha Panwar, and Michael Segal. "Dynamic attribute based vehicle authentication." Wireless Networks 23, no. 4 (January 30, 2016): 1045–62. http://dx.doi.org/10.1007/s11276-016-1203-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yu, Ping, Wei Ni, Guangsheng Yu, Hua Zhang, Ren Ping Liu, and Qiaoyan Wen. "Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks." Security and Communication Networks 2021 (February 22, 2021): 1–14. http://dx.doi.org/10.1155/2021/6638453.

Full text
Abstract:
Vehicular ad hoc network (VANET) encounters a critical challenge of efficiently and securely authenticating massive on-road data while preserving the anonymity and traceability of vehicles. This paper designs a new anonymous authentication approach by using an attribute-based signature. Each vehicle is defined by using a set of attributes, and each message is signed with multiple attributes, enabling the anonymity of vehicles. First, a batch verification algorithm is developed to accelerate the verification processes of a massive volume of messages in large-scale VANETs. Second, replicate messages captured by different vehicles and signed under different sets of attributes can be dereplicated with the traceability of all the signers preserved. Third, the malicious vehicles forging data can be traced from their signatures and revoked from attribute groups. The security aspects of the proposed approach are also analyzed by proving the anonymity of vehicles and the unforgeability of signatures. The efficiency of the proposed approach is numerically verified, as compared to the state of the art.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhu, Xianwei, ChaoWen Chang, Qin Xi, and ZhiBin Zuo. "Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking." Security and Communication Networks 2020 (January 10, 2020): 1–18. http://dx.doi.org/10.1155/2020/6302739.

Full text
Abstract:
Software-defined networking (SDN) decouples the control plane from the data plane, offering flexible network configuration and management. Because of this architecture, some security features are missing. On the one hand, because the data plane only has the packet forwarding function, it is impossible to effectively authenticate the data validity. On the other hand, OpenFlow can only match based on network characteristics, and it is impossible to achieve fine-grained access control. In this paper, we aim to develop solutions to guarantee the validity of flow in SDN and present Attribute-Guard, a fine-grained access control and authentication scheme for flow in SDN. We design an attribute-based flow authentication protocol to verify the legitimacy of the validity flow. The attribute identifier is used as a matching field to define a forwarding control. The flow matching based on the attribute identifier and the flow authentication protocol jointly implement fine-grained access control. We conduct theoretical analysis and simulation-based evaluation of Attribute-Guard. The results show that Attribute-Guard can efficiently identify and reject fake flow.
APA, Harvard, Vancouver, ISO, and other styles
4

KIYOMOTO, Shinsaku, Kazuhide FUKUSHIMA, and Toshiaki TANAKA. "Design of Anonymous Attribute Authentication Mechanism." IEICE Transactions on Communications E92-B, no. 4 (2009): 1112–18. http://dx.doi.org/10.1587/transcom.e92.b.1112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gupta, Brij B., and Shaifali Narayan. "A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server." Journal of Organizational and End User Computing 33, no. 2 (July 2021): 1–16. http://dx.doi.org/10.4018/joeuc.20210301.oa1.

Full text
Abstract:
This paper presents a framework for mutual authentication between a user device and a point of sale (POS) machine using magnetic secure transmission (MST) to prevent the wormhole attack in Samsung pay. The primary attribute of this method is authenticating the POS terminals by an authentication server to bind the generated token to a single POS machine. To secure the system from eavesdropping attack, the data transmitted between the user device and the machine is encrypted by using the Elgamal encryption method. The keys used in the method are dynamic in nature. Furthermore, comparison and security analysis are presented with previously proposed systems.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Qikun, Yongjiao Li Zhigang Li, Junling Yuan, Yong Gan, and Xiangyang Luo. "Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things." Sensors 19, no. 23 (November 28, 2019): 5237. http://dx.doi.org/10.3390/s19235237.

Full text
Abstract:
The development of the Internet of Things has led to great development of data sharing and data interaction, which has made security and privacy more and more a concern for users. How to ensure the safe sharing of data, avoid the leakage of sensitive information, and protect the privacy of users is a serious challenge. Access control is an important issue to ensure the trust of the Internet of Things. This paper proposes an access control scheme based on ciphertext attribute authentication and threshold policy, which uses the identity authentication of hidden attributes and divides the user’s permission grade by setting the threshold function with the user’s attributes. Users obtain different permission grades according to attribute authentication and access data of different sensitivity grades to achieve fine-grained, flexible and secure access to data in the cloud server while protecting personal privacy issues. In addition, when the resource is acquired, the identity and permission joint authentication method is adopted to avoid the collusion attack of the illegal member, which makes the resource access control more secure.
APA, Harvard, Vancouver, ISO, and other styles
7

Su Jeong, Yoon, Yong Tae Kim, and Gil Cheol Park. "Attribute-based multiuser authentication scheme between IoT devices for 5G environment." International Journal of Engineering & Technology 7, no. 2.12 (April 3, 2018): 11. http://dx.doi.org/10.14419/ijet.v7i2.12.11026.

Full text
Abstract:
Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively under way. In particular, as the types and functions of mobile phones and IoT devices using 5G services are diversified, mutual authentication technology among multiple users is required.Methods/Statistical analysis: In this paper, we propose a multi - user authentication scheme which can efficiently mutually authenticate different types of mobile phones and IoT devices that are provided with 5G service. The proposed method minimizes the authentication delay time because it identifies the authentication security parameter δ of multiple users requesting authentication to the server as a polynomial coefficient. As a result of the performance evaluation, the proposed method showed an average improvement of 9.3% in authentication processing time and 5.5% lower overhead than the existing method. In addition, the multiuser authentication latency was improved by 6.1% on average compared with the existing scheme.Findings: The proposed scheme minimizes the user 's authentication delay time by constructing the users who simultaneously request the 5G service into a subnet and then applying the authentication security parameter δ constituting each subnet to n - bit and applying it to the polynomial coefficients. Especially, for multi - user authentication, the proposed scheme divides the authentication path into two paths (main path and secondary path) to guarantee user authentication and integrity. The proposed scheme is suitable for mobile phones and IoT devices that use low power because it generates keys without performing additional cryptographic algorithms like conventional techniques when performing multi - user authentication.Improvements/Applications: In future research, we plan to apply the proposed method to the actual environment based on the results of this study.
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Peng, Junzuo Lai, and Yongdong Wu. "Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting." Security and Communication Networks 2021 (August 4, 2021): 1–17. http://dx.doi.org/10.1155/2021/6611518.

Full text
Abstract:
Numerous anonymous authentication schemes are designed to provide efficient authentication services while preserving privacy. Such schemes may easily neglect access control and accountability, which are two requirements that play an important role in some particular environments and applications. Prior designs of attribute-based anonymous authentication schemes did not concentrate on providing full anonymity while at the same time holding public traceability. To address this problem, we formally define and present a new primitive called traceable attribute-based anonymous authentication (TABAA) which achieves (i) full anonymity, i.e., both registration and authentication cannot reveal user’s privacy; (ii) reusable credential, i.e., a registered credential can be repeatedly used without being linked; (iii) access control, i.e., only when the user’s attribute satisfies the access policy can the user be involved in authentication; and (iv) public traceability, i.e., anyone, without help from the trusted third party, can trace a misbehaving user who has authenticated two messages corresponding to a common address. Then, we formally define the security requirements of TABAA, including unforgeability, anonymity, and accountability, and give a generic construction satisfying the security requirements. Furthermore, based on TABAA, we propose the first attribute-based, decentralized, fully anonymous, publicly traceable e-voting, which enables voters to engage in a number of different voting activities without repeated registration.
APA, Harvard, Vancouver, ISO, and other styles
9

LakshmiPraveena, T., V. Ramachandran, and CH Rupa. "Attribute based Multifactor Authentication for Cloud Applications." International Journal of Computer Applications 80, no. 17 (October 18, 2013): 37–40. http://dx.doi.org/10.5120/13971-1474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yoo, Hye-Joung. "Attribute-Based Authentication for Secure Cloud Computing." Journal of Korean Institute of Information Technology 13, no. 1 (January 31, 2015): 59. http://dx.doi.org/10.14801/jkiit.2015.13.1.59.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Attribute authentication"

1

Khader, Dalia. "Attribute based authentication schemes." Thesis, University of Bath, 2009. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.500716.

Full text
Abstract:
This thesis' major contribution is to propose an attribute based authentication scheme (AAS). An A AS scheme is a new cryptosystem that extends the field of public key cryptography and more precisely digital signatures. An AAS scheme allows a verifier lo decide on the set ol' attributes (b)he would like the signer to possess. The verifier sends the request to a group of possible signers as a monotone boolean expression. Any member with sufficient attributes can sign.
APA, Harvard, Vancouver, ISO, and other styles
2

Schläger, Christian. "Attribute based infrastructures for authentication and authorisation /." Lohmar ; Köln : Eul, 2008. http://d-nb.info/987834134/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Casto, Matthew James. "Multi-Attribute Design for Authentication and Reliability (MADAR)." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1512009861557857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Strakoš, Jan. "Atributová autentizace na platformě Android." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442393.

Full text
Abstract:
This master’s thesis focuses on implementation of ABC (Anonymous attribute-based credential) pilot system on the Android platform. The support for attribute authentication on the Android platform is very weak in terms of the number of implementations and needs a special attention. The theoretical part of the thesis describes the cryptographic support on the Android platform, the use of the Android Native Development Kit (NDK) and the Host-Card Emulation (HCE) service. The theoretical part of the thesis also includes a description of attribute authentication schemes, including a pilot RKVAC system. The practical part describes the implementation of the RKVAC system on the Android platform along with the implementation of a custom cryptographic kernel based on the native MCL cryptographic library. The practical part of this thesis describes implementation proces of RKVAC system on Android plaform, that uses native cryptographic library MCL. The final part shows the results of time, memory and computation difficulty of developed applications.
APA, Harvard, Vancouver, ISO, and other styles
5

Villar, Melissa Vieira Fernandes. "Modelo de autenticaÃÃo e autorizaÃÃo baseado em certificados de atributos para controle de acesso de aplicaÃÃes em ambiente distribuÃdo utilizando redes de petri coloridas." Universidade Federal do CearÃ, 2007. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=2047.

Full text
Abstract:
Devido Ãs crescentes ameaÃas inerentes aos sistemas de informaÃÃo, o uso de mecanismos de autenticaÃÃo e autorizaÃÃo baseados em identificador de usuÃrio e senha nÃo à mais suficiente para garantir a seguranÃa das informaÃÃes. Este trabalho propÃe um novo modelo de autenticaÃÃo e autorizaÃÃo para controle de acesso de aplicaÃÃes distribuÃdas, baseado em resumos criptogrÃficos e certificados de atributos. Os resumos criptogrÃficos sÃo utilizados no processo de autenticaÃÃo da aplicaÃÃo, enquanto os certificados de atributos especificam privilÃgios e outras informaÃÃes de autorizaÃÃo associadas ao seu proprietÃrio. Os certificados de atributos sÃo gerenciados pela infra-estrutura de gerenciamento de privilÃgios (IGP). A arquitetura e o funcionamento do modelo bem como os processos de geraÃÃo do certificado de atributos, autenticaÃÃo e autorizaÃÃo da aplicaÃÃo sÃo descritos. O modelo proposto foi especificado em Redes de Petri Coloridas e validado por meio de simulaÃÃes.
Due to increasing threats inherent to the information systems, the use of authentication and authorization mechanisms based in login and password does not enough to assure the information security. This work proposes a new model of authentication and authorization for distributed applications, based in hash and attributes certificates. Hash is used in the application authentication process, while certificates of attributes specify privileges and other authorization information. Its use is managed by the privilege management infrastructure (PMI). In this work, we describe the architecture and the functioning of the model, as well the processes of the attributes certificates generation, authentication and authorization of the application. The proposed model was specified in Coloured Petri Nets and validated by simulation.
APA, Harvard, Vancouver, ISO, and other styles
6

Malík, Ondrej. "Kryptografie a ochrana soukromí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442402.

Full text
Abstract:
The main goal of this diploma thesis was to create web applications for issuer, verifier and revocation authority of revocable keyed-verification anonymous credentials system. Applications created in this thesis provide functions for all tasks, that are performed by each entity. Using these applications a global management of RKVAC system is possible. Authentication module created in verifier’s app is universaly usable for access control to any web service. Both issuer’s and revocation authority’s app are compatible with whole RKVAC system and are therefor applicable as central elements of systems.
APA, Harvard, Vancouver, ISO, and other styles
7

Dzurenda, Petr. "Kryptografická ochrana digitální identity." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403859.

Full text
Abstract:
Dizertační práce se zabývá kryptografickými schématy zvyšující ochranu soukromí uživatelů v systémech řízení přístupu a sběru dat. V současnosti jsou systémy fyzického řízení přístupu na bázi čipových karet využívány téměř dennodenně většinou z nás, například v zaměstnání, ve veřejné dopravě a v hotelech. Tyto systémy však stále neposkytují dostatečnou kryptografickou ochranu a tedy bezpečnost. Uživatelské identifikátory a klíče lze snadno odposlechnout a padělat. Funkce, které by zajišťovaly ochranu soukromí uživatele, téměř vždy chybí. Proto je zde reálné riziko možného sledovaní lidí, jejich pohybu a chovaní. Poskytovatelé služeb nebo případní útočníci, kteří odposlouchávají komunikaci, mohou vytvářet profily uživatelů, ví, co dělají, kde se pohybují a o co se zajímají. Za účelem zlepšení tohoto stavu jsme navrhli čtyři nová kryptografická schémata založená na efektivních důkazech s nulovou znalostí a kryptografii eliptických křivek. Konkrétně dizertační práce prezentuje tři nová autentizační schémata pro využití v systémech řízení přístupu a jedno nové schéma pro využití v systémech sběru dat. První schéma využívá distribuovaný autentizační přístup vyžadující spolupráci více RFID prvků v autentizačním procesu. Tato vlastnost je výhodná zvláště v případech řízení přístupu do nebezpečných prostor, kdy pro povolení přístupu uživatele je nezbytné, aby byl uživatel vybaven ochrannými pomůckami (se zabudovanými RFID prvky). Další dvě schémata jsou založena na atributovém způsobu ověření, tj. schémata umožňují anonymně prokázat vlastnictví atributů uživatele, jako je věk, občanství a pohlaví. Zatím co jedno schéma implementuje efektivní revokační a identifikační mechanismy, druhé schéma poskytuje nejrychlejší verifikaci držení uživatelských atributů ze všech současných řešení. Poslední, čtvrté schéma reprezentuje schéma krátkého skupinového podpisu pro scénář sběru dat. Schémata sběru dat se používají pro bezpečný a spolehlivý přenos dat ze vzdálených uzlů do řídící jednotky. S rostoucím významem chytrých měřičů v energetice, inteligentních zařízení v domácnostech a rozličných senzorových sítí, se potřeba bezpečných systémů sběru dat stává velmi naléhavou. Tato schémata musí podporovat nejen standardní bezpečnostní funkce, jako je důvěrnost a autentičnost přenášených dat, ale také funkce nové, jako je silná ochrana soukromí a identity uživatele či identifikace škodlivých uživatelů. Navržená schémata jsou prokazatelně bezpečná a nabízí celou řadu funkcí rozšiřující ochranu soukromí a identity uživatele, jmenovitě se pak jedná o zajištění anonymity, nesledovatelnosti a nespojitelnosti jednotlivých relací uživatele. Kromě úplné kryptografické specifikace a bezpečnostní analýzy navržených schémat, obsahuje tato práce také výsledky měření implementací jednotlivých schémat na v současnosti nejpoužívanějších zařízeních v oblasti řízení přístupu a sběru dat.
APA, Harvard, Vancouver, ISO, and other styles
8

Kouicem, Djamel Eddine. "Sécurité de l’Internet des objets pour les systèmes de systèmes." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2518.

Full text
Abstract:
L'internet des objets (IoT) est une nouvelle technologie qui vise à connecter des milliards d'objets physiques à Internet. Ces objets peuvent être engagés dans des relations complexes, notamment la composition et la collaboration avec d'autres systèmes indépendants et hétérogènes, afin de fournir de nouvelles fonctionnalités, conduisant ainsi à ce que l'on appelle les systèmes de systèmes (SoS). Les composants de l'IoT communiquent et collaborent dans des environnements distribués et dynamiques, confrontés à plusieurs problèmes de sécurité de grande ampleur. La sécurité es tconsidérée parmi les enjeux majeurs de l'IoT et soulève des défis liés aux contraintes de capacité de calcul et stockage ainsi que le très grand nombre des objets connectés. Dans cette thèse, nous nous intéressons à l'application des outils cryptographiques ainsi que la technologie blockchain pour résoudre les problèmes de sécurité dans l'IoT, à savoir : l'authentification et la gestion de confiance. Dans un premier lieu, nous nous sommes intéressés au problème du contrôle d'accès distant des actionneurs intelligents utilisant des dispositifs IoT. Pour aborder ce problème, nous avons proposé une solution de contrôle d'accès efficace et à granularité fine, basée sur le mécanisme ABE (Attribute Based Encryption) et des chaînes de hachage. À l'aide d'outils formels d'analyse de sécurité, nous avons démontré la sécurité de notre protocole face aux attaques malveillantes. Dans un deuxième lieu, nous avons abordé le problème d'authentification dans les applications IoT basé sur le paradigme du fog computing. Nous avons proposé un nouveau protocole d'authentification mutuelle efficace qui est basé sur la technologie blockchain et la cryptographie à seuil. Dans notre solution, les objets IoT et les serveurs de fog n'ont besoin que de quelques informations à stocker pour vérifier l'authenticité de chaque objet du système. L’authentification est effectuée seulement sur la bordure du réseau sans passer par des entités externes. Ainsi, la latence et la capacité de stockage sont réduites au minimum. Enfin, dans notre troisième contribution, nous avons proposé un nouveau protocole de gestion de réputation basé sur la technologie blockchain et le fog computing, avec la prise en charge de la mobilité des objets connectés. Notre protocole permet aux objets IoT d'évaluer et de partager avec précision la réputation relative aux autres objets de manière scalable, sans se recourir à une entité de confiance. Nous avons confirmé l'efficacité de notre protocole par des analyses théoriques et des simulations approfondies. Nous avons montré que notre protocole surpasse les solutions existantes,notamment en matière de scalabilité, prise en charge de la mobilité, la communication et le calcul
The Internet of things (IoT) is a new technology that aims to connect billions of physical devices to the Internet. The components of IoT communicate and collaborate between each other in distributed and dynamic environments, which are facing several security challenges. In addition, the huge number of connected objects and the limitation of their resources make the security in IoT very difficult to achieve. In this thesis, we focus on the application of lightweight cryptographic approaches and blockchain technology to address security problems in IoT, namely : authentication and trust management. First, we were interested on some kind of IoT applications where we need to control remotely the execution of smart actuators using IoT devices. To solve this problem, we proposed an efficient and fine-grained access controlsolution, based on the Attribute Based Encryption (ABE) mechanism and oneway hash chains. Using formal security tools, we demonstrated the security of our scheme against malicious attacks. Second, we tackled the problem of authentication in IoT based fog computing environments. Existing authentication techniques do not consider latency constraints introduced in the context of fog computing architecture. In addition, some of them do not provide mutual authentication between devices and fog servers. To overcome these challenges, we proposed a novel, efficient and lightweight mutual authentication scheme based on blockchain technologyand secret sharing technique. We demonstrated the efficiency of our authentication scheme through extensive simulations. The third problem treated in this work is the trust management in IoT. Existing trust management protocols do not meet the new requirements introduced in IoT such as heterogeneity, mobility and scalability. To address these challenges, we proposed a new scalable trust management protocol based on consortium blockchain technology and fog computing paradigm, with mobility support. Our solution allows IoT devices to accurately assess and share trust recommendations about other devices in a scalable way without referring to any pre-trusted entity. We confirmed the efficiency of our proposal through theoretical analysis and extensive simulations. Finally, we showed that our protocol outperforms existing solutions especially in terms of scalability, mobility support, communication and computation
APA, Harvard, Vancouver, ISO, and other styles
9

Adnan, Adnan [Verfasser]. "Evaluation of near infrared spectroscopy for prediction of quality attributes and authentication of green coffee beans / Adnan Adnan." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2020. http://d-nb.info/1219731692/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cwiertnia, Elke. "Using analytical techniques for the study and authentication of works of art attributed to Francis Bacon (1909-1992)." Thesis, Northumbria University, 2014. http://nrl.northumbria.ac.uk/36127/.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Attribute authentication"

1

Khader, Dalia, Liqun Chen, and James H. Davenport. "Certificate-Free Attribute Authentication." In Cryptography and Coding, 301–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10868-6_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Huihui, and Vladimir A. Oleshchuk. "A Dynamic Attribute-Based Authentication Scheme." In Lecture Notes in Computer Science, 106–18. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18681-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Tiffany Hyun-Jin, Virgil Gligor, and Adrian Perrig. "Street-Level Trust Semantics for Attribute Authentication." In Lecture Notes in Computer Science, 96–115. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35694-0_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, Jaeil, Inkyoung Jeun, and Seoklae lee. "Efficient Attribute Authentication in Wireless Mobile Networks." In Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops, 1080–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11942634_111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Huihui, and Vladimir A. Oleshchuk. "An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees." In Secure IT Systems, 123–35. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26502-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Covington, Michael J., Manoj R. Sastry, and Deepak J. Manohar. "Attribute-Based Authentication Model for Dynamic Mobile Environments." In Security in Pervasive Computing, 227–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11734666_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Brunner, Clemens, Fabian Knirsch, and Dominik Engel. "SPROOF: A Decentralized Platform for Attribute-Based Authentication." In Communications in Computer and Information Science, 1–23. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49443-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Camenisch, Jan, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, and Franz-Stefan Preiss. "Concepts and Languages for Privacy-Preserving Attribute-Based Authentication." In Policies and Research in Identity Management, 34–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37282-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gligor, Virgil. "Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion)." In Lecture Notes in Computer Science, 116–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35694-0_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schläger, Christian, Manuel Sojer, Björn Muschall, and Günther Pernul. "Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers." In E-Commerce and Web Technologies, 132–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11823865_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Attribute authentication"

1

Dolev, Shlomi, Lukasz Krzywiecki, Nisha Panwar, and Michael Segal. "Dynamic Attribute Based Vehicle Authentication." In 2014 IEEE 13th International Symposium on Network Computing and Applications (NCA). IEEE, 2014. http://dx.doi.org/10.1109/nca.2014.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yun, Jong Pil, Hyoseung Kim, and Dong Hoon Lee. "An Improved Fuzzy Attribute-Based Authentication." In 2015 5th International Conference on IT Convergence and Security (ICITCS). IEEE, 2015. http://dx.doi.org/10.1109/icitcs.2015.7292946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hongbin, Wang, and Ren Yan. "An Attribute-Based Anonymous Authentication Scheme." In 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT). IEEE, 2013. http://dx.doi.org/10.1109/eidwt.2013.102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hyun-A Park, Dong Hoon Lee, and Justin Zhan. "Attribute-based access control using combined authentication technologies." In 2008 IEEE International Conference on Granular Computing (GrC-2008). IEEE, 2008. http://dx.doi.org/10.1109/grc.2008.4664774.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thaler, Stefan, Jerry Den Hartog, Dhouha Ayed, Dieter Sommer, and Michael Hitchens. "Cross-Domain Attribute Conversion for Authentication and Authorization." In 2015 10th International Conference on Availability, Reliability and Security (ARES). IEEE, 2015. http://dx.doi.org/10.1109/ares.2015.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Samangouei, Pouya, Vishal M. Patel, and Rama Chellappa. "Attribute-based continuous user authentication on mobile devices." In 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, 2015. http://dx.doi.org/10.1109/btas.2015.7358748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Aghapour, Saeed, Mohammad Hassan Ameri, and Javad Mohajeri. "A multi sender attribute-based broadcast authentication scheme." In 2016 8th International Symposium on Telecommunications (IST). IEEE, 2016. http://dx.doi.org/10.1109/istel.2016.7881787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yang, Huihui, and Vladimir A. Oleshchuk. "Traceable hierarchical attribute-based authentication for the cloud." In 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 2015. http://dx.doi.org/10.1109/cns.2015.7346888.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shinsaku Kiyomoto and Toshiaki Tanaka. "Anonymous attribute authentication scheme using self-blindable certificates." In 2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008). IEEE, 2008. http://dx.doi.org/10.1109/isi.2008.4565060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Premarathne, Uthpala S. "PROAASEL: Prospect theory based continuous authentication attribute selection model." In 2016 Moratuwa Engineering Research Conference (MERCon). IEEE, 2016. http://dx.doi.org/10.1109/mercon.2016.7480120.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Attribute authentication"

1

Yegin, A., and R. Cragie. Encrypting the Protocol for Carrying Authentication for Network Access (PANA) Attribute-Value Pairs. RFC Editor, November 2012. http://dx.doi.org/10.17487/rfc6786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hartman, S., and J. Howlett. Name Attributes for the GSS-API Extensible Authentication Protocol (EAP) Mechanism. RFC Editor, December 2013. http://dx.doi.org/10.17487/rfc7056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Valmikam, R., and R. Koodli. Extensible Authentication Protocol (EAP) Attributes for Wi-Fi Integration with the Evolved Packet Core. RFC Editor, February 2015. http://dx.doi.org/10.17487/rfc7458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Housley, R., and T. Moore. Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN). RFC Editor, May 2004. http://dx.doi.org/10.17487/rfc3770.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Housley, R., and T. Moore. Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN). RFC Editor, February 2006. http://dx.doi.org/10.17487/rfc4334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Droms, R., and J. Schnizlein. Remote Authentication Dial-In User Service (RADIUS) Attributes Suboption for the Dynamic Host Configuration Protocol (DHCP) Relay Agent Information Option. RFC Editor, February 2005. http://dx.doi.org/10.17487/rfc4014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography