To see the other types of publications on this topic, follow the link: Attribute authentication.

Journal articles on the topic 'Attribute authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Attribute authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dolev, Shlomi, Łukasz Krzywiecki, Nisha Panwar, and Michael Segal. "Dynamic attribute based vehicle authentication." Wireless Networks 23, no. 4 (January 30, 2016): 1045–62. http://dx.doi.org/10.1007/s11276-016-1203-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yu, Ping, Wei Ni, Guangsheng Yu, Hua Zhang, Ren Ping Liu, and Qiaoyan Wen. "Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks." Security and Communication Networks 2021 (February 22, 2021): 1–14. http://dx.doi.org/10.1155/2021/6638453.

Full text
Abstract:
Vehicular ad hoc network (VANET) encounters a critical challenge of efficiently and securely authenticating massive on-road data while preserving the anonymity and traceability of vehicles. This paper designs a new anonymous authentication approach by using an attribute-based signature. Each vehicle is defined by using a set of attributes, and each message is signed with multiple attributes, enabling the anonymity of vehicles. First, a batch verification algorithm is developed to accelerate the verification processes of a massive volume of messages in large-scale VANETs. Second, replicate messages captured by different vehicles and signed under different sets of attributes can be dereplicated with the traceability of all the signers preserved. Third, the malicious vehicles forging data can be traced from their signatures and revoked from attribute groups. The security aspects of the proposed approach are also analyzed by proving the anonymity of vehicles and the unforgeability of signatures. The efficiency of the proposed approach is numerically verified, as compared to the state of the art.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhu, Xianwei, ChaoWen Chang, Qin Xi, and ZhiBin Zuo. "Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking." Security and Communication Networks 2020 (January 10, 2020): 1–18. http://dx.doi.org/10.1155/2020/6302739.

Full text
Abstract:
Software-defined networking (SDN) decouples the control plane from the data plane, offering flexible network configuration and management. Because of this architecture, some security features are missing. On the one hand, because the data plane only has the packet forwarding function, it is impossible to effectively authenticate the data validity. On the other hand, OpenFlow can only match based on network characteristics, and it is impossible to achieve fine-grained access control. In this paper, we aim to develop solutions to guarantee the validity of flow in SDN and present Attribute-Guard, a fine-grained access control and authentication scheme for flow in SDN. We design an attribute-based flow authentication protocol to verify the legitimacy of the validity flow. The attribute identifier is used as a matching field to define a forwarding control. The flow matching based on the attribute identifier and the flow authentication protocol jointly implement fine-grained access control. We conduct theoretical analysis and simulation-based evaluation of Attribute-Guard. The results show that Attribute-Guard can efficiently identify and reject fake flow.
APA, Harvard, Vancouver, ISO, and other styles
4

KIYOMOTO, Shinsaku, Kazuhide FUKUSHIMA, and Toshiaki TANAKA. "Design of Anonymous Attribute Authentication Mechanism." IEICE Transactions on Communications E92-B, no. 4 (2009): 1112–18. http://dx.doi.org/10.1587/transcom.e92.b.1112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gupta, Brij B., and Shaifali Narayan. "A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server." Journal of Organizational and End User Computing 33, no. 2 (July 2021): 1–16. http://dx.doi.org/10.4018/joeuc.20210301.oa1.

Full text
Abstract:
This paper presents a framework for mutual authentication between a user device and a point of sale (POS) machine using magnetic secure transmission (MST) to prevent the wormhole attack in Samsung pay. The primary attribute of this method is authenticating the POS terminals by an authentication server to bind the generated token to a single POS machine. To secure the system from eavesdropping attack, the data transmitted between the user device and the machine is encrypted by using the Elgamal encryption method. The keys used in the method are dynamic in nature. Furthermore, comparison and security analysis are presented with previously proposed systems.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Qikun, Yongjiao Li Zhigang Li, Junling Yuan, Yong Gan, and Xiangyang Luo. "Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things." Sensors 19, no. 23 (November 28, 2019): 5237. http://dx.doi.org/10.3390/s19235237.

Full text
Abstract:
The development of the Internet of Things has led to great development of data sharing and data interaction, which has made security and privacy more and more a concern for users. How to ensure the safe sharing of data, avoid the leakage of sensitive information, and protect the privacy of users is a serious challenge. Access control is an important issue to ensure the trust of the Internet of Things. This paper proposes an access control scheme based on ciphertext attribute authentication and threshold policy, which uses the identity authentication of hidden attributes and divides the user’s permission grade by setting the threshold function with the user’s attributes. Users obtain different permission grades according to attribute authentication and access data of different sensitivity grades to achieve fine-grained, flexible and secure access to data in the cloud server while protecting personal privacy issues. In addition, when the resource is acquired, the identity and permission joint authentication method is adopted to avoid the collusion attack of the illegal member, which makes the resource access control more secure.
APA, Harvard, Vancouver, ISO, and other styles
7

Su Jeong, Yoon, Yong Tae Kim, and Gil Cheol Park. "Attribute-based multiuser authentication scheme between IoT devices for 5G environment." International Journal of Engineering & Technology 7, no. 2.12 (April 3, 2018): 11. http://dx.doi.org/10.14419/ijet.v7i2.12.11026.

Full text
Abstract:
Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively under way. In particular, as the types and functions of mobile phones and IoT devices using 5G services are diversified, mutual authentication technology among multiple users is required.Methods/Statistical analysis: In this paper, we propose a multi - user authentication scheme which can efficiently mutually authenticate different types of mobile phones and IoT devices that are provided with 5G service. The proposed method minimizes the authentication delay time because it identifies the authentication security parameter δ of multiple users requesting authentication to the server as a polynomial coefficient. As a result of the performance evaluation, the proposed method showed an average improvement of 9.3% in authentication processing time and 5.5% lower overhead than the existing method. In addition, the multiuser authentication latency was improved by 6.1% on average compared with the existing scheme.Findings: The proposed scheme minimizes the user 's authentication delay time by constructing the users who simultaneously request the 5G service into a subnet and then applying the authentication security parameter δ constituting each subnet to n - bit and applying it to the polynomial coefficients. Especially, for multi - user authentication, the proposed scheme divides the authentication path into two paths (main path and secondary path) to guarantee user authentication and integrity. The proposed scheme is suitable for mobile phones and IoT devices that use low power because it generates keys without performing additional cryptographic algorithms like conventional techniques when performing multi - user authentication.Improvements/Applications: In future research, we plan to apply the proposed method to the actual environment based on the results of this study.
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Peng, Junzuo Lai, and Yongdong Wu. "Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting." Security and Communication Networks 2021 (August 4, 2021): 1–17. http://dx.doi.org/10.1155/2021/6611518.

Full text
Abstract:
Numerous anonymous authentication schemes are designed to provide efficient authentication services while preserving privacy. Such schemes may easily neglect access control and accountability, which are two requirements that play an important role in some particular environments and applications. Prior designs of attribute-based anonymous authentication schemes did not concentrate on providing full anonymity while at the same time holding public traceability. To address this problem, we formally define and present a new primitive called traceable attribute-based anonymous authentication (TABAA) which achieves (i) full anonymity, i.e., both registration and authentication cannot reveal user’s privacy; (ii) reusable credential, i.e., a registered credential can be repeatedly used without being linked; (iii) access control, i.e., only when the user’s attribute satisfies the access policy can the user be involved in authentication; and (iv) public traceability, i.e., anyone, without help from the trusted third party, can trace a misbehaving user who has authenticated two messages corresponding to a common address. Then, we formally define the security requirements of TABAA, including unforgeability, anonymity, and accountability, and give a generic construction satisfying the security requirements. Furthermore, based on TABAA, we propose the first attribute-based, decentralized, fully anonymous, publicly traceable e-voting, which enables voters to engage in a number of different voting activities without repeated registration.
APA, Harvard, Vancouver, ISO, and other styles
9

LakshmiPraveena, T., V. Ramachandran, and CH Rupa. "Attribute based Multifactor Authentication for Cloud Applications." International Journal of Computer Applications 80, no. 17 (October 18, 2013): 37–40. http://dx.doi.org/10.5120/13971-1474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yoo, Hye-Joung. "Attribute-Based Authentication for Secure Cloud Computing." Journal of Korean Institute of Information Technology 13, no. 1 (January 31, 2015): 59. http://dx.doi.org/10.14801/jkiit.2015.13.1.59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Zeng, Yongbin, Hui Guang, and Guangsong Li. "Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks." Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/8470949.

Full text
Abstract:
Mobile wireless networks are widely used in our daily lives. Seamless handover occurs frequently and how to guarantee security and efficiency during handover procedure is a major challenge. A handover authentication protocol with nice properties can achieve goals. Protocols proposed in recent years more or less have some security vulnerability. In this paper, we outline security requirements for handover authentication protocols and then propose an anonymous protocol based on a new attribute-based signature scheme. The proposed protocol realizes conditional privacy preserving, user revocation, and session key update as well as mutual authentication and anonymity. Besides, it achieves fine-grained access control due to attributes representing real identity. What is more, experiment shows the proposed protocol has a superior performance.
APA, Harvard, Vancouver, ISO, and other styles
12

Muraharirao, Siva Charan, and Manik Lal Das. "Digital Image Protection using Keyed Hash Function." International Journal of Computer Vision and Image Processing 2, no. 2 (April 2012): 36–47. http://dx.doi.org/10.4018/ijcvip.2012040103.

Full text
Abstract:
Digital image authentication is an essential attribute for protecting digital image from piracy and copyright violator. Anti-piracy, digital watermarking, and ownership verification are some mechanisms evolving over the years for achieving digital image authentication. Cryptographic primitives, such as hash function, digital signature, and message authentication codes are being used in several applications including digital image authentication. Use of Least Significant Bit (LSB) is one of the classical approaches for digital image authentication. Although LSB approach is efficient, it does not provide adequate security services. On the other hand, digital signature-based image authentication provides better security, but with added computational cost in comparison with LSB approach. Furthermore, digital signature-based authentication approach requires managing public key infrastructure. Considering security weakness of LSB-based approach and cost overhead of public key based approach, the authors present a digital image authentication scheme using LSB and message authentication codes (MAC). The MAC-based approach for authenticating digital image is secure and efficient approach without public key management overhead. The authors also provide experimental results of the proposed scheme using MATLAB. The experimental results show that the proposed scheme is efficient and secure in comparisons with other schemes.
APA, Harvard, Vancouver, ISO, and other styles
13

Cao, Dan, Baokang Zhao, Xiaofeng Wang, and Jinshu Su. "Flexible Multi-Authority Attribute-Based Signature Schemes for Expressive Policy." Mobile Information Systems 8, no. 3 (2012): 255–74. http://dx.doi.org/10.1155/2012/736764.

Full text
Abstract:
Attribute-based signature (ABS) is a new cryptographic primitive, in which a signer can sign a message with his attributes, and the verifier can only known whether the signer owns attributes satisfying his policy. Moreover, the signature cannot be forged by any user not having attributes satisfying the policy. ABS has many applications, such as anonymous authentication, and attribute-based messaging systems. But many applications may require a user obtaining attributes from different authorities, which calls for multi-authority ABS schemes.
APA, Harvard, Vancouver, ISO, and other styles
14

Lee, Ji-Seon, and Hyo-Dong Kim. "Attribute-based authentication scheme in IPTV broadcasting system." Journal of Broadcast Engineering 14, no. 3 (May 30, 2009): 280–87. http://dx.doi.org/10.5909/jbe.2009.14.3.280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yoo, Hye-Joung. "Attribute based User Authentication for Contents Distribution Environments." International Journal of Contents 8, no. 3 (September 28, 2012): 79–82. http://dx.doi.org/10.5392/ijoc.2012.8.3.079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Lijun Sang. "Attribute-policy handshake for Remote User Authentication Scheme." International Journal of Digital Content Technology and its Applications 5, no. 12 (December 31, 2011): 332–38. http://dx.doi.org/10.4156/jdcta.vol5.issue12.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Liu, Xin, Man Guo, Xuzhou Li, and Bin Zhang. "An online/offline distributed attribute-based authentication scheme." Journal of Physics: Conference Series 1607 (August 2020): 012044. http://dx.doi.org/10.1088/1742-6596/1607/1/012044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wei, Jianghong, Xuexian Hu, and Wenfen Liu. "Two-factor authentication scheme using attribute and password." International Journal of Communication Systems 30, no. 1 (December 29, 2014): e2915. http://dx.doi.org/10.1002/dac.2915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Liu, Xin, Man Guo, Bin Zhang, and Xuzhou Li. "A lightweight attribute-based authentication system with DAA." Journal of Physics: Conference Series 1601 (July 2020): 032025. http://dx.doi.org/10.1088/1742-6596/1601/3/032025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Usha, S., and P. Sangeetha. "Multiple Attribute Authority based Access Control and Anonymous Authentication in Decentralized Cloud." Bonfring International Journal of Data Mining 6, no. 3 (June 30, 2016): 24–29. http://dx.doi.org/10.9756/bijdm.7019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Liu, Yan Bing, and Wen Jing Ren. "Attribute-Based Authentication Protocol of the Internet of Things." Advanced Materials Research 765-767 (September 2013): 1726–29. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1726.

Full text
Abstract:
Security and privacy is always the most important issues by the public in the Internet of Things. The core problems are associated with the diversifying of the Internet towards an Internet of things, and the different requirements to the security level for application. Therefore, this paper is to put forward an authentication model and protocol to cope with the problem. The protocol is adopted with attribute-based encryption to replace the traditional identity-based encryption (IBE), and then make formalization analysis to the security of the protocol by using BAN logic.
APA, Harvard, Vancouver, ISO, and other styles
22

Kim, Tae Kyung, and Jae Hoon Nah. "Analysis on the Attribute Binding based Enhanced User Authentication." International Journal of Security and Its Applications 7, no. 6 (November 30, 2013): 249–58. http://dx.doi.org/10.14257/ijsia.2013.7.6.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Zhang, Zhiqiang, Suzhen Cao, Longbo Han, and Xueyan Liu. "Attribute-Based Identity Authentication Scheme Based on Linear Codes." Journal of Physics: Conference Series 1631 (September 2020): 012139. http://dx.doi.org/10.1088/1742-6596/1631/1/012139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Moon, Jongho, Younsung Choi, and Dongho Won. "A Secure Attribute-based Authentication Scheme for Cloud Computing." KIISE Transactions on Computing Practices 22, no. 8 (August 15, 2016): 345–50. http://dx.doi.org/10.5626/ktcp.2016.22.8.345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Camenisch, Jan, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, and Franz-Stefan Preiss. "Concepts and languages for privacy-preserving attribute-based authentication." Journal of Information Security and Applications 19, no. 1 (February 2014): 25–44. http://dx.doi.org/10.1016/j.jisa.2014.03.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Liu, Zhusong, Hongyang Yan, and Zhike Li. "Server-aided anonymous attribute-based authentication in cloud computing." Future Generation Computer Systems 52 (November 2015): 61–66. http://dx.doi.org/10.1016/j.future.2014.12.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ibrahim, Maged Hamada, Saru Kumari, Ashok Kumar Das, and Vanga Odelu. "Attribute-based authentication on the cloud for thin clients." Journal of Supercomputing 74, no. 11 (January 2, 2017): 5813–45. http://dx.doi.org/10.1007/s11227-016-1948-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Lin, Guofeng, Yunhao Xia, Chun Ying, and Zhixin Sun. "F2P-ABS: A Fast and Secure Attribute-Based Signature for Mobile Platforms." Security and Communication Networks 2019 (December 19, 2019): 1–12. http://dx.doi.org/10.1155/2019/5380710.

Full text
Abstract:
Attribute-based signature (ABS) is a promising cryptographic primitive. It allows the signer to generate a signature with attributes satisfying the predicate without leaking more information, so as to provide message authenticity in an anonymous manner. However, drawbacks concerning security and efficiency hinder its applications for authentication in mobile platforms. Here, we present F2P-ABS, an escrow-free and pairing-free attribute-based signature supporting perfect signer privacy for mobile anonymous authentication. To enhance its adaptiveness to mobile platforms, a novel key extraction is proposed so that the key escrow problem is mitigated over the single authority setting. It also helps to remarkably reduce the size of the signing key. Different from existing schemes, F2P-ABS is free from pairing operations. It performs no pairing operation for verification. Without the loss of security, we prove that F2P-ABS achieves signer privacy in perfect sense. It is also proven to guarantee existential unforgeability under corrupted and adaptive chosen predicate and message attack, which is securer than existing schemes.
APA, Harvard, Vancouver, ISO, and other styles
29

Piech, Henryk, and Grzegorz Grodzki. "Probability timed automata for investigating communication processes." International Journal of Applied Mathematics and Computer Science 25, no. 2 (June 1, 2015): 403–14. http://dx.doi.org/10.1515/amcs-2015-0031.

Full text
Abstract:
Abstract Exploitation characteristics behaves as a decreasing valors factor (DVF) which can be connected with degradation processes. It is a structure that consists of independent attributes which represent situations generally connected with a given exploitation factor. The multi-attribute structure contains attributes directly and indirectly referring to the main factor. Attribute states, by definition, can only maintain or decrease their values. Such situations are met in security, reliability, exploitation, fatigues and many complex one-directed or irreversible processes. The main goal refers to protocol security analysis during the realization of the communication run that specifies the assessment of the level of current and oncoming threats connected with cryptography authentication. In the communication run, the operations of different protocols mutually interleave. Our concept is based on the algorithm of attributes correction during exploitation process realization (Blanchet et al., 2008). The monitoring and correcting procedures make it possible to provide forecast information about possible threats on the basis of the structure of the current attribute values.
APA, Harvard, Vancouver, ISO, and other styles
30

Han, Jinguang, Maoxuan Bei, Liqun Chen, Yang Xiang, Jie Cao, Fuchun Guo, and Weizhi Meng. "Attribute-Based Information Flow Control." Computer Journal 62, no. 8 (May 13, 2019): 1214–31. http://dx.doi.org/10.1093/comjnl/bxz018.

Full text
Abstract:
Abstract Information flow control (IFC) regulates where information is permitted to travel within information systems. To enforce IFC, access control encryption (ACE) was proposed to support both the no read-up rule and the no write-down rule. There are some problems in existing schemes. First, the communication cost is linear with the number of receivers. Second, senders are not authenticated, namely an unauthorized sender can send a message to a receiver. To reduce communication cost and implement sender authentication, we propose an attribute-based IFC (ABIFC) scheme by introducing attribute-based systems into IFC. Our ABIFC scheme captures the following features: (i) flexible IFC policies are defined over a universal set of descriptive attributes; (ii) both the no read-up rule and the no write-down rule are supported; (iii) the communication cost is linear with the number of required attributes, instead of receivers; (iv) receivers can outsource heavy computation to a server without compromising data confidentiality; (v) authorized senders can control release their attributes when sending messages to receivers. To the best of our knowledge, it is the first IFC scheme where flexible policies are defined over descriptive attributes and outsourced computation is supported.
APA, Harvard, Vancouver, ISO, and other styles
31

PARK, Haeryong. "Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme." IEICE Transactions on Communications E92-B, no. 9 (2009): 2946–47. http://dx.doi.org/10.1587/transcom.e92.b.2946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Lee, Won-Jin, Kee-Won Kim, and HyunSung Kim. "Ticket-Based Authentication Protocol Using Attribute Information over Home Network." IEMEK Journal of Embedded Systems and Applications 7, no. 1 (February 28, 2012): 53–59. http://dx.doi.org/10.14372/iemek.2012.7.1.053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Zhang, Qi, Yi Mu, and Minjie Zhang. "Attribute-based authentication for multi-agent systems with dynamic groups." Computer Communications 34, no. 3 (March 2011): 436–46. http://dx.doi.org/10.1016/j.comcom.2010.06.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Marco, Lourdes, Alejandro Pozo, Gabriel Huecas, Juan Quemada, and Álvaro Alonso. "User-Adapted Web Services by Extending the eIDAS Specification with Functional Attributes." International Journal of Environmental Research and Public Health 18, no. 8 (April 9, 2021): 3980. http://dx.doi.org/10.3390/ijerph18083980.

Full text
Abstract:
To provide web services adapted to the users’ functional capabilities, diversity must be considered from the conceptualization and design phases of the services’ development. In previous work, we proposed a model that allows the provisioning of adapted interfaces based on users’ identity and their functional attributes to facilitate this task for software designers and developers. However, these identities and attributes are self-declared by the users, which may impact reliability and usability. In this work, we propose an extension of our model to resolve these deficiencies by delegating the identity and attributes’ provision to external certified entities. The European electronic Identification, Authentication and Trust Services (eIDAS) regulation established a solution to ensure the cross-border mutual recognition of Electronic Identification (eID) mechanisms among the European Member States. This research aims to provide an extension of this regulation mentioned above (eIDAS) to support functional attributes and connect our previously proposed model to this extended eIDAS network. Thanks to this proposal, web services can guarantee adapted and personalized interfaces while improving the functionalities offered without any previous configuration by users and, in a reliable way, since the functional attributes belong to the users’ official eID. As the attribute set provided by eIDAS nodes only contains citizens’ personal and legal ones, we also propose a mechanism to connect the eIDAS network to external attribute providers that could extend the eIDAS profile of users with their functional attributes. We deployed a pilot to validate the proposed model consisting of an identity provider, an eIDAS node supporting the extended reference code, and an attribute provider supporting functional attributes. We also designed and implemented a simple service that supports eID authentication and serves adapted interfaces based on the retrieved extended eIDAS profile. Finally, we developed an experience for getting feedback from a set of real users with different functional capabilities. According to the results, we concluded that the generalized adoption of the proposed solution in the European digital web services will significantly improve their accessibility in terms of ease of use and adaptability to users’ capacities.
APA, Harvard, Vancouver, ISO, and other styles
35

Jia, Hongyong, Yue Chen, Julong Lan, Wei Yue, and Zhiwei Wang. "Group-based fast data packet attribute authentication in the reconfigurable networks." Intelligent Automation & Soft Computing 22, no. 4 (March 21, 2016): 535–42. http://dx.doi.org/10.1080/10798587.2016.1152776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Guo, Linke, Chi Zhang, Jinyuan Sun, and Yuguang Fang. "A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks." IEEE Transactions on Mobile Computing 13, no. 9 (September 2014): 1927–41. http://dx.doi.org/10.1109/tmc.2013.84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Qikun, Zhang, Li Yongjiao, Gan Yong, Zheng Chuanyang, Luo Xiangyang, and Zheng Jun. "Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication." IEEE Access 7 (2019): 87085–96. http://dx.doi.org/10.1109/access.2019.2926404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Mohan Kumar, M., and R. Vijayan. "Privacy authentication using key attribute-based encryption in mobile cloud computing." IOP Conference Series: Materials Science and Engineering 263 (November 2017): 042069. http://dx.doi.org/10.1088/1757-899x/263/4/042069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Han, Gang, and Hui Li. "An Authentication and Data Protection Scheme Research for Mass Storage Devices." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 36, no. 3 (June 2018): 550–57. http://dx.doi.org/10.1051/jnwpu/20183630550.

Full text
Abstract:
Universal serial bus mass storage is a widely used storage device. In order to protect the user data security in USB storage devices, an effective authentication and data protection scheme is proposed. Using the attribute-based control technology, the security authentication of the USB device user is realized, and the privacy data fine-grained control of the USB device is realized. Security analysis shows that the scheme has strong security, it can resist replay attack, denial of service attack, the online password guessing attack, user impersonation attack, etc. Experimental performance analysis shows that the scheme has high efficiency in user registration, authentication and file decryption.
APA, Harvard, Vancouver, ISO, and other styles
40

Liu, Xin, Man Guo, Bin Zhang, and Xuzhou Li. "An efficient attribute-based authentication scheme with multiple authorities in public cloud." Journal of Physics: Conference Series 1607 (August 2020): 012043. http://dx.doi.org/10.1088/1742-6596/1607/1/012043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Li, Jin, Xiaofeng Chen, and Xinyi Huang. "New attribute-based authentication and its application in anonymous cloud access service." International Journal of Web and Grid Services 11, no. 1 (2015): 125. http://dx.doi.org/10.1504/ijwgs.2015.067161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Meng, Xian Yong, Zhong Chen, and Xiang Yu Meng. "Privacy-Preserving Decentralized Key-Policy Attribute-Based Signcryption in Cloud Computing Environments." Applied Mechanics and Materials 475-476 (December 2013): 1144–49. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.1144.

Full text
Abstract:
In this paper, a novel decentralized key-policy attribute-based signcryption (ABS) scheme is proposed, where each authority can generate secret-public key pair for the user independently without any cooperation and a centralized authority. In the proposed scheme, each authority can join or leave the system randomly without reinitializing the system,and issue secret-public keys to user respectively. Therefore, it is clear that the multi-authority attribute-based access control scheme can reduce the communication cost and the collaborative computing cost. Additionally, the attribute-based signcryption scheme is efficient in terms of both the identification authentication and the confidential communication, and can realize security secret sharing in cloud computing environments.
APA, Harvard, Vancouver, ISO, and other styles
43

Zheng, Hongying, Jieming Wu, Bo Wang, and Jianyong Chen. "Modified Ciphertext-Policy Attribute-Based Encryption Scheme with Efficient Revocation for PHR System." Mathematical Problems in Engineering 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/6808190.

Full text
Abstract:
Attribute-based encryption (ABE) is considered a promising technique for cloud storage where multiple accessors may read the same file. For storage system with specific personal health record (PHR), we propose a modified ciphertext-policy attribute-based encryption scheme with expressive and flexible access policy for public domains. Our scheme supports multiauthority scenario, in which the authorities work independently without an authentication center. For attribute revocation, it can generate different update parameters for different accessors to effectively resist both accessor collusion and authority collusion. Moreover, a blacklist mechanism is designed to resist role-based collusion. Simulations show that the proposed scheme can achieve better performance with less storage occupation, computation assumption, and revocation cost compared with other schemes.
APA, Harvard, Vancouver, ISO, and other styles
44

Fong, Simon, and Yan Zhuang. "Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Data Representation by AVT Hierarchical Data Tree." Journal of Biomedicine and Biotechnology 2012 (2012): 1–11. http://dx.doi.org/10.1155/2012/539395.

Full text
Abstract:
User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user’s medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents’ medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data). Questions can be abstracted to various level of resolution (hence sensitivity of private data) for use in the authentication process. The method is described and a case study is given in this paper.
APA, Harvard, Vancouver, ISO, and other styles
45

Ho, Jiacang, and Dae-Ki Kang. "Mini-batch bagging and attribute ranking for accurate user authentication in keystroke dynamics." Pattern Recognition 70 (October 2017): 139–51. http://dx.doi.org/10.1016/j.patcog.2017.05.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Shankar, Vishnu, and Karan Singh. "An improved user authentication scheme on smartphone using dominating attribute of touch data." Journal of Discrete Mathematical Sciences and Cryptography 22, no. 8 (November 17, 2019): 1549–61. http://dx.doi.org/10.1080/09720529.2019.1695903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Papadamou, Kostantinos, Steven Gevers, Christos Xenakis, Michael Sirivianos, Savvas Zannettou, Bogdan Chifor, Sorin Teican, et al. "Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication." IEEE Transactions on Information Forensics and Security 15 (2020): 2183–93. http://dx.doi.org/10.1109/tifs.2019.2958763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Liu, Zhusong, Jinman Luo, and Lingling Xu. "A fine-grained attribute-based authentication for sensitive data stored in cloud computing." International Journal of Grid and Utility Computing 7, no. 4 (2016): 237. http://dx.doi.org/10.1504/ijguc.2016.081010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Xu, Lingling, Zhusong Liu, and Jinman Luo. "A fine-grained attribute-based authentication for sensitive data stored in cloud computing." International Journal of Grid and Utility Computing 7, no. 4 (2016): 237. http://dx.doi.org/10.1504/ijguc.2016.10001940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Kwon, Hyunsoo, Daeyeong Kim, Changhee Hahn, and Junbeom Hur. "Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks." Multimedia Tools and Applications 76, no. 19 (January 9, 2016): 19507–21. http://dx.doi.org/10.1007/s11042-015-3187-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography