To see the other types of publications on this topic, follow the link: Authentication integrity.

Journal articles on the topic 'Authentication integrity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Authentication integrity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.

Full text
Abstract:
Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know
APA, Harvard, Vancouver, ISO, and other styles
2

Hendry Leo Kanickam, S., and L. Jayasimman. "Comparative Analysis of Hash Authentication Algorithms and ECC Based Security Algorithms in Cloud Data." Asian Journal of Computer Science and Technology 8, no. 1 (2019): 53–61. http://dx.doi.org/10.51983/ajcst-2019.8.1.2118.

Full text
Abstract:
Cloud computing is ensuring the security of stored data in cloud computing servers is one of the mainly demanding issues. In Cloud numerous security issues arises such as authentication, integrity and confidentiality. Different encryption techniques attempt to overcome these data security issues to an enormous extent. Hashing algorithm plays an important role in data integrity, message authentication, and digital signature in modern information security. For security purpose using encryption algorithm like ECC (Elliptic Curve Cryptography) and Authentication of data integrity using hashing alg
APA, Harvard, Vancouver, ISO, and other styles
3

Mr., P.Venkateshwar Rao* Mr. G.Vamshi Krishna Mr. Y. Rokesh Kumar. "A NOVEL TECHNIQUE FOR SECURE ENCRYPTED MESSAGES IN MOBILE AND PERVASIVE APPLICATIONS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 7 (2016): 1142–46. https://doi.org/10.5281/zenodo.58633.

Full text
Abstract:
More than applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, to propose two novel techniques for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. By taking advantage of the fact that the message to be authenticated must also be encrypted, to propose provably secure authentication codes that are more efficient t
APA, Harvard, Vancouver, ISO, and other styles
4

Mykletun, Einar, Maithili Narasimha, and Gene Tsudik. "Authentication and integrity in outsourced databases." ACM Transactions on Storage 2, no. 2 (2006): 107–38. http://dx.doi.org/10.1145/1149976.1149977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Capkun, S., M. Cagalj, R. Rengaswamy, I. Tsigkogiannis, J. P. Hubaux, and M. Srivastava. "Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels." IEEE Transactions on Dependable and Secure Computing 5, no. 4 (2008): 208–23. http://dx.doi.org/10.1109/tdsc.2008.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chandra, Aravinda Thejas, Rajashekara Murthy Shivarudraiah, Nagaraja Gadde, and Ravi Kumar Begur Nagarajappa. "A novel scheme for enhanced content integrity, authentication, and privacy in information centric network using lightweight blockchain-based homomorphic integrity and authentication." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 1 (2025): 654. http://dx.doi.org/10.11591/ijece.v15i1.pp654-668.

Full text
Abstract:
Information-centric networks (ICNs) face challenges in ensuring content integrity and authentication while preserving user privacy. Homomorphic encryption has been widely used to protect content privacy within ICNs. Blockchain technology is widely applied in ICNs to ensure content integrity. Conventional blockchain-based authentication schemes rely on computationally expensive homomorphic encryption to perform secure data transmission. Also, the existing cryptography methods comprise confidentiality, and integrity while sharing content in ICNs. This paper proposes a novel lightweight blockchai
APA, Harvard, Vancouver, ISO, and other styles
7

Grandhi, Suresh, and Dr P. S. Avadhani*. "Variable Me mber Group Authentication Protocol using Bivariate Polynomials." International Journal of Innovative Technology and Exploring Engineering 9, no. 5 (2020): 2269–74. http://dx.doi.org/10.35940/ijitee.b7101.039520.

Full text
Abstract:
Group authentication is required for secure group communication, which ensures that users in the group are valid. When a group user count is not fixed, group authentication has to handle the entry of new users and exit of current users from the group, if necessary. The challenges to group communication are Security, Integrity and Confidentiality. Currently, available group authentication schemes are complex that require heavy computation and communication overheads. Whenever the group membership is changed, the rekeying of group key process is a challenging task. Thus, in this paper, we propos
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Xingang, Haowen Yan, Liming Zhang, and Hao Wang. "High-Resolution Remote Sensing Image Integrity Authentication Method Considering Both Global and Local Features." ISPRS International Journal of Geo-Information 9, no. 4 (2020): 254. http://dx.doi.org/10.3390/ijgi9040254.

Full text
Abstract:
Content integrity of high-resolution remote sensing (HRRS) images is the premise of its usability. Existing HRRS image integrity authentication methods are mostly binary decision-making processes, which cannot provide a further interpretable information (e.g., tamper localization, tamper type determination). Due to this reason, a robust HRRS images integrity authentication algorithm using perceptual hashing technology considering both global and local features is proposed in this paper. It extracts global features by the efficient recognition ability of Zernike moments to texture information.
APA, Harvard, Vancouver, ISO, and other styles
9

H.A, Dinesha, and D. H. Rao. "Evaluation of Secure Cloud Transmission Protocol." International Journal of Computer Network and Information Security 9, no. 3 (2017): 45–53. http://dx.doi.org/10.5815/ijcnis.2017.03.06.

Full text
Abstract:
Authentication, Authorization, integrity, availability and confidentiality are important aspects in cloud computing services. Cloud services market demands can be increased by enhancing the authentication, data confidentiality and customer trust. To achieve strong authentication, security and to earn customer trust, we had proposed and published secure cloud transmission protocol (SecCTP) which describes SecCTP techniques in detail. In this paper, we evaluated the SecCTP and presented the GUI implementation. We discuss the applicability, usefulness and advantages of SecCTP techniques i.e. mult
APA, Harvard, Vancouver, ISO, and other styles
10

Ankush, S., and M. S. Vinayprasad. "Enhance Security for Authentication." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 3 (2020): 311–15. https://doi.org/10.35940/ijrte.C4429.099320.

Full text
Abstract:
An enhanced security for authentication is defined because it is vital that authentication is an extremely important crucial robust process for each user to access any of the applications. Magnificent growth and usage of the internet raise agitate about the way to communicate, protect data and sensitive information safely. In today's world hackers use differing types of attacks in order to acquire valuable information. Many of the attacks are primarily used to get into an application to steal the credentials followed by internal information of the users. The first thing of security is defi
APA, Harvard, Vancouver, ISO, and other styles
11

Jain, Avinash, and V. Kapoor. "Novel Hybrid Cryptography for Confidentiality, Integrity, Authentication." International Journal of Computer Applications 171, no. 8 (2017): 35–40. http://dx.doi.org/10.5120/ijca2017915151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Nazar, Rahma, and Shahd Abdulrhman Hasso. "A Review for Video Authentication and Integrity." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 8 (2022): 18–22. http://dx.doi.org/10.47577/technium.v4i8.7210.

Full text
Abstract:
In daily life, digital video authentication is a crucial problem. Digital videos may be recorded or captured by many different devices, and these can all be sent through the internet and other unsecured means. Due to the advancement of video editing tools, there is an issue with the editing or changing of digital video without authorization. There are many different methods and techniques, which are suggested for overcoming these problems. Digital video is the fundamental of surveillance system. However, it is easy to be modified by threats that may decrease drastically the trust of surveillan
APA, Harvard, Vancouver, ISO, and other styles
13

Harn, Lein, Hung-Yu Lin, and Shoubao Yang. "A software authentication system for information integrity." Computers & Security 11, no. 8 (1992): 747–52. http://dx.doi.org/10.1016/0167-4048(92)90130-j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Allyson Eddy, Bram Zoe anak Guillan, Einstein Kent Elias, Eldren Aniell, Shircrayson bin Simon, and Muhammad Faisal. "Blockchain-Enhanced Multi-Factor Authentication for Securing IIoT." International Journal of Electrical Engineering, Mathematics and Computer Science 1, no. 3 (2024): 01–24. http://dx.doi.org/10.62951/ijeemcs.v1i3.16.

Full text
Abstract:
This paper proposes Blockchain-Enhanced Multi-Factor Authentication (BEMFA) to address the limitations of existing authentication mechanisms in the Industrial Internet of Things (IIoT). BEMFA combines multi-factor authentication (MFA) with blockchain technology to ensure robust, scalable, and tamper-resistant security tailored to IIoT environments. This method dynamically manages roles and permissions, detects malicious devices, and ensures data integrity and authenticity. Our results demonstrate that BEMFA significantly enhances security, addressing critical access control challenges and miti
APA, Harvard, Vancouver, ISO, and other styles
15

ALTAF HUSSAIN, SAKIINAH, AZNI HASLIZAN AB HALIM, and NAJWA HAYAATI MOHD ALWI. "SYSTEMATIC LITERATURE REVIEW FOR LIGHTWEIGHT AUTHENTICATION ALGORITHM IN THE IoT." JOURNAL OF SUSTAINABILITY SCIENCE AND MANAGEMENT 17, no. 9 (2022): 162–78. http://dx.doi.org/10.46754/jssm.2022.09.011.

Full text
Abstract:
The Internet of Things (IoT) being a promising technology of the future is expected to generate a tremendous amount of data that may be exposed to security flaws. Hence, to protect IoT applications from hackers, lightweight cryptography has been identified as one of the suitable mechanisms since it is designed to fulfil security demands in resource-constrained hardware and software. This paper aims to analyse the current security requirements in designing lightweight cryptography for IoT applications, specifically for integrity and authentication algorithms. There are three objectives to focus
APA, Harvard, Vancouver, ISO, and other styles
16

Manazipet, Pranitha, Sai Nukesh Matta, Vivek Kumar Ananthula, and Vive Harini. "DATA SECURITY ENHANCEMENT IN CLOUD COMPUTING USING AES ENCRYPTION." International Journal of Advanced Logistics, Transport and Engineering 8, no. 4 (2023): 34–51. http://dx.doi.org/10.52167/2790-5829-2023-8-4-34-51.

Full text
Abstract:
. Cloud computing has transformed data storage and access, yet it has raised significant security and privacy concerns. This article advocates the use of various encryption methods to protect data in the cloud. It discusses threats to data integrity and supports secure encryption techniques. The proposed framework integrates authentication and encrypted data transfer using 256-bit AES algorithm with token exchange for better security and trust. In addition, a web-based AES- CBC-256 encryption and decryption mechanism for cloud files is proposed. The study also recommends a bulk authentication
APA, Harvard, Vancouver, ISO, and other styles
17

Gaata, Methaq Talib, and Dr Mustafa Dhiaa Al-Hassani. "Authentication and Integrity of E-documents based on Zero-Watermarking Method." Webology 19, no. 1 (2022): 5058–67. http://dx.doi.org/10.14704/web/v19i1/web19340.

Full text
Abstract:
During the last period, due increase the use of e-government applications and the health conditions that occurred as a result of the spread of the Corona virus, the using of e-documents has become increasingly common. Therefore, there was an urgent need to ensure the authenticity of the source and integrity of the e-documents and that they are free from forgery and manipulation. In this paper, the zero-watermarking method has been proposed in order to achieve the authentication and integrity of e-documents and to determine the regions which tampered. The main idea is based on segment the e-doc
APA, Harvard, Vancouver, ISO, and other styles
18

Rahayu, Maya, Md Biplob Hossain, Samsul Huda, Yuta Kodera, Md Arshad Ali, and Yasuyuki Nogami. "The Design and Implementation of Kerberos-Blockchain Vehicular Ad-Hoc Networks Authentication Across Diverse Network Scenarios." Sensors 24, no. 23 (2024): 7428. http://dx.doi.org/10.3390/s24237428.

Full text
Abstract:
Vehicular Ad-Hoc Networks (VANETs) play an essential role in the intelligent transportation era, furnishing users with essential roadway data to facilitate optimal route selection and mitigate the risk of accidents. However, the network exposure makes VANETs susceptible to cyber threats, making authentication crucial for ensuring security and integrity. Therefore, joining entity verification is essential to ensure the integrity and security of communication in VANETs. However, to authenticate the entities, authentication time should be minimized to guarantee fast and secure authentication proc
APA, Harvard, Vancouver, ISO, and other styles
19

Chandra, Aravinda Thejas, Rajashekara Murthy Shivarudraiah, Nagaraja Gadde, and Ravi Kumar Begur Nagarajappa. "A novel scheme for enhanced content integrity, authentication, and privacy in information centric network using lightweight blockchain-based homomorphic integrity and authentication." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 1 (2025): 654–68. https://doi.org/10.11591/ijece.v15i1.pp654-668.

Full text
Abstract:
Information-centric networks (ICNs) face challenges in ensuring content  integrity and authentication while preserving user privacy. Homomorphic encryption has been widely used to protect content privacy within ICNs. Blockchain technology is widely applied in ICNs to ensure content integrity. Conventional blockchain-based authentication schemes rely on computationally expensive homomorphic encryption to perform secure data transmission. Also, the existing cryptography methods comprise confidentiality, and integrity while sharing content in ICNs. This paper&nb
APA, Harvard, Vancouver, ISO, and other styles
20

Shah, Richa, and Shatendra Kumar Dubey. "Multi User Authentication for Reliable Data Storage in Cloud Computing." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 2 (2024): 82–89. http://dx.doi.org/10.32628/cseit2410138.

Full text
Abstract:
Today's digital environment, Multi-user authentication plays a crucial role in ensuring data integrity and confidentiality, emphasizing its importance of reliable and secure data storage in cloud computing environments. The exploration extends to the strategies for implementing secure multi-user authentication, encompassing aspects such as password policies, biometric verification, encryption, role-based access control (RBAC), and multi-factor authentication (MFA). The issue of reliable data storage is covered in further detail, on the importance of data availability and integrity. Real-world
APA, Harvard, Vancouver, ISO, and other styles
21

Ling, Fang Ting, Ng Hui Wen, Tsi Shi Ping, Vivian Bong Chiaw Cin, Yew Wei Yi, and Muhammad Faisal. "Enhancing Aspects of IIoT Networks with Federated Learning Blockchain Integrated Authentication Solution." International Journal of Electrical Engineering, Mathematics and Computer Science 1, no. 3 (2024): 25–42. http://dx.doi.org/10.62951/ijeemcs.v1i3.17.

Full text
Abstract:
The Industrial Internet of Things (IIoT) faces various challenges in ensuring secure communication, authentication, and data integrity due to its distributed nature and evolving threat landscape. To address these issues, this paper proposes the integration of blockchain authentication as a robust solution to enhance security and reliability in IIoT networks. By leveraging Federated Learning with blockchain technology, the proposed solution aims to improve authentication mechanisms by training models across multiple edge devices, increasing fault tolerance, and adaptability while reducing the r
APA, Harvard, Vancouver, ISO, and other styles
22

Hung-Yu Chien. "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity." IEEE Transactions on Dependable and Secure Computing 4, no. 4 (2007): 337–40. http://dx.doi.org/10.1109/tdsc.2007.70226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Kanjanapruthipong, Wata, and Sirapat Boonkrong. "Blockchain-Based Decentralised Authentication in Closed Environments." Future Internet 17, no. 3 (2025): 98. https://doi.org/10.3390/fi17030098.

Full text
Abstract:
Traditional authentication systems with an authentication server that handles authentication requests from many clients have a major weakness, i.e., a single point of failure. This study presents an authentication paradigm based on blockchain, which provides a decentralised and distributed mechanism for processing authentication. The security of the proposed design of the decentralised authentication protocol was evaluated using Gong–Needham–Yahalom (GNY) logic. The results indicated that the protocol was secure against various attacks. This protocol has significant potential for enhancing sec
APA, Harvard, Vancouver, ISO, and other styles
24

Guan, Ming Shan, and Hai Feng Ma. "Confidentiality and Integrity Protection Method Based on One Time Encryption." Applied Mechanics and Materials 241-244 (December 2012): 2434–38. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2434.

Full text
Abstract:
Abstract. Aiming at current problem of high computing overhead of encryption and authentication, this paper proposes a confidentiality and integrity protection method based on one time encryption. The method packages data block and verification data together, and then encrypts it. The confidentiality is guaranteed by traditional encryption mode and the integrity is guaranteed by decrypted verification data. Analysis and simulation show that the method has less time and space overhead than standard encryption and authentication mode. The method can be applied to other integrity and confidential
APA, Harvard, Vancouver, ISO, and other styles
25

S, Ms Pratyaksha. "SECURE & VERIFIABLE E VOTING USING BLOCKCHAIN." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34546.

Full text
Abstract:
In response to the persistent challenges surrounding the aspect of security, verifiability of electronic voting (e-voting) systems, this paper proposes an innovative approach. By incorporating blockchain technology into face recognition authentication, our solution aims to fortify the integrity and transparency of the voting process. Blockchain offers a distributed and immutable ledger, ensuring data integrity, while face recognition authentication offers an additional layer of security. This integrated system establishes a secure and transparent platform for casting and verifying votes, offer
APA, Harvard, Vancouver, ISO, and other styles
26

Golar, Priti C., and Rika Sharma. "An Advanced Knowledge Based Graphical Authentication Framework with Guaranteed Confidentiality and Integrity." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 720–30. http://dx.doi.org/10.17762/ijritcc.v11i8s.7676.

Full text
Abstract:
The information and security systems largely rely on passwords,which remain the fundamental part of any authentication process. The conventional authentication method based on alphanumerical username and password suffer from significant disadvantages. The graphical password-based authentication system has recently been introduced as an effective alternative. Although the graphical schemes effectively generate the passwords with better flexibility and enhanced security, the most common problem with this is the shoulder surfing attack. This paper proposes an effective 3D graphical password authe
APA, Harvard, Vancouver, ISO, and other styles
27

Mohammed, Mazen, Alaa Eldin Rohiem, and Ali El-moghazy. "Enhancement Packet Authentication and integrity in SRTP Protocol." International Conference on Electrical Engineering 7, no. 7 (2010): 1–12. http://dx.doi.org/10.21608/iceeng.2010.33243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Capkun, Srdjan, Mario Cagalj, Ghassan Karame, and Nils Ole Tippenhauer. "Integrity Regions: Authentication through Presence in Wireless Networks." IEEE Transactions on Mobile Computing 9, no. 11 (2010): 1608–21. http://dx.doi.org/10.1109/tmc.2010.127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Yavuz, Attila Altay. "Immutable Authentication and Integrity Schemes for Outsourced Databases." IEEE Transactions on Dependable and Secure Computing 15, no. 1 (2018): 69–82. http://dx.doi.org/10.1109/tdsc.2016.2530708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Agrawal, Arpit, and Shubhangi Verma. "A Tpa-Authentication Scheme for Public Cloud Using Kerberos Protocol." Oriental journal of computer science and technology 10, no. 2 (2017): 460–66. http://dx.doi.org/10.13005/ojcst/10.02.29.

Full text
Abstract:
Cloud computing is the new generation technology provides the way of sharing of resources, memory, software anything in the form of service using internet. Security is an important and unique phenomenon gives safe and isolated environment. Security model and principles are defined to implement security features with any applications. Confidentiality, authentication and integrity are primary principles for trust establishment. Existing work only concentrates on integrity concept and does not imposes for authentication or access control. A Kerberos based strong authentication scheme has been gen
APA, Harvard, Vancouver, ISO, and other styles
31

Phin, Ch’ng Chen, Nurul Hidayah Ab Rahman, and Noraini Che Pa. "A Digital Image Watermarking System: An Application of Dual Layer Watermarking Technique." JOIV : International Journal on Informatics Visualization 1, no. 4-2 (2017): 199. http://dx.doi.org/10.30630/joiv.1.4-2.78.

Full text
Abstract:
Watermarking is a method to digitally sign a product to provide authentication and prevent copyright infringement to proving the ownership of a product and provides integrity for companies to protect their product. In this study, dual layer watermark that applies two different watermarking techniques at each layer is presented. The first layer applies the LSB Substitution technique while the second layer uses the Discrete Wavelet Transform (DWT) technique. This implies greater integrity as it contains of two signatures in providing authentication.
APA, Harvard, Vancouver, ISO, and other styles
32

Xu, Dingjie, Na Ren, and Changqing Zhu. "Integrity Authentication Based on Blockchain and Perceptual Hash for Remote-Sensing Imagery." Remote Sensing 15, no. 19 (2023): 4860. http://dx.doi.org/10.3390/rs15194860.

Full text
Abstract:
The integrity of remote-sensing image data is susceptible to corruption during storage and transmission. Perceptual hashing is a non-destructive data integrity-protection technique suitable for high-accuracy requirements of remote-sensing image data. However, the existing remote-sensing image perceptual hash-authentication algorithms face security issues in storing and transmitting the original perceptual hash value. This paper proposes a remote-sensing image integrity authentication method based on blockchain and perceptual hash to address this problem. The proposed method comprises three par
APA, Harvard, Vancouver, ISO, and other styles
33

Gurpreet, Kour Sodhi, Singh Gaba Gurjot, Kansal Lavish, et al. "Preserving Authenticity and Integrity of Distributed Networks through Novel Message Authentication Code." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1297–304. https://doi.org/10.11591/ijeecs.v12.i3.pp1297-1304.

Full text
Abstract:
In this era of universal electronic connectivity, communication is no more confined to transfer of data from one end to the other; rather it aims at secure data transfer. Communication sector has developed beyond this traditional boundary of data transfer and is now working on ways to provide data from the intended senders to the intended receivers in an unaltered form. Considering all these conditions, the data transfer needs to follow the principles of authentication, confidentiality and integrity. The former two have been addressed using digital signatures and encryption schemes respectivel
APA, Harvard, Vancouver, ISO, and other styles
34

Zhang, Tiantian, Zhiyong Zhang, Kejing Zhao, Brij B. Gupta, and Varsha Arya. "A Lightweight Cross-Domain Authentication Protocol for Trusted Access to Industrial Internet." International Journal on Semantic Web and Information Systems 19, no. 1 (2023): 1–25. http://dx.doi.org/10.4018/ijswis.333481.

Full text
Abstract:
This paper proposes a hierarchical framework for industrial Internet device authentication and trusted access as well as a mechanism for industrial security state perception, and designs a cross-domain authentication scheme for devices on this basis. The scheme obtains hardware device platform configuration register (PCR) values and platform integrity measure through periodic perception, completes device identity identification and integrity measure verification when device accessing and data transmission requesting, ensures secure and trustworthy access and interoperation of devices, and desi
APA, Harvard, Vancouver, ISO, and other styles
35

Journal, IJSREM. "TRANSACTORY AUTHENTICATION USING KERBEROS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–13. http://dx.doi.org/10.55041/ijsrem28321.

Full text
Abstract:
The paper introduces a novel transactional authentication framework for distributed environments, built upon the established Kerberos protocol. This framework tackles the security vulnerabilities inherent in multi-client and server interactions during transactions, ensuring robust authentication, data integrity, and confidentiality. By utilizing the Key Distribution Center's (KDC) trusted third-party function in Kerberos, the framework provides clients with time-limited session tickets, eliminating the requirement for repeated authentication during a transaction. This novel strategy promotes a
APA, Harvard, Vancouver, ISO, and other styles
36

Gao, Xiao, Wenyin Zhang, Bin Zhao, Jiqun Zhang, Jiuru Wang, and Yilong Gao. "Product Authentication Technology Integrating Blockchain and Traceability Structure." Electronics 11, no. 20 (2022): 3314. http://dx.doi.org/10.3390/electronics11203314.

Full text
Abstract:
To tackle the problems of questioning the authenticity of products faced in e-commerce live streaming and the low data integrity in the process of product transactions, the concept of traceability and a product authentication scheme that integrates blockchain technology and traceability are proposed. The proposed scheme deploys the product authentication strategy on the Ethereum blockchain in the form of a smart contract and calls the product authentication method on the traceability body by executing the smart contract to realize the authentication of product quality. A combination of on-chai
APA, Harvard, Vancouver, ISO, and other styles
37

Echandouri, Bouchra, Fouzia Omary, Fatima Ezzahra Ziani, and Anas Sadak. "SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm." International Journal of Information Security and Privacy 12, no. 3 (2018): 16–26. http://dx.doi.org/10.4018/ijisp.2018070102.

Full text
Abstract:
This article describes how the simplicity of data transmission made eavesdropping by malicious people easier. This became one the flaws of computer security that needs to be handled. In order to establish a secure data communication, many data security techniques were developed to ensure privacy, integrity and authenticity. One of the techniques developed was to fulfill authentication with a message authentication code (MAC) that was defined by the National Institute of Standards and Technology. It is still a powerful data integrity and authentication tool that provides better protection than
APA, Harvard, Vancouver, ISO, and other styles
38

S, Er Gowsalya,. "IDsMA: AN INTEGRATED DIGITAL SIGNATURE AND MUTUAL AUTHENTICATION MECHANISM FOR SECURING THE COGNITIVE RADIO NETWORKS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31071.

Full text
Abstract:
IDsMA, an Integrated Digital Signature and Mutual Authentication mechanism, is proposed to enhance the security of Cognitive Radio Networks (CRNs). With the proliferation of wireless communication, CRNs face increasing vulnerabilities to unauthorized access and malicious attacks. IDsMA addresses these concerns by offering a robust solution that combines digital signatures and mutual authentication protocols. By employing digital signatures, IDsMA ensures the authenticity and integrity of transmitted data, mitigating the risk of data tampering or forgery. Additionally, mutual authentication pro
APA, Harvard, Vancouver, ISO, and other styles
39

K. Sodhi, Gurpreet, Gurjot S. Gaba, Lavish Kansal, et al. "Preserving Authenticity and Integrity of Distributed Networks through Novel Message Authentication Code." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1297. http://dx.doi.org/10.11591/ijeecs.v12.i3.pp1297-1304.

Full text
Abstract:
<p>In this era of universal electronic connectivity, communication is no more confined to transfer of data from one end to the other; rather it aims at secure data transfer. Communication sector has developed beyond this traditional boundary of data transfer and is now working on ways to provide data from the intended senders to the intended receivers in an unaltered form. Considering all these conditions, the data transfer needs to follow the principles of authentication, confidentiality and integrity. The former two have been addressed using digital signatures and encryption schemes re
APA, Harvard, Vancouver, ISO, and other styles
40

Ruba, N., and A. S. A. Khadir. "Session password Blum–Goldwasser cryptography based user three layer authentication for secured financial transaction." Scientific Temper 15, no. 01 (2024): 1826–31. http://dx.doi.org/10.58414/scientifictemper.2024.15.1.34.

Full text
Abstract:
Cloud computing is an eminent and evolving technology that offers various services such as data transaction, authentication, distribution and so on. In this article, session password Blum–Goldwasser Cryptography based user authentication (SPBGCUA) method is proposed to enhance the communication security of cloud services with minimum overhead. Moreover, SPBGCUA is a cryptographic technique that provides secured authentication mechanism for financial transaction with higher confidentiality rate. In order to fill the security lack of recent authentication techniques, this method develops dynamic
APA, Harvard, Vancouver, ISO, and other styles
41

Talekar, P. R. "Harmonizing Blockchain-Based Authentication Systems with Yogic Principles: Towards Enhanced Privacy in Digital Identity Management." International Journal of Advance and Applied Research 5, no. 12 (2024): 150–52. https://doi.org/10.5281/zenodo.11655957.

Full text
Abstract:
In today's digital landscape, establishing trust in decentralized systems is a paramount concern for ensuring the security and integrity of online transactions and interactions. Blockchain technology has emerged as a promising solution, offering immutable and transparent record-keeping mechanisms. However, traditional blockchain-based authentication systems often lack a nuanced understanding of human trust dynamics and social interactions. This research proposes a novel approach to blockchain-based authentication systems informed by Yogic philosophy—a profound tradition that emphasizes p
APA, Harvard, Vancouver, ISO, and other styles
42

Wei, Qiang, Ze Hui Wu, Rong Hua Tao, and Dong Ren. "Authentication Algorithm Based on Hash-Tree for Web Single Sign-On." Applied Mechanics and Materials 490-491 (January 2014): 1368–73. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1368.

Full text
Abstract:
During the authentication process of web-based single sign-on system, it is insecure that all authentication messages are forwarded by the browser, and its integrity protection is not comprehensive. This vulnerability can be exploited by attackers to bypass the authentication systems, login any account. In this work we analyze the vulnerability threat model and its root causes in detail, and propose an authentication algorithm based on Hash-tree. This algorithm can not only improve the security of the system, but the processing efficiency of the system is also acceptable according to the simul
APA, Harvard, Vancouver, ISO, and other styles
43

Rehman, Shafiq Ur, Hafiz Gulfam Ahmad Umar, Muhammad Aoun, et al. "Advanced Authentication and Access Control for Encrypted Images in the 3D Cube Domain." Bulletin of Business and Economics (BBE) 12, no. 3 (2023): 640–49. http://dx.doi.org/10.61506/01.00084.

Full text
Abstract:
Image encryption techniques have been widely employed to protect the privacy of images during transmission and storage. However, the challenge lies in providing secure authentication and access control mechanisms for encrypted images in the 3D cube domain. This research focuses on addressing the issue of authentication and access control for encrypted images within the context of 3D cubes. The 3D cube domain provides a unique and efficient representation for image encryption, allowing for enhanced security and privacy. However, ensuring proper authentication and access control mechanisms while
APA, Harvard, Vancouver, ISO, and other styles
44

Nwogu, Emeka Reginald, Wilson Chukwuemeka Ahiara, and Peter Mathew Aondohemba. "Enhancing the Robustness of a Three-Layer Security Electronic Voting System Using Kerberos Authentication." ABUAD Journal of Engineering Research and Development (AJERD) 6, no. 2 (2023): 73–84. http://dx.doi.org/10.53982/ajerd.2023.0602.08-j.

Full text
Abstract:
The rapid advancements in technology have spurred interest in electronic voting systems as a means to modernize and enhance the democratic electoral process. However, ensuring the security and integrity of electronic voting systems remains a critical challenge. In this study, we present a highly secure and efficient model for an electronic voting system, featuring a robust three-layer security architecture that includes the device authentication, user authentication and network security. The proposed system incorporates Kerberos authentication and Advanced Encryption Standard (AES) to fortify
APA, Harvard, Vancouver, ISO, and other styles
45

Hao, Zhuo, Sheng Zhong, and Nenghai Yu. "A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing." International Journal of Computers Communications & Control 6, no. 2 (2011): 227. http://dx.doi.org/10.15837/ijccc.2011.2.2170.

Full text
Abstract:
<p>Cloud computing is becoming popular quickly. In cloud computing, people store their important data in the cloud, which makes it important to ensure the data integrity and availability. Remote data integrity checking enables the client to perform data integrity verification without access to the complete file. This service brings convenience to clients, but degrades the server’s performance severely. Proper schemes must be designed to reduce the performance degradation.<br /> In this paper, a time-bound ticket-based mutual authentication scheme is proposed for solving this proble
APA, Harvard, Vancouver, ISO, and other styles
46

Zhang, Xingang, He Li, Xiao Tian, Rui Zhang, and Qinglei Qi. "Certificateless Authentication Scheme Based on Blockchain in Smart Home Network." Mathematical Problems in Engineering 2022 (August 26, 2022): 1–13. http://dx.doi.org/10.1155/2022/6458461.

Full text
Abstract:
The traditional centralized intelligent home network security authentication schemes have security problems such as integrity and confidentiality, while the distributed schemes have the problem of delayed authentication. These schemes are not suitable for the intelligent home environment of edge computing. To solve these problems, a certificateless smart home network authentication scheme based on blockchain and certificateless cryptosystem is proposed to realize mutual authentication among users, intelligent terminals (ITs), and intelligent gateways (IGs). The aggregation signature scheme of
APA, Harvard, Vancouver, ISO, and other styles
47

Bojič Burgos, Jay, and Matevž Pustišek. "Decentralized IoT Data Authentication with Signature Aggregation." Sensors 24, no. 3 (2024): 1037. http://dx.doi.org/10.3390/s24031037.

Full text
Abstract:
The rapid expansion of the Internet of Things (IoT) has introduced significant challenges in data authentication, necessitating a balance between scalability and security. Traditional approaches often rely on third parties, while blockchain-based solutions face computational and storage bottlenecks. Our novel framework employs edge aggregating servers and Ethereum Layer 2 rollups, offering a scalable and secure IoT data authentication solution that reduces the need for continuous, direct interaction between IoT devices and the blockchain. We utilize and compare the Nova and Risc0 proving syste
APA, Harvard, Vancouver, ISO, and other styles
48

Lu, He-Jun, and Dui Liu. "An improved NFC device authentication protocol." PLOS ONE 16, no. 8 (2021): e0256367. http://dx.doi.org/10.1371/journal.pone.0256367.

Full text
Abstract:
Aimed at the security authentication problem between Near Field Communication (NFC) devices, this paper uses the technology of asymmetric encryption algorithm, symmetric encryption algorithm, hash function, timestamp and survival period to improve the confidentiality, performance and security of the protocol. The symmetric encryption algorithm encrypts the transmission content, while the asymmetric encryption algorithm encrypts the shared key. The whole authentication process is secure, and the key distribution is secure. The improved NFC device authentication protocol can effectively resist t
APA, Harvard, Vancouver, ISO, and other styles
49

Alsulaimi, Bader Muteb. "Blockchain integrated data processing model for enabling security in Education 4.0." Fusion: Practice and Applications 14, no. 1 (2024): 190–220. http://dx.doi.org/10.54216/fpa.140116.

Full text
Abstract:
The COVID-19 pandemic necessitated a swift shift to online learning, affecting students differently. We investigated the experiences of 62 students with disabilities in this new educational landscape. Online learning tools raise concerns about privacy and security, making it crucial to explore students' perceptions in these areas. Our findings reveal that while students with learning disabilities appreciate online learning's flexibility, they need more guidance and support. Neurodiverse students with learning disabilities are particularly aware of the need for a secure online learning environm
APA, Harvard, Vancouver, ISO, and other styles
50

Albahadily, Hassan Kassim, Ismael Abdulsatar Jabbar, Alaa Abdulhussaien Altaay, and Xunhuan Ren. "Issuing Digital Signatures for Integrity and Authentication of Digital Documents." Al-Mustansiriyah Journal of Science 34, no. 3 (2023): 50–55. http://dx.doi.org/10.23851/mjs.v34i3.1278.

Full text
Abstract:
In this paper, we developed a secure system for issuing digital signature for digital documents and certificates using message digest algorithm (MD5). The developed system is providing the integrity and authentication for certificates by combining the information of participant and supply them to MD5 algorithm to produce a unique hash key of 32 digits which is hard to guess or attack. The process provides a certificate which allows for the authentication of a document at any time. The proposed system used and tested to produce digital certificate for participant of electronic seminars in Musta
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!