Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card. I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware. The method uses a server that stores all cryptographic keys for the user centrally to achieve stronger security. This report is based on a previous report which tested to implement this solution, in this report I will question the security of...
Mostly we use password for Remote Authentication but Smart Card- based scheme is very promising and ...
Reforms in electronic business have presented new opportunities to use smart card technology as an e...
Abstract. A remote user authentication system has become an important part of security, along with c...
Business and organizations use computer network in a greater extension than ever before, especially ...
Conventional smart card-based authentication systems used in health care alleviate some of the secur...
Currently computer systems and software used by the average user offer less security due to rapid g...
This dissertation presents the findings of a generic model aimed at providing secure communication w...
privacy Abstract Security is the most important issue facing companies using Internet for their e-bu...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
The popularity of the Internet and the variety of services it provides has been immense. Unfortunate...
[[abstract]]For most of the resources provided by remote sites, users are charged a fee in order to ...
In this paper the idea of an enhanced security authentication procedure is presented. This procedure...
[[abstract]]The smart card-based scheme is a very promising and practical solution to remote authent...
The popularity of the Internet and the variety of services it provides has been immense. Unfortunate...
AbstractIn the recent years, we have seen the emergence and the growing of the e-business via the in...
Mostly we use password for Remote Authentication but Smart Card- based scheme is very promising and ...
Reforms in electronic business have presented new opportunities to use smart card technology as an e...
Abstract. A remote user authentication system has become an important part of security, along with c...
Business and organizations use computer network in a greater extension than ever before, especially ...
Conventional smart card-based authentication systems used in health care alleviate some of the secur...
Currently computer systems and software used by the average user offer less security due to rapid g...
This dissertation presents the findings of a generic model aimed at providing secure communication w...
privacy Abstract Security is the most important issue facing companies using Internet for their e-bu...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
The popularity of the Internet and the variety of services it provides has been immense. Unfortunate...
[[abstract]]For most of the resources provided by remote sites, users are charged a fee in order to ...
In this paper the idea of an enhanced security authentication procedure is presented. This procedure...
[[abstract]]The smart card-based scheme is a very promising and practical solution to remote authent...
The popularity of the Internet and the variety of services it provides has been immense. Unfortunate...
AbstractIn the recent years, we have seen the emergence and the growing of the e-business via the in...
Mostly we use password for Remote Authentication but Smart Card- based scheme is very promising and ...
Reforms in electronic business have presented new opportunities to use smart card technology as an e...
Abstract. A remote user authentication system has become an important part of security, along with c...