Academia.eduAcademia.edu

Message Authentication

2,750 papers
34 followers
AI Powered
Message Authentication is a security process that ensures the integrity and authenticity of a message by verifying the identity of the sender and confirming that the message has not been altered during transmission. It employs cryptographic techniques to provide assurance that the message is genuine and unmodified.
An essential function for achieving security in computer networks is reliable authentication of communicating parties and network components. Such authentication typically relies on exchanges of cryptographic messages between the involved... more
Summary form only given. It is well known that despite all of its advantages the digital revolution also leads to large variety of new risks. One principal issue in this context is the growing dependence of our modern information society... more
For intelligent service robots, it is essential to recognize users in order to provide appropriate services to a correctly authenticated user. However, in robot environments in which users freely move around the robot, it is difficult to... more
Ensuring cryptographic integrity of the route discovery process in on demand ad hoc routing approaches like DSR require the ability to verify that no nodes have been deleted from the path, and no node can be inserted in the path without a... more
In this paper, we propose a novel scheme to achieve secure, and efficient vehicular communication. In particular, SegCom provides two mechanisms to perform successive authentication of the vehicle with the road-side infrastructure units... more
With the widespread use of the distributed systems comes the need to secure such systems against a wide variety of threats. Recent security mechanisms are grossly inadequate in authenticating the program executions at the clients or... more
Passwords are the first line of defense for many computerized systems. The quality of these passwords decides the security strength of these systems. Many studies advocate using password entropy as an indicator for password quality where... more
Product authentication is needed to detect counterfeit products and to prevent them from entering the distribution channels of genuine products. Security is a critical property of product authentication systems. In this paper, we study... more
Service-oriented applications are frequently used in highly dynamic contexts: ser- vice compositions may change dynamically, in particular, because new services are discovered at runtime. Moreover, subtyping has recently been identified... more
In this paper we propose a multifaceted online e-voting system. The proposed system is capable of handling electronic ballots with multiple scopes at the same time, e.g., presidential, municipal, parliamentary, amongst others. The system... more
Nowadays, user authentication is one of the important topics in information security. Strong text-based password schemes could provide with certain degree of security. However, the fact that strong passwords are difficult to memorize... more
Voice over IP (VoIP) is one of the most emerging technologies, with a very relevant market penetration trend. This technology will represent a cost advantage for the business and private networks with greater flexibility, if no new... more
One of the most important topics in information security today is user authentication. There is a good security when using the text-based strong password schemes but often memorizing the password is so difficult and users writing them... more
Traditional biometrics recognition system is vulnerable to privacy invasion when the stored biometric template is compromised. This in turn will suffer from permanently loss as biometric template is not replaceable In this paper, we... more
Passwords are the first line of defense for many computerized systems. The quality of these passwords decides the security strength of these systems. Many studies advocate using password entropy as an indicator for password quality where... more
This paper presents extensions to the classical pointto-point protocol PPP [RFC1661] and IPSEC [RFC 2401] in order to build networks that can do unconditionally secure message relay. Our work addresses the problem of how to integrate... more
As a high-speed internet infrastructure is being developed and people are informationized, the financial tasks are also engaged in internet field. However, the existing internet banking system was exposed to the danger of hacking.... more
This paper presents a case study highlighting the best practices for designing and developing a B2B ecommerce system. We developed a remote order-anddelivery w eb-based system for an auto-parts manufacturing company. The system... more
As a high-speed internet infrastructure is being developed and people are informationized, the financial tasks are also engaged in internet field. However, the existing internet banking system was exposed to the danger of hacking.... more
User authentication in computer systems has been a cornerstone of computer security for decades. The concept of a user id and password is a cost effective and efficient method of maintaining a shared secret between a user and a computer... more
... Fasee Ullah, Masood Ahmad, Masood Habib, Jawad Muhammad Department of Computer Sciences City ... One of the early encouraging steps towards sensor network architecture is Polastre et al. ... Aim of this protocol to solve different key... more
We introduce the concept of "green cryptography," which adopts the principle of recycling cryptographic design strategies, components, and primitives; in this essay, we'll focus on the AES, and it's underlying block cipher, Rijndael.... more
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly speaking, AMACs represent a way to provide data... more
In this paper we present an off-line signature verification and recognition system using the global, directional and grid features of signatures. Support Vector Machine (SVM) was used to verify and classify the signatures and a... more
Data integrity assurance and data origin authentication are essential security services in financial transactions, electronic commerce, electronic mail, software distribution, data storage and so on. The broadest definition of... more
Smart grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. However, communication trust and security issues still present practical concerns to... more
Research in biometric gait recognition has increased. Earlier gait recognition works reported promising results, usually with a small sample size. Recent studies with a larger sample size confirm gait potential as a biometric from which... more
This paper presents a new proposed message digest algorithm 0). Many of its characteristics (applications domain, performance and implementation structure) are similar to those of MDCfamily of hash functions. The proposed algorithm takes... more
In this paper, an image authentication technique by embedding digital "watermarks" into images is proposed. Watermarking is a technique for labeling digital pictures by hiding secret information into the images. Sophisticated watermark... more
Java TM security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release of the Java TM Platform (the Java TM 2 Software... more
It is with great pride and pleasure that I welcome you to the IEEE Southeastcon 2013 conference and exposition. On behalf of our hardworking committee people, local and from Region 3, we hope you enjoy yourself and that our conference... more
With the ever increasing amount and variety of data to be stored and transmitted in various mediums, the specification of security which has to be established at various levels of medium access and the accompanying issues of... more
WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message confidentiality, and single message authentication. These mechanisms can be used to accommodate a wide variety of... more
The term "cloud computing" has emerged as a major ICT trend and has been acknowledged by respected industry survey organizations as a key technology and market development theme for the industry and ICT users in 2010. However, one of the... more
by Wanli Ma and 
1 more
Passwords are the first line of defense for many computerized systems. The quality of these passwords decides the security strength of these systems. Many studies advocate using password entropy as an indicator for password quality where... more
Wireless access points bring great convenience to the enterprise network, and also bring a large collection of vulnerabilities into the enterprise environment. Wireless users pose new difficulties in authentication and confidentiality... more
In this paper, security issues in on-demand Grid and cluster computing are analyzed, a corresponding threat model is presented and the challenges with respect to authentication, authorization, delegation and single sign-on, secure... more
In this paper, we propose an IPSec implementation on Xilinx Virtex-II Pro FPGA 1 . We move the key management and negotiation into software function calls that run on the PowerPC processor core. On the data path, reconfigurable hardware... more
by Yufei Yuan and 
1 more
WenJie Wang is a postdoctoral fellow at the DeGroote School of Business, McMaster University, and an associate professor at Donghua University in China. Her research interests include identity theft, identity management, risk management,... more
In this paper we define and rationalize a policy for propagation of authentication trust across realm boundaries. This policy helps limit global security exposures that ensue whenever an authentication service is compromised. It is based... more
Getting users to abandon text-based passwords has been a rather difficult task. Several alternatives to textual passwords have been proposed including authentication based on images. Research shows that graphical authentication mechanisms... more