期刊文献+
共找到492篇文章
< 1 2 25 >
每页显示 20 50 100
Encryption with User Authentication Model for Internet of Medical Things Environment
1
作者 K.S.Riya R.Surendran +1 位作者 Carlos Andrés Tavera Romero M.Sadish Sendil 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期507-520,共14页
Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restric... Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques. 展开更多
关键词 user authentication SECURITY PRIVACY internet of medical things homomorphic encryption optimal key generation
下载PDF
A new modified remote user authentication scheme using smart cards 被引量:4
2
作者 SHEN Zhong-hua 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2008年第3期371-376,共6页
In 2000,a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme.Recently,Kumar has suggested the idea of check digits to overcome the above a... In 2000,a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme.Recently,Kumar has suggested the idea of check digits to overcome the above attacks with a new scheme that removes these threats well.In this paper it is pointed out that the weakness still exists in Kumar's scheme,and the intruder can login to the remote system through having some information.A new scheme which can overcome these attacks and appears more secure and efficient than Kumar's is presented. 展开更多
关键词 鉴定计划 密码学 Kumar's 远程用户 普能卡
下载PDF
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations 被引量:2
3
作者 Ezer Osei Yeboah-Boateng Grace Dzifa Kwabena-Adade 《Journal of Information Security》 2020年第3期161-175,共15页
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario... Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication. 展开更多
关键词 Remote Access Communications Security user authentication 2FA Virtual Private Network (VPN) TELECOMMUTING Threats VULNERABILITIES
下载PDF
ID-Based User Authentication Scheme for Cloud Computing 被引量:1
4
作者 Ping-Liang Chen Jen-Ho Yang Ching-I Lin 《Journal of Electronic Science and Technology》 CAS 2013年第2期221-224,共4页
In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an ide... In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an identity-based (ID-based) authentication scheme to deal with the user login problem for cloud computing. However, Wang et al.'s scheme is insecure against message alteration and impersonation attacks. Besides, their scheme has large computation costs for cloud users. Therefore, we propose a novel ID-based user authentication scheme to solve the above mentioned problems. The proposed scheme provides anonymity and security for the user who accesses different cloud servers. Compared with the related schemes, the proposed scheme has less computation cost so it is very efficient for cloud computing in practice. 展开更多
关键词 用户认证 计算环境 安全机制 计算成本 用户登录 假冒攻击 验证计划 用户访问
下载PDF
An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 被引量:1
5
作者 Ya-Fen Chang Pei-Yu Chang 《Journal of Electronic Science and Technology》 CAS 2011年第4期352-358,共7页
When accessing remote services over public networks, a user authentication mechanism is required because these activities are executed in an insecure communication environment. Recently, Wang et al. proposed an authen... When accessing remote services over public networks, a user authentication mechanism is required because these activities are executed in an insecure communication environment. Recently, Wang et al. proposed an authentication and key agreement scheme preserving the privacy of secret keys and providing user anonymity. Later, Chang et al. indicated that their scheme suffers from two security flaws. First, it cannot resist DoS (denial-of-service) attack because the indicators for the next session are not consistent. Second, the user password may be modified by a malicious attacker because no authentication mechanism is applied before the user password is updated. To eliminate the security flaws and preserve the advantages of Wang et al.'s scheme, we propose an improvement in this paper. 展开更多
关键词 用户认证 密钥协商 匿名 安全漏洞 验证机制 用户密码 远程服务 网络访问
下载PDF
A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare
6
作者 Chien-Ming Chen Shuangshuang Liu +2 位作者 Shehzad Ashraf Chaudhry Yeh-Cheng Chen Muhammad Asghar khan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第4期307-329,共23页
With the rise of the Internet of Things(IoT),the word“intelligent medical care”has increasingly become a major vision.Intelligent medicine adopts the most advanced IoT technology to realize the interaction between p... With the rise of the Internet of Things(IoT),the word“intelligent medical care”has increasingly become a major vision.Intelligent medicine adopts the most advanced IoT technology to realize the interaction between patients and people,medical institutions,andmedical equipment.However,with the openness of network transmission,the security and privacy of information transmission have become a major problem.Recently,Masud et al.proposed a lightweight anonymous user authentication protocol for IoT medical treatment,claiming that their method can resist various attacks.However,through analysis of the protocol,we observed that their protocol cannot effectively resist privileged internal attacks,sensor node capture attacks,and stolen authentication attacks,and their protocol does not have perfect forward security.Therefore,we propose a new protocol to resolve the security vulnerabilities in Masud’s protocol and remove some redundant parameters,so as tomake the protocolmore compact and secure.In addition,we evaluate the security and performance of the new protocol and prove that the overall performance of the new protocol is better than that of other related protocols. 展开更多
关键词 IOT intelligent medical user authentication
下载PDF
Smartphone User Authentication Based on Holding Position and Touch-Typing Biometrics
7
作者 Yu Sun Qiyuan Gao +1 位作者 Xiaofan Du Zhao Gu 《Computers, Materials & Continua》 SCIE EI 2019年第9期1365-1375,共11页
In this advanced age,when smart phones are the norm,people utilize social networking,online shopping,and even private information storage through smart phones.As a result,identity authentication has become the most cr... In this advanced age,when smart phones are the norm,people utilize social networking,online shopping,and even private information storage through smart phones.As a result,identity authentication has become the most critical security activity in this period of the intelligent craze.By analyzing the shortcomings of the existing authentication methods,this paper proposes an identity authentication method based on the behavior of smartphone users.Firstly,the sensor data and touch-screen data of the smart phone users are collected through android programming.Secondly,the eigenvalues of this data are extracted and sent to the server.Thirdly,the Support Vector Machine(SVM)and Recurrent Neural Network(RNN)are introduced to train the collected data on the server end,and the results are finally yielded by the weighted average.The results show that the method this paper proposes has great FRR(False Reject Rate)and FAR(False Accept Rate). 展开更多
关键词 SMARTPHONE user authentication support vector machine recurrent neural networks
下载PDF
An Enhanced Remote User Authentication Scheme
8
作者 Xiaohui Yang Xinchun Cui +1 位作者 Zhenliang Cao Ziqiang Hu 《Engineering(科研)》 2014年第6期261-267,共7页
Remote user authentication schemes are used to verify the legitimacy of remote users’ login request. Recently, several dynamic user authentication schemes have been proposed. It can be seen that, these schemes have w... Remote user authentication schemes are used to verify the legitimacy of remote users’ login request. Recently, several dynamic user authentication schemes have been proposed. It can be seen that, these schemes have weaknesses because of using timestamps. The implement of strict and safe time synchronization is very difficult and increases network overhead. In this paper, we propose a new dynamic user authentication based on nonce. Mutual authentication is performed using a challenge-response handshake between user and server, and it avoids the problems of synchronism between smart card and the remote server. Besides, the scheme provides user’s anonymity and session key agreement. Finally, the security analysis and performance evaluation show that the scheme can resist several attacks, and our proposal is feasible in terms of computation cost and communication cost. 展开更多
关键词 PASSWORD Dynamic ID user authentication SMART CARDS Nonce
下载PDF
A Self-Encryption Remote User Anonymous Authentication Scheme Using Smart Cards
9
作者 陆荣幸 曹珍富 苏仁旺 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期210-214,共5页
Remote user authentication is essential in distributed network environment to protect unauthorized access of a networked system. However, most of those existing remote user authentication schemes have not provided the... Remote user authentication is essential in distributed network environment to protect unauthorized access of a networked system. However, most of those existing remote user authentication schemes have not provided the user identity anonymity, while user anonymity is particularly important in some practical applications. Therefore, based on self-encryption mechanism, a new remote user authentication scheme was proposed. The scheme not only has no need of maintaining a password table at the remote server, but also can protect the user’s anonymity. 展开更多
关键词 密码技术 遥控技术 智能卡 技术性能
下载PDF
Security Enhanced Anonymous User Authenticated Key Agreement Scheme Using Smart Card 被引量:3
10
作者 Jaewook Jung Donghoon Lee +1 位作者 Hakjun Lee Dongho Won 《Journal of Electronic Science and Technology》 CAS CSCD 2018年第1期45-49,共5页
Nowadays, the password-based remote user authentication mechanism using smart card is one of the simplest and convenient authentication ways to ensure secure communications over the public network environments. Recent... Nowadays, the password-based remote user authentication mechanism using smart card is one of the simplest and convenient authentication ways to ensure secure communications over the public network environments. Recently, Liu et al. proposed an efficient and secure smart card based password authentication scheme. However, we find that Liu et al.'s scheme is vulnerable to the off-line password guessing attack and user impersonation attack. Furthermore, it also cannot provide user anonymity. In this paper, we cryptanalyze Liu et al.'s scheme and propose a security enhanced user authentication scheme to overcome the aforementioned problems. Especially, in order to preserve the user anonymity and prevent the guessing attack, we use the dynamic identity technique. The analysis shows that the proposed scheme is more secure and efficient than other related authentication schemes. 展开更多
关键词 authentication OFF-LINE PASSWORD guessing attack smart CARD user ANONYMITY
下载PDF
Lightweight Mutual Authentication Scheme for Protecting Identity in Insecure Environment 被引量:2
11
作者 Xu Wu Jin Xu Binxing Fang 《China Communications》 SCIE CSCD 2018年第6期158-168,共11页
Many improved authentication solutions were put forward, on purpose of authenticating more quickly and securely.However, neither the overuse of hash function,or additional symmetric encryption, can truly increase the ... Many improved authentication solutions were put forward, on purpose of authenticating more quickly and securely.However, neither the overuse of hash function,or additional symmetric encryption, can truly increase the overall security. Instead,extra computation cost degraded the performance.They were still vulnerable to a variety of threats, such as smart card loss attack and impersonation attack, due to hidden loopholes and flaws. Even worse, user's identity can be parsed in insecure environment, even became traceable. Aiming to protect identity, a lightweight mutual authentication scheme is proposed. Redundant operations are removed,which make the verification process more explicit. It gains better performance with average cost compared to other similar schemes.Cryptanalysis shows the proposed scheme can resist common attacks and achieve user anonymity.Formal security is further verified by using the widely accepted Automated Validation of Internet Security Protocols and Applications(AVISPA) tool. 展开更多
关键词 环境保护 认证 因特网安全协议 哈希函数 应用程序 验证工具 攻击 智能卡
下载PDF
Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems
12
作者 Munayfah Alanazi Shadi Nashwan 《Computer Systems Science & Engineering》 SCIE EI 2022年第8期703-725,共23页
Wireless medical sensor networks(WMSNs)play a significant role in increasing the availability of remote healthcare systems.The vital and physiological data of the patient can be collected using the WMSN via sensor nod... Wireless medical sensor networks(WMSNs)play a significant role in increasing the availability of remote healthcare systems.The vital and physiological data of the patient can be collected using the WMSN via sensor nodes that are placed on his/her body and then transmitted remotely to a healthcare professional for proper diagnosis.The protection of the patient’s privacy and their data from unauthorized access is a major concern in such systems.Therefore,an authentication scheme with a high level of security is one of the most effective mechanisms by which to address these security concerns.Many authentication schemes for remote patient monitoring have been proposed recently.However,the majority of these schemes are extremely vulnerable to attacks and are unsuitable for practical use.This paper proposes a secure three-factor authentication scheme for a patient-monitoring healthcare system that operates remotely using a WMSN.The proposed authentication scheme is formally verified using the Burrows,Abadi and Needham’s(BAN)logic model and an automatic cryptographic protocol verifier(ProVerif)tool.We show that our authentication scheme can prevent relevant types of security breaches in a practical context according to the discussed possible attack scenarios.Comparisons of the security and performance are carried out with recently proposed authentication schemes.The results of the analysis show that the proposed authentication scheme is secure and practical for use,with reasonable storage space,computation,and communication efficiency. 展开更多
关键词 Mutual authentication biometric feature perfect forward secrecy user anonymity proVerif tool BAN logic model
下载PDF
WEB远程服务器接口数据访问安全防护算法仿真
13
作者 陈强业 王强 《计算机仿真》 2024年第4期345-349,共5页
数据在远程服务接口传输的过程中,容易受到黑客的攻击,导致传输数据被盗取,为保证服务器的安全传输,提出WEB远程服务器接口数据访问安全防护算法。建立访问安全防护模型,利用安全代理和密钥授权中心,实现WEB远程服务器接口数据的安全存... 数据在远程服务接口传输的过程中,容易受到黑客的攻击,导致传输数据被盗取,为保证服务器的安全传输,提出WEB远程服务器接口数据访问安全防护算法。建立访问安全防护模型,利用安全代理和密钥授权中心,实现WEB远程服务器接口数据的安全存储。设计用户身份验证机制,保证WEB远程服务器接口数据在开放环境中的安全性。通过设计容错策略,在链路失效情况下实现WEB远程服务器接口数据的安全访问与防护。实验结果表明,所提算法的身份验证精度高、数据加解密完整度高。 展开更多
关键词 远程服务器 访问安全防护模型 用户身份验证 数据加密 容错机制
下载PDF
GIS用户中台的设计与实现
14
作者 倪文礼 吴永军 王燕午 《测绘标准化》 2024年第1期74-78,共5页
为了解决每一个与地理信息相关的应用系统,均需建立一套用户管理、部门管理、地图服务管理、权限认证机制的问题,本文借鉴“大中台、小前台”的理念,基于微服务架构设计,开发了一个可自由伸缩的地理信息系统(GIS)用户中台。该中台采用... 为了解决每一个与地理信息相关的应用系统,均需建立一套用户管理、部门管理、地图服务管理、权限认证机制的问题,本文借鉴“大中台、小前台”的理念,基于微服务架构设计,开发了一个可自由伸缩的地理信息系统(GIS)用户中台。该中台采用服务生产者、消费者的模式构建,基于SpringBoot2.0框架整合Dubbo,实现地理信息应用系统的统一权限管理和应用授权。用户中台具有用户信息统一管理系统、角色权限统一管理系统、统一认证系统、统一授权系统、日志管理系统和监控分析系统等功能。 展开更多
关键词 地理信息系统 用户中台 地图服务管理 身份认证 应用授权 微服务
下载PDF
IAM Excellence: Exploring Saviynt’s Role in Modern Information Technology
15
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期40-52,共13页
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution... Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path. 展开更多
关键词 Information Technology (IT) Identity and Access Management (IAM) Saviynt user Identities Access Privileges authentication Processes Risk Management
下载PDF
Saviynt Meets GCP: A Deep Dive into Integrated IAM for Modern Cloud Security
16
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期1-14,共14页
The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machi... The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machine learning capabilities. Saviynt is a cloud-based Identity and Access Management (IAM) system that integrates with Google Cloud Platform (GCP) and other services for additional functionality. However, other problems are associated with the transition, such as the requirement to correctly integrate IAM Saviynt into current IT infrastructures and provide comprehensive training to users on the new system. The paper will give a detailed review of the advantages, disadvantages, and best practices related to this transition. 展开更多
关键词 Google Cloud Platform (GCP) Identity and Access Management (IAM) Saviynt user Identities Access Privileges authentication Processes
下载PDF
高带宽低时延5G网络用户加密认证系统设计
17
作者 徐云松 《微型电脑应用》 2024年第2期77-80,共4页
为了保证高带宽低时延5G网络用户信息的隐私性与安全性,设计一种用户信息加密认证系统。5G网络用户通过登录模块登录网络后,其信息存于数据库模块内,在控制模块的操控下,加解密模块运用加密器调用DKE-RSA混合加密算法,对用户信息实现加... 为了保证高带宽低时延5G网络用户信息的隐私性与安全性,设计一种用户信息加密认证系统。5G网络用户通过登录模块登录网络后,其信息存于数据库模块内,在控制模块的操控下,加解密模块运用加密器调用DKE-RSA混合加密算法,对用户信息实现加密与解密处理,获得加密密钥。认证模块结合单包认证与多因子认证,认证用户身份。密钥管理模块依据身份认证结果合理分配密钥,完成5G网络用户信息的加密认证。结果显示,该系统可有效加密与解密高带宽低时延5G网络用户信息,且加解密及认证速度较快,安全性较高,可提升网络的抗攻击性能及其用户信息隐私性,避免用户信息泄露风险。 展开更多
关键词 高带宽低时延 5G网络 用户信息 加密认证 RSA加密算法 单包认证
下载PDF
基于用户身份的信息安全管控平台架构研究与应用——以南京市规划资源网为例
18
作者 赵婷婷 王寸婷 余鹏程 《无线互联科技》 2024年第4期86-89,共4页
等级保护2.0标准的发布对南京市规划自然资源城域网的网络安全和系统安全管理提出了更高的要求,文章通过研究基于用户身份的信息安全管控平台架构,建立集用户账号集中管理、身份识别集中认证、访问控制集中授权、海量日志集中综合审计... 等级保护2.0标准的发布对南京市规划自然资源城域网的网络安全和系统安全管理提出了更高的要求,文章通过研究基于用户身份的信息安全管控平台架构,建立集用户账号集中管理、身份识别集中认证、访问控制集中授权、海量日志集中综合审计于一体的安全管控平台,以不动产登记档案查询系统为案例探索实现应用系统资源接入,为南京市规划资源网提供基于用户统一身份的安全管控服务,提升规划资源信息化体系的安全性和管理能力,实现整体安全管理工作的可视、可控、可管。 展开更多
关键词 等级保护 信息安全 用户体系 身份认证
下载PDF
An insider user authentication method based on improved temporal convolutional network
19
作者 Xiaoling Tao Yuelin Yu +2 位作者 Lianyou Fu Jianxiang Liu Yunhao Zhang 《High-Confidence Computing》 EI 2023年第4期87-95,共9页
With the rapid development of information technology,information system security and insider threat detection have become important topics for organizational management.In the current network environment,user behavior... With the rapid development of information technology,information system security and insider threat detection have become important topics for organizational management.In the current network environment,user behavioral bio-data presents the characteristics of nonlinearity and temporal sequence.Most of the existing research on authentication based on user behavioral biometrics adopts the method of manual feature extraction.They do not adequately capture the nonlinear and time-sequential dependencies of behavioral bio-data,and also do not adequately reflect the personalized usage characteristics of users,leading to bottlenecks in the performance of the authentication algorithm.In order to solve the above problems,this paper proposes a Temporal Convolutional Network method based on an Efficient Channel Attention mechanism(ECA-TCN)to extract user mouse dynamics features and constructs an one-class Support Vector Machine(OCSVM)for each user for authentication.Experimental results show that compared with four existing deep learning algorithms,the method retains more adequate key information and improves the classification performance of the neural network.In the final authentication,the Area Under the Curve(AUC)can reach 96%. 展开更多
关键词 Insider users Mouse dynamics Feature extraction Temporal convolutional network Efficient channel attention mechanism authentication
原文传递
基于RADIUS和数字证书的无线网络接入认证技术研究
20
作者 王润园 葛声 荆浩 《通信电源技术》 2024年第3期140-142,共3页
随着网络技术的发展,无线网络接入认证技术的应用越来越广泛。通过远程认证拨入用户服务(Remote Authentication Dial In User Service,RADIUS)和数字证书配合使用,可以实现较为安全完善的无线网络接入认证。介绍RADIUS和数字证书的相... 随着网络技术的发展,无线网络接入认证技术的应用越来越广泛。通过远程认证拨入用户服务(Remote Authentication Dial In User Service,RADIUS)和数字证书配合使用,可以实现较为安全完善的无线网络接入认证。介绍RADIUS和数字证书的相关概念,概述使用RADIUS和数字证书进行无线网络接入时的网络拓扑与接入认证过程,给出RADIUS代理服务器、认证服务器以及数字证书的配置方法同时,给出验证该无线网络接入认证技术的方法,也是Linux客户端进行网络接入认证的方法。通过搭建RADIUS网络接入环境,使用数字证书作为认证凭证,实现客户端对无线网络的接入认证。 展开更多
关键词 远程认证拨入用户服务(RADIUS) 数字证书 无线网络接入认证技术
下载PDF
上一页 1 2 25 下一页 到第
使用帮助 返回顶部