[PDF][PDF] Information Security Risk Management Framework for University Computing Environment.
UK Singh, C Joshi - Int. J. Netw. Secur., 2017 - researchgate.net
Today's universities are on the forefront of technological advancement which makes
University'computing environment vulnerable because of its large open networks. This …
University'computing environment vulnerable because of its large open networks. This …
[PDF][PDF] A New Mutuel Kerberos Authentication Protocol for Distributed Systems.
In recent years, distributed systems, including cloud computing, are becoming increasingly
popular. They are based on traditional security mechanisms that focus on access control …
popular. They are based on traditional security mechanisms that focus on access control …
[PDF][PDF] A Lightweight Authentication Protocol in Smart Grid.
D Ghosh, C Li, C Yang - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Smart grids allow automated meter readings and facilitate two-way communications
between the smart meters and utility control centers. As the smart grid becomes more …
between the smart meters and utility control centers. As the smart grid becomes more …
Kerberos V5: Vulnerabilities and perspectives
Kerberos V5 is one of the protocols that allow the user's single sign authentication without
sending the password. It's a distributed authentication system that many organizations adopt …
sending the password. It's a distributed authentication system that many organizations adopt …
An improved password authentication scheme for smart card
CY Tsai, CS Pan, MS Hwang - … on Intelligent and Interactive Systems and …, 2017 - Springer
In recent times, Wei et al. proposed a secure smart card based on remote user password
authentication scheme. Their scheme is more secure than other schemes. In this article, we …
authentication scheme. Their scheme is more secure than other schemes. In this article, we …
Formal Analysis and Improvement of Zero-Knowledge Password Authentication Protocol
IH Masri, S Siswantyo… - 2022 5th International …, 2022 - ieeexplore.ieee.org
The Internet as a communication medium has become a common thing in society.
Communicating via the Internet requires a communication service where users are obliged …
Communicating via the Internet requires a communication service where users are obliged …
[PDF][PDF] Strong zero-knowledge Authentication based on the Session Keys (SASK)
In this article, we propose a new symmetric communication system secured, founded upon
strong zero knowledge authentication protocol based on session keys (SASK). The users' …
strong zero knowledge authentication protocol based on session keys (SASK). The users' …
Cryptanalysis of an efficient and secure smart card based password authentication scheme
CW Liu, CY Tsai, MS Hwang - … on Intelligent and Interactive Systems and …, 2017 - Springer
The user authentication scheme has been widely applied to verify the users' legality. In order
to enhance the security, the smart card has widely used in an authentication scheme …
to enhance the security, the smart card has widely used in an authentication scheme …
Password authenticated key exchange and protected password change protocols
In this paper, we propose new password authenticated key exchange (PAKE) and protected
password change (PPC) protocols without any symmetric or public-key cryptosystems. The …
password change (PPC) protocols without any symmetric or public-key cryptosystems. The …
[PDF][PDF] An Efficient Approach to Resolve Covert Channels.
MA Elsadig, YA Fadlalla - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
The competitive edge of many companies and public trust in government institutions can
often depend on the security of the information held in their systems. Breaches of that …
often depend on the security of the information held in their systems. Breaches of that …