[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Tabassum et al., 2020 - Google Patents

An enhancement of kerberos using biometric template and steganography

Tabassum et al., 2020

Document ID
13176684219114374969
Author
Tabassum M
Sarower A
Esha A
Hassan M
Publication year
Publication venue
Cyber Security and Computer Science: Second EAI International Conference, ICONCS 2020, Dhaka, Bangladesh, February 15-16, 2020, Proceedings 2

External Links

Snippet

Kerberos, a renowned token based authentication protocol, which is famous since mid-80's for its cryptographic process, assurance of privacy, and data security for identifying appropriate users. Due to its versatile characteristics, users of the system often need to …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates

Similar Documents

Publication Publication Date Title
Li et al. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
Huang et al. A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
Kaur et al. A Secure Two‐Factor Authentication Framework in Cloud Computing
Zhao et al. A secure biometrics and PUFs-based authentication scheme with key agreement for multi-server environments
Abdellaoui et al. A novel strong password generator for improving cloud authentication
Wang et al. Cryptanalysis of Three Password‐Based Remote User Authentication Schemes with Non‐Tamper‐Resistant Smart Card
Al-Assam et al. Automated biometric authentication with cloud computing
Abusaimeh Security attacks in cloud computing and corresponding defending mechanisims
Nguyen et al. Privacy preserving biometric‐based remote authentication with secure processing unit on untrusted server
Mohammed et al. Current multi-factor of authentication: Approaches, requirements, attacks and challenges
Khan et al. A brief review on cloud computing authentication frameworks
Andola et al. An enhanced smart card and dynamic ID based remote multi-server user authentication scheme
Xu et al. Fog-enabled private blockchain-based identity authentication scheme for smart home
Fareed et al. Privacy-preserving multi-factor authentication and role-based access control scheme for the E-healthcare system
Sharma et al. A blockchain based secure communication framework for community interaction
Griffin Security for ambient assisted living: Multi-factor authentication in the internet of things
Kushwaha et al. A brief survey of challenge–response authentication mechanisms
Goel et al. LEOBAT: Lightweight encryption and OTP based authentication technique for securing IoT networks
Wang et al. A new fingerprint authentication scheme based on secret-splitting for enhanced cloud security
Abuarqoub A lightweight two-factor authentication scheme for mobile cloud computing
Tabassum et al. An enhancement of kerberos using biometric template and steganography
Gupta et al. Implementing high grade security in cloud application using multifactor authentication and cryptography
Aiash A formal analysis of authentication protocols for mobile devices in next generation networks
Abbas et al. Identifying an OpenID anti‐phishing scheme for cyberspace
Nguyen et al. Combining fuzzy extractor in biometric-kerberos based authentication protocol