Eigen-Fingerprints-Based Remote Authentication Cryptosystem

Author(s):  
Atef Bentahar ◽  
Abdallah Meraoumia ◽  
Hakim Bendjenna ◽  
Salim Chitroub ◽  
Abdelhakim Zeroual
2009 ◽  
Vol 29 (4) ◽  
pp. 950-951
Author(s):  
Xin ZHANG ◽  
Fang-wei LI ◽  
Chun-lan PAN

Symmetry ◽  
2021 ◽  
Vol 13 (5) ◽  
pp. 855
Author(s):  
Tzung-Her Chen ◽  
Wei-Bin Lee ◽  
Hsing-Bai Chen ◽  
Chien-Lung Wang

Although digital signature has been a fundamental technology for cryptosystems, it still draws considerable attention from both academia and industry due to the recent raising interest in blockchains. This article revisits the subliminal channel existing digital signature and reviews its abuse risk of the constructor’s private key. From a different perspective on the subliminal channel, we find the new concept named the chamber of secrets in blockchains. The found concept, whereby the secret is hidden and later recovered by the constructor from the common transactions in a blockchain, highlights a new way to encourage implementing various applications to benefit efficiency and security. Thus, the proposed scheme benefits from the following advantages: (1) avoiding the high maintenance cost of certificate chain of certificate authority, or public key infrastructure, and (2) seamlessly integrating with blockchains using the property of chamber of secrets. In order to easily understand the superiority of this new concept, a remote authentication scenario is taken as a paradigm of IoT to demonstrate that the further advantages are achieved: (1) avoiding high demand for storage space in IoT devices, and (2) avoiding maintaining a sensitive table in IoT server.


Author(s):  
Johan Muliadi Kerta ◽  
Panji Adiprabowo ◽  
Eva Kusmiyati ◽  
Sylvia Astri Wulandari Rahardjo

Using various applications needs more than one authentication or user and password to login. Users in BPPT found this problem on their network application. Implementation of Single Sign On can help users to use only one authentication for many applications. Therefore a research is conducted to design and implement Single Sign On system that simplify and facilitate the user's email account to access application. Data are collected from literature study, system observation, and interviews while the design uses Network Development Life Cycle (NDLC) method. The research results in a Single Sign On system that utilizez Lightweight Directory Access Protocol (LDAP). In addition, Remote Authentication Dial-In User Service (RADIUS) is managed in accordance with the needs of the institution. Single Sign On system designed runs well and is able to provide conveniences for the user to use the services of existing applications, as it provides a standard email address to the user's identity. It also helps administrators to perform control of users trying to login. 


Author(s):  
Ismail Puji Saputra ◽  
Ridwan Yusuf ◽  
Usep Saprudin

Banyaknya pengguna internet pada suatu tempat atau instansi menimbulkan sebuah antrian yang menyebabkan sulitnya pengguna dalam mengakses internet. Berdasarkan masalah tersebut penulis mengimplementasikan cloud computing sebagai radius server pada jaringan internet dengan menggunakan Router MikroTik sebagai alat manajemen bandwith, RADIUS (Remote Authentication Dial-In User Service) server akan dibangun didalam server Ubuntu dengan memanfaatkan service cloud computing dari AWS (Amazon WEB Service), selain sebagai RADIUS server, Dengan adanya RADIUS server yang dibangun dengan cloud computing dan Router MikroTik stabilitas jaringan internet pada suatu tempat atau instansi menjadi lebih baik dan proses manajemen pengguna menjadi mudah.


Author(s):  
Xavier Boyen ◽  
Yevgeniy Dodis ◽  
Jonathan Katz ◽  
Rafail Ostrovsky ◽  
Adam Smith

Author(s):  
Sasan Adibi ◽  
Gordon B. Agnew

Authentication is an important part of the authentication authorization and accounting (AAA) schemes and the extensible authentication protocol (EAP) is a universally accepted framework for authentication commonly used in wireless networks and point-to-point protocol (PPP) connections. The main focus of this chapter is the technical details to examine how EAP is integrated into the architecture of next generation networks (NGN), such as in worldwide interoperability for microwave access (WiMAX), which is defined in the IEEE 802.16d and IEEE 802.16e standards and in current wireless protocols, such as IEEE 802.11i. This focus includes an overview of the integration of EAP with IEEE 802.1x, remote authentication dial in user service (RADIUS), DIAMETER, and pair-wise master key version (2PKv2).


Sign in / Sign up

Export Citation Format

Share Document