Authentication Mode

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 3201 Experts worldwide ranked by ideXlab platform

Yang Yang - One of the best experts on this subject based on the ideXlab platform.

  • a new identity Authentication scheme of single sign on for multi database
    International Conference on Software Engineering, 2016
    Co-Authors: Lan Zhang, Hongyun Ning, Yunyun Du, Yang Yang
    Abstract:

    At present, multi-database identity Authentication is mostly based on centralized global user management mechanism. In this paper, we analyze the defects of the current identity Authentication in multi-database and propose a new single sign on for multi-database identity Authentication based on the idea of database union domain. Compared with the traditional methods of Authentication, the scheme adopts decentralized Authentication Mode which without centralized management, so it can avoid single point failure and single point overload, and it can also prevent password theft attack, replay attack and other various attacks. Through the case analysis, we know that the new scheme can improve the safety of the multi-database system.

Kuotsang Huang - One of the best experts on this subject based on the ideXlab platform.

  • a novel structure with dynamic operation Mode for symmetric key block ciphers
    International Journal of Network Security & Its Applications, 2013
    Co-Authors: Kuotsang Huang
    Abstract:

    Modern Internet protocols support several Modes of operation in encryption tasks for data confidentiality to keep up with varied environments and provide the various choices, such as multi-Mode IPSec support. To begin with we will provide a brief background on the Modes of operation for symmetric-key block ciphers. Different block cipher Modes of operation have distinct characteristics. For example, the cipher block chaining (CBC) Mode is suitable for operating environments that require self-synchronizing capabilities, and the output feedback (OFB) Mode requires encryption modules only. When using symmetric-key block cipher algorithms such as the Advanced Encryption Standard (AES), users performing information encryption often encounter difficulties selecting a suitable Mode of operation. This paper describes a structure for analyzing the block operation Mode combination. This unified operation structure (UOS) combines existing common and popular block Modes of operation. UOS does multi-Mode of operation with most existing popular symmetric-key block ciphers and do not only consist of encryption Mode such as electronic codebook (ECB) Mode, cipher block chaining (CBC) Mode, cipher feedback (CFB) Mode and output feedback (OFB) Mode, that provides confidentiality but also message Authentication Mode such as the cipher block chaining message Authentication code (CBC-MAC) in cryptography. In Cloud Computing, information exchange frequently via the Internet and on-demand. This research provides an overview and information useful for approaching low-resource hardware implementation, which is proper to ubiquitous computing devices such as a sensor mote or an RFID tag. The use of the method is discussed and an example is given. This provides a common solution for multiMode and this is very suitable for ubiquitous computing with several resources and environments. This study indicates a more effectively organized structure for symmetric-key block ciphers to improve their application scenarios. We can get that it is flexible in Modern communication applications.

  • the unified operation structure for symmetric key algorithm
    The Fourth International Workshop on Computer Networks & Communications, 2012
    Co-Authors: Kuotsang Huang, Sungshiou Shen, Junghui Chiu
    Abstract:

    In Cloud Computing, information exchange frequently via the Internet and on-demand. Modern Internet protocols support several Modes of operation to keep up with varied environments and provide the variant choice, such as SSL and IPSec support multi-Mode. The different Mode has the different characters. For example: CFB/OFB can be design operating without padding with bit size keystream output, CBC/CFB can self synchronize to avoid channel noise, and CFB/OFB needs encryption module only. The main emphasis is placed on the problem of case by case operation Mode usage. We describe a structure for the analysis of the block operation Mode combination. This unified operation structure, called UOS, combines existing in common and popular block Modes of operation. UOS does multi-Mode of operation with most existing popular symmetric block ciphers and do not only consist of encryption Mode such as ECB, CBC, CFB and OFB, that provides confidentiality but also message Authentication Mode such as CBC-MAC in cryptography. It provides low-resource hardware implementation, which is proper to ubiquitous computing devices such as a sensor mote or an RFID tag. Our contribution provides a common solution for multi-Mode and this is very suitable for ubiquitous computing with several resources and environments. The study indicates a better well-organized structure for symmetric block ciphers so as to improve their application scenarios.

Lan Zhang - One of the best experts on this subject based on the ideXlab platform.

  • a new identity Authentication scheme of single sign on for multi database
    International Conference on Software Engineering, 2016
    Co-Authors: Lan Zhang, Hongyun Ning, Yunyun Du, Yang Yang
    Abstract:

    At present, multi-database identity Authentication is mostly based on centralized global user management mechanism. In this paper, we analyze the defects of the current identity Authentication in multi-database and propose a new single sign on for multi-database identity Authentication based on the idea of database union domain. Compared with the traditional methods of Authentication, the scheme adopts decentralized Authentication Mode which without centralized management, so it can avoid single point failure and single point overload, and it can also prevent password theft attack, replay attack and other various attacks. Through the case analysis, we know that the new scheme can improve the safety of the multi-database system.

Yunyun Du - One of the best experts on this subject based on the ideXlab platform.

  • a new identity Authentication scheme of single sign on for multi database
    International Conference on Software Engineering, 2016
    Co-Authors: Lan Zhang, Hongyun Ning, Yunyun Du, Yang Yang
    Abstract:

    At present, multi-database identity Authentication is mostly based on centralized global user management mechanism. In this paper, we analyze the defects of the current identity Authentication in multi-database and propose a new single sign on for multi-database identity Authentication based on the idea of database union domain. Compared with the traditional methods of Authentication, the scheme adopts decentralized Authentication Mode which without centralized management, so it can avoid single point failure and single point overload, and it can also prevent password theft attack, replay attack and other various attacks. Through the case analysis, we know that the new scheme can improve the safety of the multi-database system.

Hongyun Ning - One of the best experts on this subject based on the ideXlab platform.

  • a new identity Authentication scheme of single sign on for multi database
    International Conference on Software Engineering, 2016
    Co-Authors: Lan Zhang, Hongyun Ning, Yunyun Du, Yang Yang
    Abstract:

    At present, multi-database identity Authentication is mostly based on centralized global user management mechanism. In this paper, we analyze the defects of the current identity Authentication in multi-database and propose a new single sign on for multi-database identity Authentication based on the idea of database union domain. Compared with the traditional methods of Authentication, the scheme adopts decentralized Authentication Mode which without centralized management, so it can avoid single point failure and single point overload, and it can also prevent password theft attack, replay attack and other various attacks. Through the case analysis, we know that the new scheme can improve the safety of the multi-database system.