Scan Science and Technology
Contact Leading Edge Experts & Companies
Authentication Module
The Experts below are selected from a list of 735 Experts worldwide ranked by ideXlab platform
Sangjae Moon – One of the best experts on this subject based on the ideXlab platform.
-
NPC – Security analysis of the Authentication Modules of Chinese WLAN standard and its implementation plan
Lecture Notes in Computer Science, 2007Co-Authors: Sangjae MoonAbstract:With the Canetti-Krawczyk (CK) model, we analyze the Authentication Module WAIs in the Chinese WLAN national security standard WAPI and its implementation plan respectively. The security weaknesses of WAI in the original WAPI are presented; then WAI in the implementation plan is proved secure in the CK model; at last we point out how the implementation plan overcomes the security weaknesses in the original WAPI.
-
On the security of the Authentication Module of chinese WLAN standard implementation plan
Lecture Notes in Computer Science, 2006Co-Authors: Sangjae MoonAbstract:Compared with the original standard, the greatest change that WAPI (Chinese WLAN security standard) implementation plan made lies in the key-agreement protocol in WAI (Wireless Authentication Infrastructure). This contribution presents a security analysis of the WAI Module in the implementation plan with the Canetti-Krawczyk (CK) model. The results indicate that if the elliptic curve encryption scheme ECES adopted is secure against adaptive chosen ciphertext attack (CCA2 attack), then its key-agreement protocol is secure in the CK model, and it realizes the mutual identity Authentication between STA (station) and AP (access point).
-
ACNS – On the security of the Authentication Module of chinese WLAN standard implementation plan
RoboCup 2005: Robot Soccer World Cup IX, 2006Co-Authors: Sangjae MoonAbstract:Compared with the original standard, the greatest change that WAPI (Chinese WLAN security standard) implementation plan made lies in the key-agreement protocol in WAI (Wireless Authentication Infrastructure). This contribution presents a security analysis of the WAI Module in the implementation plan with the Canetti-Krawczyk (CK) model. The results indicate that if the elliptic curve encryption scheme ECES adopted is secure against adaptive chosen ciphertext attack (CCA2 attack), then its key-agreement protocol is secure in the CK model, and it realizes the mutual identity Authentication between STA (station) and AP (access point).
Junwei Cheng – One of the best experts on this subject based on the ideXlab platform.
-
Design of Module software for IPTV set-top box
2009 International Conference on Test and Measurement, 2009Co-Authors: Xianzhang Feng, Junwei ChengAbstract:In order to achieve the functions of online video-on-demand and watching of network’s video files, with the rapid development of the Ethernet, in which provides a platform to realize those functions, moreover, it can supply an opportunity to promote for them. The research designs a network set-top box which is based on IP network technology. Through the software design of those Modules: the network access Module, the registration and Authentication Module, the browser Module, the Qtserver (input method) Module, the video player Module and the audio player Module, it provides software support for network set-top box. By the means of testing, it indicates that the software can provide the driver function, and the design achieves the desired results.
Leandro Rodriguez Linares – One of the best experts on this subject based on the ideXlab platform.
-
a speaker Authentication Module in telcorreo
Text Speech and Dialogue, 2000Co-Authors: Leandro Rodriguez Linares, Carmen GarciamateoAbstract:Our experiments in Speaker Recognition showed that the combination of Speaker Verification and Utterance Verification techniques is an efficient way of improving the performance of a Speaker Authentication System.
This technique is now implemented in the speaker Authentication Module of TelCorreo, an e-mail client that allows Internet users to read their e-mail using speech through the telephone.
-
TSD – A Speaker Authentication Module in TelCorreo
Text Speech and Dialogue, 2000Co-Authors: Leandro Rodriguez Linares, Carmen García-mateoAbstract:Our experiments in Speaker Recognition showed that the combination of Speaker Verification and Utterance Verification techniques is an efficient way of improving the performance of a Speaker Authentication System.
This technique is now implemented in the speaker Authentication Module of TelCorreo, an e-mail client that allows Internet users to read their e-mail using speech through the telephone.