Authentication Module - Explore the Science & Experts | ideXlab



Scan Science and Technology

Contact Leading Edge Experts & Companies

Authentication Module

The Experts below are selected from a list of 735 Experts worldwide ranked by ideXlab platform

Authentication Module – Free Register to Access Experts & Abstracts

Sangjae Moon – One of the best experts on this subject based on the ideXlab platform.

  • NPC – Security analysis of the Authentication Modules of Chinese WLAN standard and its implementation plan
    Lecture Notes in Computer Science, 2007
    Co-Authors: Sangjae Moon

    Abstract:

    With the Canetti-Krawczyk (CK) model, we analyze the Authentication Module WAIs in the Chinese WLAN national security standard WAPI and its implementation plan respectively. The security weaknesses of WAI in the original WAPI are presented; then WAI in the implementation plan is proved secure in the CK model; at last we point out how the implementation plan overcomes the security weaknesses in the original WAPI.

    Free Register to Access Article

  • On the security of the Authentication Module of chinese WLAN standard implementation plan
    Lecture Notes in Computer Science, 2006
    Co-Authors: Sangjae Moon

    Abstract:

    Compared with the original standard, the greatest change that WAPI (Chinese WLAN security standard) implementation plan made lies in the key-agreement protocol in WAI (Wireless Authentication Infrastructure). This contribution presents a security analysis of the WAI Module in the implementation plan with the Canetti-Krawczyk (CK) model. The results indicate that if the elliptic curve encryption scheme ECES adopted is secure against adaptive chosen ciphertext attack (CCA2 attack), then its key-agreement protocol is secure in the CK model, and it realizes the mutual identity Authentication between STA (station) and AP (access point).

    Free Register to Access Article

  • ACNS – On the security of the Authentication Module of chinese WLAN standard implementation plan
    RoboCup 2005: Robot Soccer World Cup IX, 2006
    Co-Authors: Sangjae Moon

    Abstract:

    Compared with the original standard, the greatest change that WAPI (Chinese WLAN security standard) implementation plan made lies in the key-agreement protocol in WAI (Wireless Authentication Infrastructure). This contribution presents a security analysis of the WAI Module in the implementation plan with the Canetti-Krawczyk (CK) model. The results indicate that if the elliptic curve encryption scheme ECES adopted is secure against adaptive chosen ciphertext attack (CCA2 attack), then its key-agreement protocol is secure in the CK model, and it realizes the mutual identity Authentication between STA (station) and AP (access point).

    Free Register to Access Article

Junwei Cheng – One of the best experts on this subject based on the ideXlab platform.

  • Design of Module software for IPTV set-top box
    2009 International Conference on Test and Measurement, 2009
    Co-Authors: Xianzhang Feng, Junwei Cheng

    Abstract:

    In order to achieve the functions of online video-on-demand and watching of network’s video files, with the rapid development of the Ethernet, in which provides a platform to realize those functions, moreover, it can supply an opportunity to promote for them. The research designs a network set-top box which is based on IP network technology. Through the software design of those Modules: the network access Module, the registration and Authentication Module, the browser Module, the Qtserver (input method) Module, the video player Module and the audio player Module, it provides software support for network set-top box. By the means of testing, it indicates that the software can provide the driver function, and the design achieves the desired results.

    Free Register to Access Article

Leandro Rodriguez Linares – One of the best experts on this subject based on the ideXlab platform.

  • a speaker Authentication Module in telcorreo
    Text Speech and Dialogue, 2000
    Co-Authors: Leandro Rodriguez Linares, Carmen Garciamateo

    Abstract:

    Our experiments in Speaker Recognition showed that the combination of Speaker Verification and Utterance Verification techniques is an efficient way of improving the performance of a Speaker Authentication System.

    This technique is now implemented in the speaker Authentication Module of TelCorreo, an e-mail client that allows Internet users to read their e-mail using speech through the telephone.

    Free Register to Access Article

  • TSD – A Speaker Authentication Module in TelCorreo
    Text Speech and Dialogue, 2000
    Co-Authors: Leandro Rodriguez Linares, Carmen García-mateo

    Abstract:

    Our experiments in Speaker Recognition showed that the combination of Speaker Verification and Utterance Verification techniques is an efficient way of improving the performance of a Speaker Authentication System.

    This technique is now implemented in the speaker Authentication Module of TelCorreo, an e-mail client that allows Internet users to read their e-mail using speech through the telephone.

    Free Register to Access Article