Authentication Module

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 735 Experts worldwide ranked by ideXlab platform

Sangjae Moon - One of the best experts on this subject based on the ideXlab platform.

  • NPC - Security analysis of the Authentication Modules of Chinese WLAN standard and its implementation plan
    Lecture Notes in Computer Science, 2007
    Co-Authors: Sangjae Moon
    Abstract:

    With the Canetti-Krawczyk (CK) model, we analyze the Authentication Module WAIs in the Chinese WLAN national security standard WAPI and its implementation plan respectively. The security weaknesses of WAI in the original WAPI are presented; then WAI in the implementation plan is proved secure in the CK model; at last we point out how the implementation plan overcomes the security weaknesses in the original WAPI.

  • On the security of the Authentication Module of chinese WLAN standard implementation plan
    Lecture Notes in Computer Science, 2006
    Co-Authors: Sangjae Moon
    Abstract:

    Compared with the original standard, the greatest change that WAPI (Chinese WLAN security standard) implementation plan made lies in the key-agreement protocol in WAI (Wireless Authentication Infrastructure). This contribution presents a security analysis of the WAI Module in the implementation plan with the Canetti-Krawczyk (CK) model. The results indicate that if the elliptic curve encryption scheme ECES adopted is secure against adaptive chosen ciphertext attack (CCA2 attack), then its key-agreement protocol is secure in the CK model, and it realizes the mutual identity Authentication between STA (station) and AP (access point).

  • ACNS - On the security of the Authentication Module of chinese WLAN standard implementation plan
    RoboCup 2005: Robot Soccer World Cup IX, 2006
    Co-Authors: Sangjae Moon
    Abstract:

    Compared with the original standard, the greatest change that WAPI (Chinese WLAN security standard) implementation plan made lies in the key-agreement protocol in WAI (Wireless Authentication Infrastructure). This contribution presents a security analysis of the WAI Module in the implementation plan with the Canetti-Krawczyk (CK) model. The results indicate that if the elliptic curve encryption scheme ECES adopted is secure against adaptive chosen ciphertext attack (CCA2 attack), then its key-agreement protocol is secure in the CK model, and it realizes the mutual identity Authentication between STA (station) and AP (access point).

Junwei Cheng - One of the best experts on this subject based on the ideXlab platform.

  • Design of Module software for IPTV set-top box
    2009 International Conference on Test and Measurement, 2009
    Co-Authors: Xianzhang Feng, Junwei Cheng
    Abstract:

    In order to achieve the functions of online video-on-demand and watching of network's video files, with the rapid development of the Ethernet, in which provides a platform to realize those functions, moreover, it can supply an opportunity to promote for them. The research designs a network set-top box which is based on IP network technology. Through the software design of those Modules: the network access Module, the registration and Authentication Module, the browser Module, the Qtserver (input method) Module, the video player Module and the audio player Module, it provides software support for network set-top box. By the means of testing, it indicates that the software can provide the driver function, and the design achieves the desired results.

Leandro Rodriguez Linares - One of the best experts on this subject based on the ideXlab platform.

  • a speaker Authentication Module in telcorreo
    Text Speech and Dialogue, 2000
    Co-Authors: Leandro Rodriguez Linares, Carmen Garciamateo
    Abstract:

    Our experiments in Speaker Recognition showed that the combination of Speaker Verification and Utterance Verification techniques is an efficient way of improving the performance of a Speaker Authentication System. This technique is now implemented in the speaker Authentication Module of TelCorreo, an e-mail client that allows Internet users to read their e-mail using speech through the telephone.

  • TSD - A Speaker Authentication Module in TelCorreo
    Text Speech and Dialogue, 2000
    Co-Authors: Leandro Rodriguez Linares, Carmen García-mateo
    Abstract:

    Our experiments in Speaker Recognition showed that the combination of Speaker Verification and Utterance Verification techniques is an efficient way of improving the performance of a Speaker Authentication System. This technique is now implemented in the speaker Authentication Module of TelCorreo, an e-mail client that allows Internet users to read their e-mail using speech through the telephone.

Peter Honeyman - One of the best experts on this subject based on the ideXlab platform.

  • Pluggable Authentication Modules for Windows NT
    1998
    Co-Authors: Naomaru Itoi, Peter Honeyman
    Abstract:

    To meet the challenge of integrating new methods and technologies into the Internet security framework, it is useful to hide low-level Authentication mechanisms from application programmers, system administrators, and users, replacing them with abstractions at a higher level. The Pluggable Authentication Method approach popular in Linux, Solaris, and CDE offers one such abstraction. To implement PAM in NT, we replaced the standard Graphical Identification and Authentication Module with one that processes PAM tables. This provides security administrators with a flexible tool to plan and implement Authentication policy across a wide range of computing platforms. GINA is woven into the NT logon procedure, making it a difficult Module to test and debug. Our PAM-based GINA eases this problem by allowing new Authentication mechanisms to be replaced and tested without forcing a reboot.

  • Pluggable Authentication Module for Windows NT
    1998
    Co-Authors: Naomaru Itoi, Peter Honeyman
    Abstract:

    To meet the challenge of integrating new methods and technologies into the Internet security framework, it is useful to hide low-level Authentication mechanisms from application programmers, system administrators, and users, replacing them with abstractions at a higher level. The Pluggable Authentication Method approach popular in Linux, Solaris, and CDE offers one such abstraction. To implement PAM in NT, we replaced the standard Graphical Identification and Authentication Module with one that processes PAM tables. This provides security administrators with a flexible tool to plan and implement Authentication policy across a wide range of computing platforms. GINA is woven into the NT logon procedure, making it a difficult Module to test and debug. Our PAM-based GINA solves this problem by allowing Authentication mechanisms to be replaced and tested without forcing a reboot.

Shenghua Tao - One of the best experts on this subject based on the ideXlab platform.

  • software security Authentication method used for digital set top box
    2012
    Co-Authors: Shenghua Tao
    Abstract:

    The invention provides a software security Authentication method used for a digital set top box with high software security, which comprises the following steps: (1) starting up the set top box; (2) running Boot Loader; (3) loading a software security Authentication Module; (4) if the loading is successful, turning to step (6), otherwise turning to step (5); (5) prompting loading failure, restarting the set top box, and turning to step (2); (6) checking the legality of system software; (7) if the system software is legal, turning to step (9), otherwise turning to step (8); (8) prompting illegality, restarting the set top box, and turning to step (2); (9) loading the system software; (10) normal working of the set top box; (11) judging whether application software is needed to be loaded, ifso, turning to step (12), otherwise turning to step (10); (12) checking the legality of the application software; (13) if the application software is legal, turning to step (15), otherwise turning tostep (14); (14) prompting illegality, restarting the set top box, and turning to step (2); and (15) loading the application software, and turning to step (10).