Verification Information

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 192 Experts worldwide ranked by ideXlab platform

Kuldip Singh - One of the best experts on this subject based on the ideXlab platform.

  • SSO password-based multi-server authentication protocol
    International Journal of Communication Networks and Distributed Systems, 2012
    Co-Authors: Sandeep Kumar Sood, Anil K. Sarje, Kuldip Singh
    Abstract:

    User's password Verification Information stored on the server is main point of vulnerability and remains attractive target for attacker. Proposed protocol uses two-server architecture so that password Verification Information is distributed between two servers known as authentication server and control server. In this paper, we present single sign-on (SSO) password-based multi-server authentication protocol that issues the ticket to the user for a specific time period. Ticket issued for one authentication server can be used by the peer user for its authentication to another authentication server that is under the control of same control server. It distributes password Verification Information between the authentication server and the control server based on peer-to-peer (P2P) computing. Therefore, the proposed protocol is more resistant to dictionary attack as compared to existing single-server password based authentication protocols. The proposed protocol does not use public key that causes computation and communication burden in resource constraint environment.

  • A secure dynamic identity based authentication protocol for multi-server architecture
    Journal of Network and Computer Applications, 2011
    Co-Authors: Sandeep Kumar Sood, Anil K. Sarje, Kuldip Singh
    Abstract:

    Most of the password based authentication protocols rely on single authentication server for the user's authentication. User's Verification Information stored on the single server is a main point of susceptibility and remains an attractive target for the attacker. In 2009, Hsiang and Shih improved Liao and Wang's dynamic identity based smart card authentication protocol for multi-server environment. However, we found that Hsiang and Shih's protocol is susceptible to replay attack, impersonation attack and stolen smart card attack. Moreover, the password change phase of Hsiang and Shih's protocol is incorrect. This paper presents a secure dynamic identity based authentication protocol for multi-server architecture using smart cards that resolves the aforementioned security flaws, while keeping the merits of Hsiang and Shih's protocol. It uses two-server paradigm in which different levels of trust are assigned to the servers and the user's verifier Information is distributed between these two servers known as the service provider server and the control server. The service provider server is more exposed to the clients than the control server. The back-end control server is not directly accessible to the clients and thus it is less likely to be attacked. The user's smart card uses stored Information in it and random nonce value to generate dynamic identity. The proposed protocol is practical and computationally efficient because only nonce, one-way hash functions and XOR operations are used in its implementation. It provides a secure method to change the user's password without the server's help. In e-commerce, the number of servers providing the services to the user is usually more than one and hence secure authentication protocols for multi-server environment are required.

Sandeep Kumar Sood - One of the best experts on this subject based on the ideXlab platform.

  • SSO password-based multi-server authentication protocol
    International Journal of Communication Networks and Distributed Systems, 2012
    Co-Authors: Sandeep Kumar Sood, Anil K. Sarje, Kuldip Singh
    Abstract:

    User's password Verification Information stored on the server is main point of vulnerability and remains attractive target for attacker. Proposed protocol uses two-server architecture so that password Verification Information is distributed between two servers known as authentication server and control server. In this paper, we present single sign-on (SSO) password-based multi-server authentication protocol that issues the ticket to the user for a specific time period. Ticket issued for one authentication server can be used by the peer user for its authentication to another authentication server that is under the control of same control server. It distributes password Verification Information between the authentication server and the control server based on peer-to-peer (P2P) computing. Therefore, the proposed protocol is more resistant to dictionary attack as compared to existing single-server password based authentication protocols. The proposed protocol does not use public key that causes computation and communication burden in resource constraint environment.

  • A secure dynamic identity based authentication protocol for multi-server architecture
    Journal of Network and Computer Applications, 2011
    Co-Authors: Sandeep Kumar Sood, Anil K. Sarje, Kuldip Singh
    Abstract:

    Most of the password based authentication protocols rely on single authentication server for the user's authentication. User's Verification Information stored on the single server is a main point of susceptibility and remains an attractive target for the attacker. In 2009, Hsiang and Shih improved Liao and Wang's dynamic identity based smart card authentication protocol for multi-server environment. However, we found that Hsiang and Shih's protocol is susceptible to replay attack, impersonation attack and stolen smart card attack. Moreover, the password change phase of Hsiang and Shih's protocol is incorrect. This paper presents a secure dynamic identity based authentication protocol for multi-server architecture using smart cards that resolves the aforementioned security flaws, while keeping the merits of Hsiang and Shih's protocol. It uses two-server paradigm in which different levels of trust are assigned to the servers and the user's verifier Information is distributed between these two servers known as the service provider server and the control server. The service provider server is more exposed to the clients than the control server. The back-end control server is not directly accessible to the clients and thus it is less likely to be attacked. The user's smart card uses stored Information in it and random nonce value to generate dynamic identity. The proposed protocol is practical and computationally efficient because only nonce, one-way hash functions and XOR operations are used in its implementation. It provides a secure method to change the user's password without the server's help. In e-commerce, the number of servers providing the services to the user is usually more than one and hence secure authentication protocols for multi-server environment are required.

Singhkuldip - One of the best experts on this subject based on the ideXlab platform.

Jinshuai Sun - One of the best experts on this subject based on the ideXlab platform.

  • open pfind enhances the identification of missing proteins from human testis tissue
    Journal of Proteome Research, 2019
    Co-Authors: Jinshuai Sun, Jiahui Shi, Yihao Wang, Lei Chang, Liping Zhao, Hong Wang, Zhitang Lyu
    Abstract:

    In recent years, high-throughput technologies have contributed to the development of a more precise picture of the human proteome. However, 2129 proteins remain listed as missing proteins (MPs) in the newest neXtProt release (2019-02). The main reasons for MPs are a low abundance, a low molecular weight, unexpected modifications, membrane characteristics, and so on. Moreover, >50% of the MS/MS data have not been successfully identified in shotgun proteomics. Open-pFind, an efficient open search engine, recently released by the pFind group in China, might provide an opportunity to identify these buried MPs in complex samples. In this study, proteins and potential MPs were identified using Open-pFind and three other search engines to compare their performance and efficiency with three large-scale data sets digested by three enzymes (Glu-C, Lys-C, and trypsin) with specificity on different amino acid (AA) residues. Our results demonstrated that Open-pFind identified 44.7-93.1% more peptide-spectrum matches and 21.3-61.6% more peptide sequences than the second-best search engine. As a result, Open-pFind detected 53.1% more MP candidates than MaxQuant and 8.8% more candidate MPs than Proteome Discoverer. In total, 5 (PE2) of the 124 MP candidates identified by Open-pFind were verified with 2 or 3 unique peptides containing more than 9 AAs by using a spectrum theoretical prediction with pDeep and synthesized peptide matching with pBuild after spectrum quality analysis, isobaric post-translational modification, and single amino acid variant filtering. These five verified MPs can be saved as PE1 proteins. In addition, three other MP candidates were verified with two unique peptides (one peptide containing more than 9 AAs and the other containing only 8 AAs), which was slightly lower than the criteria listed by C-HPP and required additional Verification Information. More importantly, unexpected modifications were detected in these MPs. All MS data sets have been deposited into ProteomeXchange with the identifier PXD015759.

  • Multiproteases Combined with High-pH Reverse-Phase Separation Strategy Verified Fourteen Missing Proteins in Human Testis Tissue
    2018
    Co-Authors: Jinshuai Sun, Jiahui Shi, Yihao Wang, Yang Chen, Degang Kong, Lei Chang, Fengsong Liu, Yue Zhou
    Abstract:

    Subsequent to conducting the Chromosome-Centric Human Proteome Project, we have focused on human testis-enriched missing proteins (MPs) since 2015. For protein coverage to be enhanced, a multiprotease strategy was used for separation of samples by 10% SDS-PAGE. For the separating efficiency to be improved, a high-pH reverse phase (RP) separation strategy was applied to fractionate complex samples in this study. A total of 11,558 proteins was identified, which is the largest proteome data set for single human tissue sample so far. On the basis of this large-scale data set, we verified 14 MPs (PE2) in neXtProt (2018-01) after spectrum quality analysis, isobaric post-translational modification, and single amino acid variant filtering, and synthesized peptide matching. Tissue expression analysis showed that 3 of 14 MPs were testis-specific proteins. Functional analysis showed that 10 of 14 MPs were closely related to liver tumor, liver carcinoma, and hepatocellular carcinoma. Another 100 MPs were listed as candidates but required additional Verification Information. All MS data sets have been deposited into the ProteomeXchange with the identifier PXD009737

Anil K. Sarje - One of the best experts on this subject based on the ideXlab platform.

  • SSO password-based multi-server authentication protocol
    International Journal of Communication Networks and Distributed Systems, 2012
    Co-Authors: Sandeep Kumar Sood, Anil K. Sarje, Kuldip Singh
    Abstract:

    User's password Verification Information stored on the server is main point of vulnerability and remains attractive target for attacker. Proposed protocol uses two-server architecture so that password Verification Information is distributed between two servers known as authentication server and control server. In this paper, we present single sign-on (SSO) password-based multi-server authentication protocol that issues the ticket to the user for a specific time period. Ticket issued for one authentication server can be used by the peer user for its authentication to another authentication server that is under the control of same control server. It distributes password Verification Information between the authentication server and the control server based on peer-to-peer (P2P) computing. Therefore, the proposed protocol is more resistant to dictionary attack as compared to existing single-server password based authentication protocols. The proposed protocol does not use public key that causes computation and communication burden in resource constraint environment.

  • A secure dynamic identity based authentication protocol for multi-server architecture
    Journal of Network and Computer Applications, 2011
    Co-Authors: Sandeep Kumar Sood, Anil K. Sarje, Kuldip Singh
    Abstract:

    Most of the password based authentication protocols rely on single authentication server for the user's authentication. User's Verification Information stored on the single server is a main point of susceptibility and remains an attractive target for the attacker. In 2009, Hsiang and Shih improved Liao and Wang's dynamic identity based smart card authentication protocol for multi-server environment. However, we found that Hsiang and Shih's protocol is susceptible to replay attack, impersonation attack and stolen smart card attack. Moreover, the password change phase of Hsiang and Shih's protocol is incorrect. This paper presents a secure dynamic identity based authentication protocol for multi-server architecture using smart cards that resolves the aforementioned security flaws, while keeping the merits of Hsiang and Shih's protocol. It uses two-server paradigm in which different levels of trust are assigned to the servers and the user's verifier Information is distributed between these two servers known as the service provider server and the control server. The service provider server is more exposed to the clients than the control server. The back-end control server is not directly accessible to the clients and thus it is less likely to be attacked. The user's smart card uses stored Information in it and random nonce value to generate dynamic identity. The proposed protocol is practical and computationally efficient because only nonce, one-way hash functions and XOR operations are used in its implementation. It provides a secure method to change the user's password without the server's help. In e-commerce, the number of servers providing the services to the user is usually more than one and hence secure authentication protocols for multi-server environment are required.