Corpus ID: 11600858

Cryptography Based Authentication Methods

@inproceedings{AliaCryptographyBA,
  title={Cryptography Based Authentication Methods},
  author={Mohammad Ahmad Alia and Abdelfatah Aref Tamimi and Omaima N. A. Al-Allaf}
}
—This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. As well as, this study presents a specific discussion about authentication service. Since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about… Expand

Figures and Tables from this paper

Attacks on and Advances in Secure Hash Algorithms
In today’s information-based society, encryption along with the techniques for authentication and integrity are key to the security of information. Cryptographic hashing algorithms, such as theExpand
Secure login protocols: An analysis on modern attacks and solutions
TLDR
This research investigates the performance of different login protocols that can achieve better security and focuses on the most recent attacks and their solutions that have been published over the year 2010-2016. Expand
SECURE AND HIDDEN TEXT USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY
  • 2019
For secure data transmission over the internet, it is important to transfer data in high security and high confidentiality, information security is the most important issue of data communication inExpand
Security over the Wireless Sensor Network and Node Authentication using ECCDSA
TLDR
The presence of malicious nodes if any will be identified using the distribution process of the self-healing key and the malicious nodes will be thrown out of the cluster by cluster head so as to guarantee the network as secured. Expand
Mobile user authentication system (MUAS) for e-commerce applications

References

SHOWING 1-10 OF 22 REFERENCES
Handbook of Applied Cryptography
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access ofExpand
New directions in cryptography
TLDR
This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing. Expand
INTEGRATED SYSTEM FOR MONITORING AND RECOGNIZING STUDENTS DURING CLASS SESSION
TLDR
A new student attendance system based on biometric authentication protocol using the face detection and the recognition protocols to facilitate checking students’ attendance in the classroom is proposed. Expand
Computer Security Basics
TLDR
This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms and will help you persuade your employees to practice safe computing. Expand
Memory Performance of Public-Key cryptography Methods in Mobile Environments
TLDR
A set of kernel benchmarks are developed to examine performance of standard and corresponding elliptic curve public-key methods and characterize the operations and their memory impact on performance in Diffie-Hellman key exchange, digital signature algorithm, ElGamal, and RSA publickey cryptosystem. Expand
A Gray-Scale Face Recognition Approach
  • Weihua Wang, W. Wang
  • Computer Science
  • 2008 Second International Symposium on Intelligent Information Technology Application
  • 2008
TLDR
A new face recognition algorithm based on gray-scale that shows higher recognition rate than eigenface algorithm in the same experiment conditions according to the practices. Expand
Face Detection in Color Images Using AdaBoost Algorithm Based on Skin Color Information
  • Y. Wu, Xueyi Ai
  • Mathematics, Computer Science
  • First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)
  • 2008
TLDR
A novel technique for detecting faces in color images using AdaBoost algorithm combined with skin color segmentation, which obtains competitive results and improves detection performance substantially. Expand
Face Recognition System Based on Different Artificial Neural Networks Models and Training Algorithms
TLDR
Comparisons between the used training algorithms showed that TrainLM was the best training algorithm for the face recognition system. Expand
Semi-supervised learning for facial expression recognition
TLDR
An analysis is provided which shows under what conditions unlabeled data can be used in learning to improve classification performance, and a structure learning algorithm is proposed that can utilize unlabeling data to improve Classification performance. Expand
A Face Recognition System Using Neural Networks with Incremental Learning Ability
This paper presents a fully automated face recognition system with incremental learning ability that has the following two desirable features: one-pass incremental learning and automatic generationExpand
...
1
2
3
...