[go: up one dir, main page]

Rull Jariod, 2023 - Google Patents

Authorization and authentication strategy for mobile highly constrained edge devices

Rull Jariod, 2023

Document ID
1042596658509233358
Author
Rull Jariod S
Publication year

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys

Similar Documents

Publication Publication Date Title
Gudala et al. Leveraging biometric authentication and blockchain technology for enhanced security in identity and access management systems
JP7391860B2 (en) Extending secure key storage for transaction confirmation and cryptocurrencies
JP7346426B2 (en) System and method for binding verifiable claims
US11140155B2 (en) Methods, computer readable media, and systems for authentication using a text file and a one-time password
CN114144781A (en) Identity verification and management system
CN108989346A (en) The effective identity trustship agility of third party based on account concealment authenticates access module
KR20180016232A (en) Authentication techniques including speech and/or lip movement analysis
KR20180016235A (en) Authentication techniques including speech and/or lip movement analysis
US20190213306A1 (en) System and method for identity authentication
JP2008544339A (en) Systems and methods for fraud monitoring, detection, and hierarchical user authentication
JP2017507552A (en) Method and apparatus for providing client-side score-based authentication
Ghazizadeh et al. Trusted computing strengthens cloud authentication
Al Rousan et al. A comparative analysis of biometrics types: literature review
Babaeizadeh et al. Keystroke dynamic authentication in mobile cloud computing
Yusop et al. Advancing passwordless authentication: A systematic review of methods, challenges, and future directions for secure user identity
AlRousan et al. Multi-factor authentication for e-government services using a smartphone application and biometric identity verification
Unsel et al. Risk-based authentication for openstack: a fully functional implementation and guiding example
Bhardwaj et al. Risks for Conversational AI Security
Shakir User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Chetalam Enhancing Security of MPesa Transactions by Use of Voice Biometrics
Sasikumar et al. Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques
Kannavara et al. Topics in biometric human-machine interaction security
He et al. Understanding mobile banking applications’ security risks through blog mining and the workflow technology
Rull Jariod Authorization and authentication strategy for mobile highly constrained edge devices
Bazeer Ahamed et al. Image Captcha Blended with OTP for Secured Authentication