Rull Jariod, 2023 - Google Patents
Authorization and authentication strategy for mobile highly constrained edge devicesRull Jariod, 2023
- Document ID
- 1042596658509233358
- Author
- Rull Jariod S
- Publication year
External Links
- 238000013475 authorization 0 title abstract description 43
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gudala et al. | Leveraging biometric authentication and blockchain technology for enhanced security in identity and access management systems | |
JP7391860B2 (en) | Extending secure key storage for transaction confirmation and cryptocurrencies | |
JP7346426B2 (en) | System and method for binding verifiable claims | |
US11140155B2 (en) | Methods, computer readable media, and systems for authentication using a text file and a one-time password | |
CN114144781A (en) | Identity verification and management system | |
CN108989346A (en) | The effective identity trustship agility of third party based on account concealment authenticates access module | |
KR20180016232A (en) | Authentication techniques including speech and/or lip movement analysis | |
KR20180016235A (en) | Authentication techniques including speech and/or lip movement analysis | |
US20190213306A1 (en) | System and method for identity authentication | |
JP2008544339A (en) | Systems and methods for fraud monitoring, detection, and hierarchical user authentication | |
JP2017507552A (en) | Method and apparatus for providing client-side score-based authentication | |
Ghazizadeh et al. | Trusted computing strengthens cloud authentication | |
Al Rousan et al. | A comparative analysis of biometrics types: literature review | |
Babaeizadeh et al. | Keystroke dynamic authentication in mobile cloud computing | |
Yusop et al. | Advancing passwordless authentication: A systematic review of methods, challenges, and future directions for secure user identity | |
AlRousan et al. | Multi-factor authentication for e-government services using a smartphone application and biometric identity verification | |
Unsel et al. | Risk-based authentication for openstack: a fully functional implementation and guiding example | |
Bhardwaj et al. | Risks for Conversational AI Security | |
Shakir | User authentication in public cloud computing through adoption of electronic personal synthesis behavior | |
Chetalam | Enhancing Security of MPesa Transactions by Use of Voice Biometrics | |
Sasikumar et al. | Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques | |
Kannavara et al. | Topics in biometric human-machine interaction security | |
He et al. | Understanding mobile banking applications’ security risks through blog mining and the workflow technology | |
Rull Jariod | Authorization and authentication strategy for mobile highly constrained edge devices | |
Bazeer Ahamed et al. | Image Captcha Blended with OTP for Secured Authentication |