Добро пожаловать в клуб

Показать / Спрятать  Домой  Новости Статьи Файлы Форум Web ссылки F.A.Q. Логобург    Показать / Спрятать

       
Поиск   
Главное меню
ДомойНовостиСтатьиПостановка звуковФайлыДефектологияКнижный мирФорумСловарьРассылкаКаталог ссылокРейтинг пользователейЧаВо(FAQ)КонкурсWeb магазинШкольникамКарта сайта

Поздравляем!
Поздравляем нового Логобуржца Акулина со вступлением в клуб!

Реклама

КНИЖНЫЙ МИР

Social Authentication for Mobile Phones   Bijan Soleymani

Social Authentication for Mobile Phones

100 страниц. 2010 год.
LAP Lambert Academic Publishing
In this work we present a scheme for automating authentication based on social factors using mobile phones. We test its feasibility by running simulations on an existing dataset. We implement two protocols one based on public keys and the other on hash chains. Then we consider threat scenarios. Computer systems depend on the user being authenticated securely. Usually this involves a username and password and if more security is required an electronic token as well. Other than these two "factors" there is also biometrics, such as fingerprints. Thus the traditional systems use some combination of: something you know (passwords), something you have (tokens) and something you are (biometrics). Recently a fourth factor: someone you know has been suggested as well. This technique has been applied to the problem of emergency authentication, as a replacement for calls to a help-desk. This social authentication is based on the process of vouching. In this method a user...
 
- Генерация страницы: 0.05 секунд -