How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Journal of the ACM (JACM)
Cryptography and data security
Cryptography and data security
A Modification of the Fiat-Shamir Scheme
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
How to Explain Zero-Knowledge Protocols to Your Children
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Implementing RADIUS and Diameter AAA Systems in IPv6-Based Scenarios
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
Authentication and authorization user management within a collaborative community
ICCOMP'07 Proceedings of the 11th WSEAS International Conference on Computers
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
An efficient direct anonymous attestation scheme with forward security
WSEAS TRANSACTIONS on COMMUNICATIONS
A cryptography index technology and method to measure information disclosure in the DAS model
WSEAS Transactions on Information Science and Applications
ACS'10 Proceedings of the 10th WSEAS international conference on Applied computer science
Hi-index | 0.00 |
User authentication is an important part of computer network cryptography. It becomes more and more essential for security with the latest progress in the field of computer science. We analyze latest trends in the article. Our goal is to answer the question whether these trends reflect current state in computer networks. We are focused on security and from this point of view we find the progress unsatisfactory. The reason is that most of current work is focused on operational parameters more than on security. That's why we give an example of less known authentication methods which can solve the most important issues of current protocols - security and protocol flexibility. The main advantage of one of these methods is its mathematical model which can prove security. As the flexibility of the method is also vital for modern multi domain networks we provide a modification of this method to improve the process of authentication and authorization.