As the ubiquitous society spreads rapidly, various private information circulates in large quantities. Information increases explosively in recent years, the importance of privacy ...
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
— Today sending spams has turned to be a major problem in the Internet. It is so serious that more than 80% of the transferred emails are spams. As a result, various methods have...
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...