Essays about: "Network security authentication schemes"

Found 5 essays containing the words Network security authentication schemes.

  1. 1. Security Services for Mobile Applications

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Majid Mumtaz; [2012]
    Keywords : Mobile Applications Security; Authentication; microSD; Secure Element;

    Abstract : In today's era of technology, information can revolve the whole world within seconds via Internet. Devices such as smartphones, tablets and smart applications running on them enable users to access information anytime and anywhere over the air network. READ MORE

  2. 2.  A secure mobile phone-based interactive logon in Windows

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Oleksandr Bodriagov; [2010]
    Keywords : ;

    Abstract : Password-based logon schemes have many security weaknesses. Smart card and biometric based authentication solutions are available as a replacement for standard password-based schemes for security sensitive environments. However, the cost of deployment and maintenance of these systems is quite high. READ MORE

  3. 3. Evaluation of UICC-based IMS authentication schemes

    University essay from Blekinge Tekniska Högskola/Avdelningen för telekommunikationssystem

    Author : Adeel Jadoon; [2009]
    Keywords : UICC; IMS;

    Abstract : This thesis study involves evaluation of UICC based IMS authentication schemes. The schemes included in this study are IMS AKA, E-IMS AKA, One-Pass GPRS IMS authentication and Early IMS security. These schemes are evaluated on the basis of security, user friendliness and simplicity. READ MORE

  4. 4. SWOT Analysis of IP Multimedia Sub System Security Authentication Schemes

    University essay from Blekinge Tekniska Högskola/Avdelningen för telekommunikationssystem

    Author : Syed Majid Ali Shah Bukhari; Inayat Ullah Khan; [2009]
    Keywords : SWOT Analysis; IMS; Security Authentication. ;

    Abstract : SWOT analysis is performed on IMS security authentication schemes to demonstrate the effectiveness of each schemes in terms of multiple parameters and associated dependencies for users and network operators. Due to SWOT tool we have been able to describe strengths, weakness, opportunities and threats in each authentication scheme separately. READ MORE

  5. 5. Design and implementation of Wireless Packet Level Authentication

    University essay from

    Author : Abdullah Al Hasib; [2009]
    Keywords : ;

    Abstract : Secure user authentication, authorization and access control have become the major challenges in any wireless security system, often due to certain wireless network characteristics such as lack of infrastructure, low power availability and mobility. Taking advantage of such network characteristics, an attacker can launch several security attacks like Denial of Service (DoS) attacks, packet spoofing and session hijacking attacks. READ MORE