A Novel Authentication Protocol Based on Elliptic Curves
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 6
Abstract
Authentication is the process of determining whether someone or something is, in fact, who or that it is declared to be. It is a client-server based protocol by which a server identifies the identity of a remote client when it logs on to the server through unsecured network. In private and public computer networks, authentication is commonly done through the use of logon passwords. Each user registers initially or is registered by someone else, using an assigned or self-declared password. On each subsequent use, the user must know and use the previously declared password. Internet business and many other transactions require a more stringent authentication process. This paper proposes a new authentication protocol to authenticate remote users using elliptic curves. The proposed protocol has three phases- registration phase, login phase, and authentication phase. When a genuine user wants to login the computer system, he has to key in his identity, password and private keys.
Authors and Affiliations
Soram Ranbir Singh , Khomdram Memeta Chanu
GUARANTEED COVERAGE PARTICLE SWARM OPTIMIZATION USING NEIGHBORHOOD TOPOLOGIES
The key behind the research represent in this paper is to understand the behavior of the particle swarm algorithm. This study proposes guaranteed convergence Particle Swarm Optimizer (GCPSO) with various topologies. The...
Feature - based Automated Aerial Image to Satellite Image Registration
Image processing is required in number of fields like clinical diagnosis, remote sensing and computer vision. The need for overlaying of images exists in image processing. Image registration is the basis step in various...
A REVIEW PAPER ON SMS TEXT TO PLAIN ENGLISH TRANSLATION(Text Normalization)
Mobile technology as well as social networking technology plays an important role in communication across internet. A large amount of information is found in noisy contexts as texting and chat lingo have become increasin...
A Review: Sobel Canny Hybrid Theoretical Approach & LOG Edge Detection Techniques for Digital Image
Edge detection is an important field in image processing. The purpose of image’s edge Detection is image segmentation, data compression, well matching such as image reconstruction and so on. Images to be compressed are f...
Software Security: A Risk Taxonomy
The implementation of software has been challenging for many organizations. As given in the many reports of important failures, the implementation of packaged software and associated changes in business processes has pro...