Better Authentication Methods For Mobile Computing

Journal Title: GRD Journal for Engineering - Year 2016, Vol 1, Issue 6

Abstract

Today’s many application rely on small devices that can interact with each other through communication network. In this project we are proposing two new methods for authenticating encrypted message that are directed to assemble the requirements of mobile application. In this applications, the integrity and confidentiality of communicated messages are required. To getting benefit of that fact that the messages to be authenticated must also be encrypted, we propose provably methods for safe authentication codes that are more efficient than any message authentication code. The key idea behind the proposed techniques is to exert the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using single authentication primitives.

Authors and Affiliations

Prof. Avinash Ingole, Salaskar Onkar, Saurabh S. Patil

Keywords

Related Articles

Security Model for Federated Database Systems

One of the new emerging technologies for data management today is represented by federate systems. Security enforcement at the federation level must take into consideration the protection requirements and protection poli...

Medical Image Analysis and Achieving Compression using Hybrid Lossless and Lossy Compression Technique

Medical images like X-ray, CT or MRI produces visual representation of inner body structure. To recognize and name the exact character of a disease or a problem of human health condition, medical imaging is best method f...

A Review of Escalator Accidents and Preclusion

The study in this paper describes retrospective view of the escalator accidents. It also deals with the epidemiology of escalator allied injuries among adults and even in children from the delineation of Consumer Product...

Incorporation of Electronic Waste in Industry Concrete as Partial Replacement of Coarse Aggregate

At present demand of infrastructure is increasing day by day. The basic fundamental component for construction of any infrastructure is concrete. Concrete which is widely used in the building materials is popular for its...

Brain Tumor Recognition from MRI Images using Multiple OTSU Thresholding and Cross Correlation

Medical image processing is the most challenging and emerging field now a day. Processing of MRI images is one of the parts of this field. This paper work describes a good and efficient strategy to detect and extract the...

Download PDF file
  • EP ID EP218818
  • DOI -
  • Views 126
  • Downloads 0

How To Cite

Prof. Avinash Ingole, Salaskar Onkar, Saurabh S. Patil (2016). Better Authentication Methods For Mobile Computing. GRD Journal for Engineering, 1(6), 33-35. https://europub.co.uk/articles/-A-218818