Improving Service Credibility Using Password Authenticated Peer Services
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 8
Abstract
Password-Authenticated Key Exchange (PAKE) is where a client and a server, who share a password, authenticate each other and meanwhile establish a cryptographic key by exchange of messages. In a scenario where two servers cooperate to authenticate a client and if one server is compromised, the attacker still cannot pretend to be the client with the information from the compromised server. Two-server PAKE are either symmetric in the sense that two peer servers equally contribute to the authentication or asymmetric in the sense that one server authenticates the client with the help of another server. Current symmetric solution for two-server PAKE, where the client can establish different cryptographic keys with the two servers, respectively. This protocol runs in parallel and is more efficient than existing symmetric two-server PAKE protocol. A solution to redirect the client request using PAKE, if one of the servers fails or crashes in case of Denial of Service attacks and resistance against Denial of service attacks
Authors and Affiliations
Mathiarasu. G , Kanmani sivagar. A
A Novel Mechanism for Secure and Efficient VANET Communication
A Vehicular Ad hoc NETwork (VANET) is a type of mobile Peer-To-Peer wireless network that allows providing communication among nearby vehicles and between vehicles and nearby fixed roadside equipment. The lack of central...
Effective User Navigability through Website Structure Reorganizing Using Mathematical Programming Model
Website design is easy task but, to navigate user efficiently is big challenge, one of the reason is user behavior is keep changing and web developer or designer not think according to user’s behavior. Designing well-str...
Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS
Encryption is the most effective way of computer science concerned with developing schemes and formula to achieve data and information security through the use of codes. Today the privacy is the main issue to sending inf...
Analysis on Credit Card Fraud Detection Methods
Due to the theatrical increase of fraud which results in loss of dollars worldwide each year, several modern techniques in detecting fraud are persistently evolved and applied to many business fields. Fraud detection inv...
Implementation of Lifting-Based Two Dimensional Discrete Wavelet Transform on FPGA Using Pipeline Architecture
This paper presents the implementation of the high speed lifting-based two dimensional discrete wavelet transform (2D-DWT) algorithm on Field Programmable Gate Array (FPGA). Pipelining structure in DWT reduces hardware c...