Comparative Analysis of Smart Card Authentication Schemes
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Various kinds of authentication schemes have been deployed to secure the information or resources from unauthorized access. In these schemes, server maintains a verification table which is vulnerable to a variety of attacks. To withstand the possible attacks for verification table, smart card based authentication scheme has been proposed as an alternative solution. Smart card is a small, tamper-resistant device providing users with a convenient storage and processing capability, it is widely used for a range of applications such as remote user login, online banking, ID verification, access control and e-commerce etc. This article gives comparative analysis of major smart card authentication schemes for single server as well as multi-server environment
Authors and Affiliations
Toshi jain
Cryptanalysis and Improvement of Kang et al. Certificateless Aggregate Signature Scheme
The most important contribution of modern cryptography is the invention of digital signatures. To deal with specific application scenarios, digital signature schemes have been evolved with different variants. One of such...
Image Retrieval using Sparse Codewords with Cryptography for Enhanced Security
Now days face image of people is the interesting area of users. Most of the time images are in digital form. Thus, content-based face image retrieval is a technique which facilitates for many emerging applications.In thi...
Application of Machine Learning Algorithm in Indian Stock Market Data
Abstract: Prediction of Indian stock market data with data mining technique is one of the fascinating issues for researchers over the past decade. Statistical and traditional methods are no longer feasible for prop...
Realization of web hotspot rescue in a distributed system
Web hotspot is considered as a serious problem in case of distributed systems. When the load in a website is suddenly increases, the situation is termed as web hotspot. This kind of situation can seriously degrad...
An Efficient Approach for Requirement Traceability Integrated With Software Repository
Traceability links between requirements of a system and its source code are helpful in reducing system conception effort. During software updates and maintenance, the traceability links become invalid since  ...