PERFORMANCE OF MULTI SERVER AUTHENTICATION AND KEY AGREEMENT WITH USER PROTECTION IN NETWORK SECURITY
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
Using smart cards, remote user authentication and key greement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to user authentication and key distribution, it is very useful for providing identity privacy for users. In this paper, we propose novel multi server authentication and key agreement schemes with user protection in network security. We first propose a single-server scheme and then apply this scheme to a multi-server nvironment. The main merits include: (1) The privacy of users can be ensured; (2) a user can freely choose his own assword; (3) the computation and communication cost is very low; (4) servers and users can authenticate each other; (5) it generates a session key agreed by the server and the user; (6) our roposed schemes are Nonce-based schemes which does not have a serious time synchronization problem.
Authors and Affiliations
NAGAMALLESWARA RAO. DASARI , VUDA SREENIVASARAO
A Effective and Complete Preprocessing for Web Usage Mining
Now, peoples are interested in analyzing log files which can offer valuable insight into web site usage. The log files hows actual usage of web site under all circumstances and don’t need to conduct external experimenta...
An Enhanced k-means algorithm to improve the Efficiency Using Normal Distribution Data Points
Clustering is one of the unsupervised learning method in which a set of essentials is separated into uniform groups. The k-means method is one of the most widely used clustering techniques for various applications. This...
Analytical Study of Information Retrieval techniques and Modified Model of Search Engine
The concept of Information Retrieval is very vast and too many models of search engines are available in the market. In this research various information retrieval techniques used in search engine were studies and modifi...
IRIS RECOGNITION BASED ON GAUSSIAN-HERMITE MOMENTS
Iris recognition is accepted as one of the most efficient biometric method. Implementing this method to the practical system requires the special image preprocessing where the iris feature extraction plays a crucial role...
Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols in MANET
This Mobile Ad hoc Networks (MANET) is a set of wireless mobile nodes dynamically form spontaneous network which works without centralized administration. Due to this characteristic, there are some challenges that protoc...