PERFORMANCE OF MULTI SERVER AUTHENTICATION AND KEY AGREEMENT WITH USER PROTECTION IN NETWORK SECURITY
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
Using smart cards, remote user authentication and key greement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to user authentication and key distribution, it is very useful for providing identity privacy for users. In this paper, we propose novel multi server authentication and key agreement schemes with user protection in network security. We first propose a single-server scheme and then apply this scheme to a multi-server nvironment. The main merits include: (1) The privacy of users can be ensured; (2) a user can freely choose his own assword; (3) the computation and communication cost is very low; (4) servers and users can authenticate each other; (5) it generates a session key agreed by the server and the user; (6) our roposed schemes are Nonce-based schemes which does not have a serious time synchronization problem.
Authors and Affiliations
NAGAMALLESWARA RAO. DASARI , VUDA SREENIVASARAO
A PATTERN BASED KEY GENERATION TO AUTHENTICATION FOR MULTIHOP ROUTING IN WMSN
Recent research work in the Wireless Sensor Networks involves the homogeneous networks in which the sensor nodes in the specific cluster can get the key value from any other cluster. Most existing key management schemes...
ERPCA: A Novel Approach for Risk Evaluation of Multidimensional Risk Prediction Clustering Algorithm
Clustering is a data mining technique used to place data elements into related groups without advance knowledge of the group definitions. In this paper clustering is employed to support efficient decision making by clust...
An Empirical Study on XML Schema Idiosyncrasies in Big Data Processing
The design and maintenance of the XML schemas for the enterprise, if done incorrectly, can be difficult and frustrating experience. The applications that use XML data binding or participate in the processing of large and...
Wearable technology a new paradigm in Educational Universities
Wearable technology, making a mark as the emerging technology where the goal of computing is to minimize the time and accessing the technology everywhere. It helps students in many ways. For identifying buildings by comb...
Gesture Based Educational Software for Children with Acquired Brain Injuries
"GESBIā is gesture based audio visual teaching tool designed to help children with acquired brain injuries, providing hours of entertainment in a play-and-learn environment while ntroducing the foundation skills in basic...