Fast And Simple NEMO Authentication Via Random Number.
Network Mobility (NEMO), derived from Mobile Internet Protocol version 6 (MIFV6) technology, has been evolving and expanding in very rapidity manner across very short period of time. In MIPv6 technology, the Access Router (AR) plays important roles such as provide sessions connectivity and safe-g...
| Main Authors: | Tan, Tat Kin, Samsudin, Azman |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/9431/ http://eprints.usm.my/9431/1/Fast_and_Simple_NEMO_Authentication_Via_Random_Number.pdf |
Similar Items
Efficient NEMO Security Management Via CAPKI.
by: Tat, Kin Tan, et al.
Published: (2007)
by: Tat, Kin Tan, et al.
Published: (2007)
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
by: Jin, , ATB, et al.
Published: (2004)
by: Jin, , ATB, et al.
Published: (2004)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Bio-discretization: Biometrics authentication featuring face data and tokenised random number
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
Cancellable biometerics featuring with tokenised random number
by: TEOH, A, et al.
Published: (2005)
by: TEOH, A, et al.
Published: (2005)
Enhancing The Quality Of Service In Mobile Networks Based On Nemo Basic Support Protocol
by: Alshaibani, Badiea Abdulkarem Mohammed
Published: (2018)
by: Alshaibani, Badiea Abdulkarem Mohammed
Published: (2018)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Simple Knit Design System; Using Pattern Matching.
by: Budiarto, Rahmat, et al.
Published: (2002)
by: Budiarto, Rahmat, et al.
Published: (2002)
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
Simple Authentication Scheme for Personal Digital Assistants using the Hidden Markov Model ToolKit
by: Ching, Ho Chiung, et al.
Published: (2007)
by: Ching, Ho Chiung, et al.
Published: (2007)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Two-factor face authentication: Topographic Independent Component Analysis (TICA) and Multispace Random Projection (MRP)
by: Lee, Gin Chong, et al.
Published: (2009)
by: Lee, Gin Chong, et al.
Published: (2009)
A Simple Data Dependency Analyzer For C Programs.
by: Sodhy, Gian Chand, et al.
Published: (2002)
by: Sodhy, Gian Chand, et al.
Published: (2002)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)
by: Jahani, Shahram
Published: (2016)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
Publishing Mathematics On The Web A Survey Of Simple, Inexpensive Methods.
by: Purba, Harja Santana, et al.
Published: (2005)
by: Purba, Harja Santana, et al.
Published: (2005)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
IPv6 performance analysis on FreeBSD workstation using simple applications
by: Ettikan, K., et al.
Published: (2000)
by: Ettikan, K., et al.
Published: (2000)
An efficient algorithm for fast computation of pseudo-Zernike moments
by: Chong, Chee-Way
Published: (2003)
by: Chong, Chee-Way
Published: (2003)
Leave-one-out authentication of persons using 40 Hz EEG oscillations
by: Ravi, , KVR, et al.
Published: (2005)
by: Ravi, , KVR, et al.
Published: (2005)
Improving The Efficiency Of Sip
Authentication Based On The
Pre-Calculated Look-Up Table
by: Jaber, Aws Naser
Published: (2013)
by: Jaber, Aws Naser
Published: (2013)
A face and speech biometric verification system using a simple Bayesian structure
by: Teoh, , ABJ, et al.
Published: (2005)
by: Teoh, , ABJ, et al.
Published: (2005)
A comparative analysis of algorithms for fast computation of Zernike moments
by: Chong, C
Published: (2003)
by: Chong, C
Published: (2003)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
Analysis of ShuffleNets with limited number of wavelength converters employing deflection routing
by: Castanon, Gerardo, et al.
Published: (2005)
by: Castanon, Gerardo, et al.
Published: (2005)
Technology Review: Image Enhancement, Feature Extraction and Template Protection of a Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2010)
by: Islam, Md. Rajibul, et al.
Published: (2010)
Gpu Based Fast Phylogenetic Tree
Construction Algorithm With Reduce
Dataset
by: Ibrahim, Najihah
Published: (2016)
by: Ibrahim, Najihah
Published: (2016)
Two-Factor Cancelable Biometrics Authenticator
by: Pang, Ying Han, et al.
Published: (2007)
by: Pang, Ying Han, et al.
Published: (2007)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Efficient and fast multi layer statistical approach for colour based image retrieval
by: Odeh, , JQ, et al.
Published: (2003)
by: Odeh, , JQ, et al.
Published: (2003)
A Markovian inventory system with random shelf time and back orders
by: CHAKRAVARTHY, S, et al.
Published: (2004)
by: CHAKRAVARTHY, S, et al.
Published: (2004)
High security Iris verification system based on random secret integration
by: SIEWCHIN, C, et al.
Published: (2006)
by: SIEWCHIN, C, et al.
Published: (2006)
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012)
by: Samsudin, Azman
Published: (2012)
Reliable template protection technique for biometric authentication
by: Ong, Teng Sian, et al.
Published: (2008)
by: Ong, Teng Sian, et al.
Published: (2008)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Typing Dynamics Biometric Authentication through Fuzzy Logic
by: Zhe, Jin, et al.
Published: (2008)
by: Zhe, Jin, et al.
Published: (2008)
Similar Items
-
Efficient NEMO Security Management Via CAPKI.
by: Tat, Kin Tan, et al.
Published: (2007) -
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
by: Jin, , ATB, et al.
Published: (2004) -
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004) -
Bio-discretization: Biometrics authentication featuring face data and tokenised random number
by: Foon, , NH, et al.
Published: (2004) -
Cancellable biometerics featuring with tokenised random number
by: TEOH, A, et al.
Published: (2005)