Security: hash function-authentications
Keywords:
authentication, firewall, hash function, security, threatsAbstract
As security or firewall administrator, we got basically the same concerns (as a plumber) the size of the pipe the contents of the pipe, making sure the correct traffic is in the correct pipes and keeping the pipes from splitting and leaking all over the places of course like plumbers. When the pipes do leak: we are the ones responsible for cleaning up the mess and we are the ones who come up smelling awful. Firewall is a device that is used to provide protection to a system from network-based security threats. The firewall uses service, behavior, user and direction control techniques.
Downloads
References
Chien, H. Y., Jan, J. K., & Tseng, Y. M. (2002). An efficient and practical solution to remote authentication: smart card. Computers & Security, 21(4), 372-375.
Hu, Y. C., Johnson, D. B., & Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad hoc networks, 1(1), 175-192.
Khan, M. K., Zhang, J., & Wang, X. (2008). Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons & Fractals, 35(3), 519-524.
Lian, S., Sun, J., & Wang, Z. (2006). Secure hash function based on neural network. Neurocomputing, 69(16-18), 2346-2350.
Liao, Y. P., & Wang, S. S. (2009). A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(1), 24-29.
Tsai, J. L. (2008). Efficient multi-server authentication scheme based on one-way hash function without verification table. Computers & Security, 27(3-4), 115-121.
Wang, Y. Y., Liu, J. Y., Xiao, F. X., & Dan, J. (2009). A more efficient and secure dynamic ID-based remote user authentication scheme. Computer communications, 32(4), 583-585.
Wang, Y., Liao, X., Xiao, D., & Wong, K. W. (2008). One-way hash function construction based on 2D coupled map lattices. Information Sciences, 178(5), 1391-1406.
Wegman, M. N., & Carter, J. L. (1981). New hash functions and their use in authentication and set equality. Journal of computer and system sciences, 22(3), 265-279.
Xiao, D., Liao, X., & Deng, S. (2005). One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons & Fractals, 24(1), 65-71.
Published
How to Cite
Issue
Section
Articles published in the International Research Journal of Engineering, IT & Scientific research (IRJEIS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IRJEIS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IRJEIS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IRJEIS volumes 6 onwards. Please read about the copyright notices for previous volumes under Journal History.