Security: hash function-authentications

Authors

  • Saroj Singh Dept: Computer Science & Engineering, Delhi Engineering College, Ladiyapur, Faridabad, India

Keywords:

authentication, firewall, hash function, security, threats

Abstract

As security or firewall administrator, we got basically the same concerns (as a plumber) the size of the pipe the contents of the pipe, making sure the correct traffic is in the correct pipes and keeping the pipes from splitting and leaking all over the places of course like plumbers. When the pipes do leak: we are the ones responsible for cleaning up the mess and we are the ones who come up smelling awful. Firewall is a device that is used to provide protection to a system from network-based security threats. The firewall uses service, behavior, user and direction control techniques.

Downloads

Download data is not yet available.

References

Chien, H. Y., Jan, J. K., & Tseng, Y. M. (2002). An efficient and practical solution to remote authentication: smart card. Computers & Security, 21(4), 372-375.

Hu, Y. C., Johnson, D. B., & Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad hoc networks, 1(1), 175-192.

Khan, M. K., Zhang, J., & Wang, X. (2008). Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons & Fractals, 35(3), 519-524.

Lian, S., Sun, J., & Wang, Z. (2006). Secure hash function based on neural network. Neurocomputing, 69(16-18), 2346-2350.

Liao, Y. P., & Wang, S. S. (2009). A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(1), 24-29.

Tsai, J. L. (2008). Efficient multi-server authentication scheme based on one-way hash function without verification table. Computers & Security, 27(3-4), 115-121.

Wang, Y. Y., Liu, J. Y., Xiao, F. X., & Dan, J. (2009). A more efficient and secure dynamic ID-based remote user authentication scheme. Computer communications, 32(4), 583-585.

Wang, Y., Liao, X., Xiao, D., & Wong, K. W. (2008). One-way hash function construction based on 2D coupled map lattices. Information Sciences, 178(5), 1391-1406.

Wegman, M. N., & Carter, J. L. (1981). New hash functions and their use in authentication and set equality. Journal of computer and system sciences, 22(3), 265-279.

Xiao, D., Liao, X., & Deng, S. (2005). One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons & Fractals, 24(1), 65-71.

Published

2016-03-31

How to Cite

Singh, S. (2016). Security: hash function-authentications. International Research Journal of Engineering, IT & Scientific Research, 2(3), 16–32. Retrieved from https://sloap.org/journals/index.php/irjeis/article/view/484

Issue

Section

Research Articles