Efficient remote authentication
Kiperberg, M., & Zaidenberg, N. (2013). Efficient remote authentication. Journal of Information Warfare, 12(3), 49-55. https://www.jinfowar.com/journal/volume-12-issue-3/efficient-remote-authentication
Published in
Journal of Information WarfareDate
2013Copyright
© Peregrine Technical Solutions, LLC, 2013
In 2003, Kennel and Jamieson described a method of remote machine authentication. By authentication, the authors meant that the remote machine is non-virtual, and the operating system on the remote machine is not malicious. The described method does not consider the variety of versions of each operating system. The description completely ignores the existence of modules that can be plugged into the operating system. The authors of this paper adapt the method described by Kennel and Jamieson to the real world so that itcan be applied without prior knowledge of theoperating system or the modules on the remote machine.
Publisher
Peregrine Technical Solutions, LLCISSN Search the Publication Forum
1445-3312Keywords
Original source
https://www.jinfowar.com/journal/volume-12-issue-3/efficient-remote-authenticationPublication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/23124994
Metadata
Show full item recordCollections
License
Related items
Showing items with similar title or keywords.
-
An Efficient and Privacy-Preserving Blockchain-Based Authentication Scheme for Low Earth Orbit Satellite Assisted Internet of Things
Wang, Biying; Chang, Zheng; Li, Shancang; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)Recently, integrating satellite networks (e.g. Low-earth-orbit satellite constellation) into the Internet of Things (IoT) ecosystem has emerged as a potential paradigm to provide more reliable, ubiquitous and seamless ... -
Anomaly detection approach to keystroke dynamics based user authentication
Ivannikova, Elena; David, Gil; Hämäläinen, Timo (IEEE, 2017)Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using ... -
What affects the intention to change information security behavior when using biometric authentication in mobile payments?
Väli-Klemelä, Ainohelena (2021)Mobiilimaksut ja mobiilimaksusovellusten käyttö ovat lisääntyneet merkittävästi viime vuosina. Käyttäjät käyttävät erityyppisiä tunnistautumismenetelmiä mobiilimaksujen suorittamiseen, mukaan lukien biometrinen tunnistautuminen. ... -
Enhancing the user authentication process with colour memory cues
Woods, Naomi; Silvennoinen, Johanna (Taylor & Francis, 2023)The authentication process is the first line of defence against potential impostors, and therefore is an important concern when protecting personal and organisational data. Although there are many options to authenticate ... -
Accessible authentication : Assessing the applicability for users with disabilities
Furnell, Steven; Helkala, Kirsi; Woods, Naomi (Elsevier, 2022)Access to the many benefits available from digital technology can often vary depending upon the capabilities and facilities of the individual who is attempting to engage with it. Many digital devices and services require ...