dc.contributor.author | Kiperberg, Michael | |
dc.contributor.author | Zaidenberg, Nezer | |
dc.date.accessioned | 2022-08-17T08:28:07Z | |
dc.date.available | 2022-08-17T08:28:07Z | |
dc.date.issued | 2013 | |
dc.identifier.citation | Kiperberg, M., & Zaidenberg, N. (2013). Efficient remote authentication. <i>Journal of Information Warfare</i>, <i>12</i>(3), 49-55. <a href="https://www.jinfowar.com/journal/volume-12-issue-3/efficient-remote-authentication" target="_blank">https://www.jinfowar.com/journal/volume-12-issue-3/efficient-remote-authentication</a> | |
dc.identifier.other | CONVID_23124994 | |
dc.identifier.other | TUTKAID_59998 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/82638 | |
dc.description.abstract | In 2003, Kennel and Jamieson described a method of remote machine authentication. By authentication, the authors meant that the remote machine is non-virtual, and the operating system on the remote machine is not malicious. The described method does not consider the variety of versions of each operating system. The description completely ignores the existence of modules that can be plugged into the operating system. The authors of this paper adapt the method described by Kennel and Jamieson to the real world so that itcan be applied without prior knowledge of theoperating system or the modules on the remote machine. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Peregrine Technical Solutions, LLC | |
dc.relation.ispartofseries | Journal of Information Warfare | |
dc.relation.uri | https://www.jinfowar.com/journal/volume-12-issue-3/efficient-remote-authentication | |
dc.rights | In Copyright | |
dc.subject.other | Virtual machine | |
dc.subject.other | digital rights management | |
dc.subject.other | remote authentication | |
dc.subject.other | database | |
dc.title | Efficient remote authentication | |
dc.type | article | |
dc.identifier.urn | URN:NBN:fi:jyu-202208174182 | |
dc.contributor.laitos | Tietotekniikan laitos | fi |
dc.contributor.laitos | Department of Mathematical Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 49-55 | |
dc.relation.issn | 1445-3312 | |
dc.relation.numberinseries | 3 | |
dc.relation.volume | 12 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © Peregrine Technical Solutions, LLC, 2013 | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | tietoturva | |
dc.subject.yso | virtuaaliympäristö | |
dc.subject.yso | todentaminen | |
dc.subject.yso | tietokoneet | |
dc.subject.yso | etäkäyttö | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p24778 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p24130 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p6787 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p20557 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |