2013
DOI: 10.1186/2192-1962-3-16
|View full text |Cite
|
Sign up to set email alerts
|

Smart card based time efficient authentication scheme for global grid computing

Abstract: Decentralization in every walk of life has resulted in the development of Global Grid networking. Data sharing and access depends on their availability, capability, cost and user requirements. One of the needs for a secure Grid Environment is a strong authentication for users. Since Authentication is the entry point into every network, a novel smart card based authentication scheme has been proposed. The proposed authentication scheme utilizes the biometric data embedded in a smart card along with the ID and p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(18 citation statements)
references
References 21 publications
0
18
0
Order By: Relevance
“…Secure functions of the proposed system can be classified into three modules: authentication/access control [31,32], encryption/key management, and SFS. The role and method of functions are as follows.…”
Section: Secure Functions In Secure Platformmentioning
confidence: 99%
“…Secure functions of the proposed system can be classified into three modules: authentication/access control [31,32], encryption/key management, and SFS. The role and method of functions are as follows.…”
Section: Secure Functions In Secure Platformmentioning
confidence: 99%
“…By centralizing the network control layers, the companies can flexibly and efficiently manage the network, and also, through dynamic and automated programming, companies can optimize network resources and directly develop the application to manage network resources. The SDN architecture provides APIs for the users to implement customized services for certain purposes: switching, routing, network resource allocation, bandwidth management, traffic engineering, system optimization, quality of service (QoS), security, access control lists (ACLs) and policy management [4,6,[9][10][11][12]. …”
Section: Software-defined Networkingmentioning
confidence: 99%
“…In particular, in sensor network environment [4][5][6][7], embedded system needs more security technique to improve reliability and efficiency. We call it to secure embedded system.…”
Section: Introductionmentioning
confidence: 99%