2018
DOI: 10.3991/ijim.v12i8.8194
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Authentication Mechanism to Prevent Unauthorized Service Access for Mobile Device in Distributed Network

Abstract: The growth of distributed computer networks (DCN) is simple for the user to share information and computing capabilities with the host. User identification is an essential access control mechanism for the client-server networking architecture. The perception of single sign-on allows a legitimate user to access a different service provider on a DCN using a single session key. Recently, several user identification techniques being proposed for DCN. Unfortunately, the existing proposals cannot maintain user anony… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 17 publications
(27 reference statements)
0
2
0
Order By: Relevance
“…This information could be used to attack the software application, its network host or its users. Various security mechanisms utilized to prevent information leakages, such as Authentication [21,22], Access Control (Authorization), Logging and Intrusion Detection [23,24], Auditability, SQL Injection [25][26][27][28], Data Validation, and Security Tests [29,30].…”
Section: External Threats (Information Leakage)mentioning
confidence: 99%
“…This information could be used to attack the software application, its network host or its users. Various security mechanisms utilized to prevent information leakages, such as Authentication [21,22], Access Control (Authorization), Logging and Intrusion Detection [23,24], Auditability, SQL Injection [25][26][27][28], Data Validation, and Security Tests [29,30].…”
Section: External Threats (Information Leakage)mentioning
confidence: 99%
“…A Novel authentication mechanism to prevent unauthorized service access to a mobile device in a distributed network [12]: The client-server is the distributed computer network architecture that client or user has to log on to the server for data processing. The server has to detect if the current log on client user is legitimate.…”
Section: 7mentioning
confidence: 99%