2006
DOI: 10.1007/11802167_36
|View full text |Cite
|
Sign up to set email alerts
|

Secure User Authentication Mechanism in Digital Home Network Environments

Abstract: Abstract. The home network is a new IT technology environment for making an offer of convenient, safe, pleasant, and blessed lives to people, making it possible to be provided with various home network services by constructing home network infrastructure regardless of devices, time, and places. This can be done by connecting home devices based on wire and wireless communication networks, such as mobile communication, Internet, and sensor network. However, there are many risks involved, for example user privacy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(20 citation statements)
references
References 5 publications
0
20
0
Order By: Relevance
“…It's designed for supporting interconnection and compatibility with heterogeneous networks. This platform should be independent of hardware and software vendors, should connect with existing entire networks, and accept new networks in the future [17].…”
Section: Security System Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…It's designed for supporting interconnection and compatibility with heterogeneous networks. This platform should be independent of hardware and software vendors, should connect with existing entire networks, and accept new networks in the future [17].…”
Section: Security System Modelmentioning
confidence: 99%
“…In this context, we distinguish two representative protocols for reusing tickets within the ticket's valid time; the Neuman-Stubblebine authentication protocol [18] and the Kerberos authentication protocol [19] developed by MIT. [18] [17]. Kerberos [20] is a widely deployed authentication system.…”
Section: Security System Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…During the last couple of decades, smart cards have been utilized greatly in electronic commerce. Many authentication protocols and algorithms have also been implemented [1][2][3][4]10] upon smart cards.…”
Section: Introductionmentioning
confidence: 99%