作者: Jiangshan Yu
DOI:
关键词:
摘要: Entity authentication is becoming more and important. With widespread use of distributed computer networks, for example, cellular virtual reality communities, World Wide Web, peer-to-peer networks multiplayer online games, there a need to be vigilant about the security privacy users. One way address concerns remote user this widely used in systems identifying users servers. Remote means verifying whether has permission access network services resources. However, an attacker may impersonate server communicate with then, able steal user’s information. Thereafter, can pass real by using stolen information user. Therefore, mutual needed order prevent bogus attacks. Other requirements include ensuring confidentiality further exchanging messages, protecting privacy, providing anonymity achieving unlinkability. In complex environments however, it challenge design efficient secure protocols under such requirements. The research reported here aims provide identification networks. general, require three factors, i.e., password, smart card biometric characteristics. which based on password called password-based authentication. Password-based together another factor, card, two-factor which, successful achieved if correct corresponding card. biometric-based mainly characteristics, finger print, iris scan face, also three-factor consists