The most popular mechanism to carry out the user authentication is by means of password-based authentication protocols. However, the server must store and maintain the identities and password of each user in a database, making possible the insider attack (Ku and Chen, 2004). In 2010, Sood-Sarje-Singh proposed a dynamic ID-based ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?