Download now Free registration required
This paper scrutinizes an active network scenario and proposes an efficient dual authentication key exchanged. The scheme protects personal privacy of identity information. It also provides an effective method to protect against DOS attacks with the scope information of initiator's random number table sent by the responder. In current generation information society has been governed by a collection of huge amounts of information and services that provides convenience to people. However, IMS (Identity Management Systems) have been crucial as the information society is getting bigger.
- Format: PDF
- Size: 363.21 KB