会议论文详细信息
14th International Conference on Science, Engineering and Technology
Sequential mathematical solution for authentication and authorization technique implementing encryption methodology creating secure transaction using various methods also at quantum level
自然科学;工业技术
Gharami, Snigdha^1 ; Dinakaran, M.^1
School of Information Technology and Engineering, VIT University, Vellore
Tamil Nadu
632014, India^1
关键词: Analysis of various;    Authentication and authorization;    Extended researches;    Mathematical calculations;    Mathematical solutions;    Multiple layers;    Secure transactions;    Social interactions;   
Others  :  https://iopscience.iop.org/article/10.1088/1757-899X/263/4/042013/pdf
DOI  :  10.1088/1757-899X/263/4/042013
来源: IOP
PDF
【 摘 要 】

We see challenges in authenticating each aspect of electronic usage, starting from transaction to social interaction the authenticity and availability of correct information is guided in various ways. Authentication and authorization follow one another; a process of authentication is calculated on multiple layers of steps. In this paper we discuss various possibilities of modifying and using ways to deal with authentication and authorization mechanism. Idea is to work through authentication with mathematical calculations. We will go through various scenarios and find out the system of information that fits best at the moment of need. We will take account of new approaches of authentication and authorization while working on mathematical paradigm of information. The paper also takes an eye on quantum cryptography and discusses on how it could help one in the present scenario. This paper is divided into sections discussing on various paradigm of authentication and how one can achieve it in secure way, this paper is part of research work where analysis of various constraints are to be followed in the extended research work.

【 预 览 】
附件列表
Files Size Format View
Sequential mathematical solution for authentication and authorization technique implementing encryption methodology creating secure transaction using various methods also at quantum level 595KB PDF download
  文献评价指标  
  下载次数:8次 浏览次数:14次