Network Authentication
Mostrando 1-12 de 18 artigos, teses e dissertações.
-
1. Algoritmos de autenticação de mensagens para redes de sensores. / Message authentication algorithms for wireless sensor networks.
Security is an important concern in any modern network. However, networks that are highly dependent on constrained devices (such as sensors, tokens and smart cards) impose a difficult challenge: their reduced availability of memory, processing power and (specially) energy hinders the deployment of many modern cryptographic algorithms known to be secure. This
Publicado em: 2010
-
2. Mecanismo de autenticação baseado na localização de estações sem fios padrão IEEE 802.11 / IEEE 802.11 authentication mechanism based on wireless station location
A vantagem das redes locais sem fios, as quais permitem que uma estação móvel possa deslocar-se livremente dentro da área de abrangência da rede, possui uma contrapartida em termos de segurança. A possibilidade dos sinais de microondas atravessarem paredes e sofrerem atenuação, reflexão, refração, difração e dispersão, dependendo dos obstáculo
Publicado em: 2010
-
3. Uma arquitetura de comunicação oportunística
Mobile computing devices often present high processing power and include several wireless network interfaces. 4G networks promise to provide a unified IP based infrastructure with QoS and security support for the communications using such devices. Transmission delays, and network disruptions, however, are often common when considering the current transmissio
Publicado em: 2010
-
4. Validation of consumers in services oriented architecture (SOA): a framework to validate legitimacy of service consumers and their access means. / Atestamento em arquitetura aberta de serviços (SOA): um arcabouço para validação de legitimidade dos consumidores de serviços e seus dispositivos de acesso.
In Service Oriented Architectures (SOA) the concern with security has received important focus on solution design as a consequence of intrinsic vulnerabilities at the basis of this new paradigm. This work proposes a framework to secure development of SOA applications, with a special attention to security matters regarding validation of service consumers and
Publicado em: 2010
-
5. Middleware seguro para redes de sensores sem fio
There is a variety of application scenarios in wireless sensor networks such as medical monitoring, military, home and office security, agriculture and so on. These applications deal with Wireless Sensor Networks (WSNs) odd particularities such as limited power and computational capacities, hardware heterogeneity, low bandwidth, dynamic topology and scalabil
Publicado em: 2009
-
6. Segurança para o sistema brasileiro de televisão digital: contribuições à proteção de direitos autorais e à autenticação de aplicativos. / Security on brazilian digital television system: contributions to the digital rights protection and to applications authentication.
In Brazil, the television system is considered an important source of communication and entertainment. The Brazilian digital transmissions started on December 2007 and first offered functionalities were the high definition, mobility and portability. In a later moment other functionalities will be added: multiprogramming (more than one service per channel) an
Publicado em: 2009
-
7. Uma proposta de assinatura digital para imagens por meio de marca dágua
Nowadays, digital contents may be shared and easily distributed in Internet, but a lot of intruders use these facilities im order to falsify or illegally distribute this contents. The use of digital watermark is a widely adopted solution, in order to offer security to digital multimedia files by Internet. This solution is adopted with purposes of authenticat
Publicado em: 2008
-
8. Uma proposta de assinatura digital para imagens por meio de marca dâÃgua
Atualmente, os conteÃdos digitais podem ser compartilhados e distribuÃdos na Internet com grande facilidade, no entanto muitos intrusos aproveitam-se dessas facilidades para falsificar ou distribuir ilegalmente estes conteÃdos. O uso de marca dâÃgua digital à uma soluÃÃo amplamente adotada para oferecer seguranÃa Ãs transaÃÃes de arquivos de mult
Publicado em: 2008
-
9. Name service and routing for traffic anonymizing networks / Serviço de nomes e roteamento para redes de anonimização de trafego
In several scenarios, iti s desirable to protect not only the content of a communication, but the identities of its participants. To satisfy this property, different techniques from those used to support confidentiality and authentication are commonly required. In this work, the problem of anonymous communication on the Internet is explored through the desig
Publicado em: 2007
-
10. Gereciamento SNMP com autenticaÃÃo remota: aplicaÃÃo em UPSs / Management SNMP with remote authentication:applications in UPSs
The reliability of a computer system is based not only on the computer itself, but also on its related power system. For that reason, more and more critical systems are counting on UPSs (Uninterruptible Power Supplies) to account for a continuous supply of power. Although the task of managing an UPS for a standalone system be quite straightforward, when it c
Publicado em: 2006
-
11. PERFORMANCE ANALYSIS OF IEEE 802.11B NETWORKS BY MEANS OF SECURITY MECHANISMS / ANÁLISE DE DESEMPENHO DE REDES IEEE 802.11B UTILIZANDO MECANISMOS DE SEGURANÇA
Meanwhile the use of WLAN grows in accelerate pass, a large number of problems related to the security issues in the IEEE 802.11b have been discussed in technical papers, pointing vulnerabilities and deficiencies, from where a non authorized access to the informations passing on the network could be possible. The lack of strong solutions in authentication, c
Publicado em: 2005
-
12. AUTENTICAÇÃO E CONTROLE DE ACESSO INTERINSTITUCIONAL / INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL
Distributed computing has been expanding its scope from local area network applications to wide-area applications, involving different organizations. This expansion implies in several new security challenges, such as the identification of users originating from different organizations and the definition of their access rights. Commom aproaches involve replic
Publicado em: 2005