Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Authentication

Turkish Journal of Electrical Engineering and Computer Sciences

Articles 1 - 8 of 8

Full-Text Articles in Computer Engineering

Formally Analyzed M-Coupon Protocol With Confirmation Code (Mcwcc), Keri̇m Yildirim, Gökhan Dalkiliç, Nevci̇han Duru Jan 2019

Formally Analyzed M-Coupon Protocol With Confirmation Code (Mcwcc), Keri̇m Yildirim, Gökhan Dalkiliç, Nevci̇han Duru

Turkish Journal of Electrical Engineering and Computer Sciences

There are many marketing methods used to attract customers' attention and customers search for special discounts and conduct research to get products cheaper. Using discount coupons is one of the widely used methods for obtaining discounts. With the development of technology, classical paper-based discount coupons become e-coupons and then turn into mobile coupons (m-coupons). It is inevitable that retailers will use m-coupon technology to attract customers while mobile devices are used in daily life. As a result, m-coupon technology is a promising technology. One of the significant problems with using m-coupons is security. Here it is necessary to ensure the …


Invisible Watermarking Framework That Authenticates And Prevents The Visualization Of Anaglyph Images For Copyright Protection, David-Octavio Muñoz-Ramirez, Volodymyr Ponomaryov, Rogelio Reyes-Reyes, Clara Cruz-Ramos, Beatriz-Paulina Garcia-Salgado Jan 2019

Invisible Watermarking Framework That Authenticates And Prevents The Visualization Of Anaglyph Images For Copyright Protection, David-Octavio Muñoz-Ramirez, Volodymyr Ponomaryov, Rogelio Reyes-Reyes, Clara Cruz-Ramos, Beatriz-Paulina Garcia-Salgado

Turkish Journal of Electrical Engineering and Computer Sciences

In this work, a watermarking framework to authenticate and protect the copyright that prevents the visualization of nonauthorized anaglyph images is proposed. Designed scheme embeds a binary watermark and the Blue channel of the anaglyph image into the discrete cosine transform domain of the original image. The proposed method applies the quantization index modulation-dither modulation algorithm and a combination of Bose-Chaudhuri-Hocquenghem with repetition codes, which permit to increase the capability in recovering the watermark. Additionally, Hash algorithm is used to scramble the component where the watermark should be embedding, guaranteeing a higher security performance of the scheme. This new technique …


Token-Based Authentication Method For M2m Platforms, Hüseyi̇n Polat, Saadi̇n Oyucu Jan 2017

Token-Based Authentication Method For M2m Platforms, Hüseyi̇n Polat, Saadi̇n Oyucu

Turkish Journal of Electrical Engineering and Computer Sciences

Nowadays the fields in which machine-to-machine (M2M) applications are used and the numbers of M2M devices and users are increasing gradually. In an M2M application, M2M platforms are used in order to follow and analyze the data presented by M2M devices. The communication of multiple users and devices via an M2M platform causes some problems in terms of security. In this study, an M2M platform has been developed by using RestFul web services and NoSQL database. On this platform a token-based authentication method was used for multiple users and devices. In this method, an authorized request approach was adopted for …


Authentication Of Uncertain Data Based On K-Means Clustering, Levent Ünver, Taflan İmre Gündem Jan 2016

Authentication Of Uncertain Data Based On K-Means Clustering, Levent Ünver, Taflan İmre Gündem

Turkish Journal of Electrical Engineering and Computer Sciences

No abstract provided.


An Improved Security Framework For Web Service-Based Resources, Wenbin Jiang, Hui Xu, Hao Dong, Hai Jin, Xiaofei Liao Jan 2016

An Improved Security Framework For Web Service-Based Resources, Wenbin Jiang, Hui Xu, Hao Dong, Hai Jin, Xiaofei Liao

Turkish Journal of Electrical Engineering and Computer Sciences

Web service-based application has become one of the dominative ones of the Internet. This trend brings more and more security challenges in reliability, confidentiality, and data nonrepudiation, especially in some systems that have massive diversified resources. An improved framework for secure accesses of Web resources is presented and implemented by extending and enhancing the Spring Security framework. It improves the security level of systems for identity authentication, authorized access, and secure transmission. The highly safe authentication is based on the integration of an improved authentication module of Spring Security with a U-key method and a RSA algorithm. For authorized access, …


Efficient Id-Based Authentication And Key Agreement Protocols For The Session Initiation Protocol, Haci Hakan Kilinç, Yolguly Allaberdiyev, Tuğrul Yanik, Serdar Süer Erdem Jan 2015

Efficient Id-Based Authentication And Key Agreement Protocols For The Session Initiation Protocol, Haci Hakan Kilinç, Yolguly Allaberdiyev, Tuğrul Yanik, Serdar Süer Erdem

Turkish Journal of Electrical Engineering and Computer Sciences

In a widely deployed VoIP system tens of thousands of clients compete for the SIP proxy server's authentication service. SIP protocol implementations have to meet certain QoS and security requirements. In this study new ID-based protocols are proposed for the SIP authentication and key agreement protocols. These protocols minimize the use of expensive pairing functions but still resist notable attacks. The security of the proposed protocols are analyzed and demonstrated with security proofs based on the BJM security model. Finally, the performance overhead of the proposed protocols are compared to ID-based SIP authentication and key agreement protocols given in the …


Remote Mutual Authentication And Key Agreement Scheme Based On Elliptic Curve Cryptosystem, Eunjun Yoon Jan 2011

Remote Mutual Authentication And Key Agreement Scheme Based On Elliptic Curve Cryptosystem, Eunjun Yoon

Turkish Journal of Electrical Engineering and Computer Sciences

Remote mutual authentication is an important part of security, along with confidentiality and integrity, for systems that allow remote access over untrustworthy networks, like the Internet. In 2006, Shieh-Wang pointed out the weakness of Juang's remote mutual authentication scheme using smart card and further proposed a novel remote user authentication scheme using smart card. However, this paper demonstrates that Shieh-Wang's scheme still does not provide perfect forward secrecy and is vulnerable to a privileged insider's attack. We also present an improved scheme based on the Elliptic Curve Diffie-Hellman problem (ECDHP) and secure one-way hash function, in order to isolate such …


Improving The Security And Flexibility Of One-Time Passwords By Signature Chains, Kemal Biçakci, Nazi̇fe Baykal Jan 2003

Improving The Security And Flexibility Of One-Time Passwords By Signature Chains, Kemal Biçakci, Nazi̇fe Baykal

Turkish Journal of Electrical Engineering and Computer Sciences

While the classical attack of ``monitor the network and intercept the password'' can be avoided by advanced protocols like SSH, one-time passwords are still considered a viable alternative or a supplement for software authentication since they are the only ones that safeguard against attacks on insecure client machines. In this paper by using public-key techniques we present a method called signature chain alternative to Lamport's hash chain to improve security and flexibility of one-time passwords. Our proposition improves the security because first, like other public-key authentication protocols, the server and the user do not share a secret, thereby eliminating attacks …