語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Device fingerprinting identification...
~
ProQuest Information and Learning Co.
Device fingerprinting identification and authentication : = A two-fold use in multi-factor access control schemes.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Device fingerprinting identification and authentication :/
其他題名:
A two-fold use in multi-factor access control schemes.
作者:
Manning, Paul E.
面頁冊數:
1 online resource (79 pages)
附註:
Source: Masters Abstracts International, Volume: 56-02.
Contained By:
Masters Abstracts International56-02(E).
標題:
Computer engineering. -
電子資源:
click for full text (PQDT)
ISBN:
9781369528046
Device fingerprinting identification and authentication : = A two-fold use in multi-factor access control schemes.
Manning, Paul E.
Device fingerprinting identification and authentication :
A two-fold use in multi-factor access control schemes. - 1 online resource (79 pages)
Source: Masters Abstracts International, Volume: 56-02.
Thesis (M.S.)
Includes bibliographical references
This item is not available from ProQuest Dissertations & Theses.
Network security has always had an issue with secure authentication and identification. In the current mixed device network of today, the number of nodes on a network has expanded but these nodes are often unmanaged from a network security perspective. The solution proposed requires a paradigm shift, a recognition of what has already happened, identity is for sale across the internet. That identity is the users' network ID, their behavior, and even their behavior in using the networks. Secondly a majority of the devices on the Internet have been fingerprinted. Use of device fingerprinting can help secure a network if properly understood and properly executed. The research into this area suggests a solution. Which is the use of device fingerprints including clock skews to identify the devices and a dual- authentication process targeted at authenticating the device and the user. Not only authenticating the identity presented but also combining them into a unified entity so failure to authenticate part of the entity means the whole is denied access to the network and its resources.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781369528046Subjects--Topical Terms:
569006
Computer engineering.
Index Terms--Genre/Form:
554714
Electronic books.
Device fingerprinting identification and authentication : = A two-fold use in multi-factor access control schemes.
LDR
:02470ntm a2200361Ki 4500
001
909662
005
20180426091042.5
006
m o u
007
cr mn||||a|a||
008
190606s2016 xx obm 000 0 eng d
020
$a
9781369528046
035
$a
(MiAaPQ)AAI10241626
035
$a
(MiAaPQ)iastate:16089
035
$a
AAI10241626
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
099
$a
TUL
$f
hyy
$c
available through World Wide Web
100
1
$a
Manning, Paul E.
$3
1180552
245
1 0
$a
Device fingerprinting identification and authentication :
$b
A two-fold use in multi-factor access control schemes.
264
0
$c
2016
300
$a
1 online resource (79 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 56-02.
500
$a
Adviser: Doug W. Jacobson.
502
$a
Thesis (M.S.)
$c
Iowa State University
$d
2016.
504
$a
Includes bibliographical references
506
$a
This item is not available from ProQuest Dissertations & Theses.
520
$a
Network security has always had an issue with secure authentication and identification. In the current mixed device network of today, the number of nodes on a network has expanded but these nodes are often unmanaged from a network security perspective. The solution proposed requires a paradigm shift, a recognition of what has already happened, identity is for sale across the internet. That identity is the users' network ID, their behavior, and even their behavior in using the networks. Secondly a majority of the devices on the Internet have been fingerprinted. Use of device fingerprinting can help secure a network if properly understood and properly executed. The research into this area suggests a solution. Which is the use of device fingerprints including clock skews to identify the devices and a dual- authentication process targeted at authenticating the device and the user. Not only authenticating the identity presented but also combining them into a unified entity so failure to authenticate part of the entity means the whole is denied access to the network and its resources.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer engineering.
$3
569006
650
4
$a
Information technology.
$3
559429
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0464
690
$a
0489
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Iowa State University.
$b
Electrical and Computer Engineering.
$3
1179387
773
0
$t
Masters Abstracts International
$g
56-02(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10241626
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入