8 Questions 14 Answers 0 Followers
Questions related from Preeti Chandrakar
Any references for correlation among the ECG signals after the peak R is detected so that the rest peaks and characteristics could be identified ?
05 April 2019 2,245 2 View
For designing remote user authentication schemes for different application areas like Wireless Sensors Networks (WSNs), Internet of Things (IoT), E-health care, Cloud Server, etc., which types of...
16 January 2019 9,226 1 View
Are any tools available for simulating the authentication protocols ?
16 January 2019 6,747 10 View
In literature, various authentication protocols are developed using various cryptographic techniques such as RSA cryptosystem, ECC cryptosystem and so on. What are the most practical application...
17 March 2018 9,758 4 View
Can any one provide me some link, where I can read about Fuzzy extractor specially Generator function and replication function in details. How Gen function and replication function internally...
28 October 2017 6,831 5 View
In RSA cryptosystem, we generally take 1024 bits long prime numbers p and q. Is any problem if we take 512 bits long prime numbers? What are the security issues may be generated in real time scenario?
26 October 2017 208 9 View
I have seen many authentication schemes, whose title is "Anonymous authentication scheme". What is the actual meaning of anonymous in terms of security?
25 October 2017 5,589 9 View
In smart card based authentication scheme, we generally say that smart card generates random numbers or computes some parameters? How smart card performs these operations?
24 October 2017 2,852 3 View