Efficient remote authentication

Michael Kiperberg, Nezer Zaidenberg

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

Kennel, R. and Jamieson, H. (2003) describe a method of a remote machine authentication. By authentication the authors mean that the remote machine is non-virtual and the operating system on the remote machine is not malicious. The described method does not consider the variety of versions of each operating system. The description completely ignores the existence of modules that can be plugged into the operating system. In this paper we adapt the method described by Kennel, R. and Jamieson, H. (2003) to the real world, so that the method can be applied without prior knowledge of the operating system or the modules on the remote machine.

Original languageEnglish
Title of host publication12th European Conference on Information Warfare and Security 2013, ECIW 2013
PublisherAcademic Conferences Ltd
Pages144-148
Number of pages5
ISBN (Print)9781627489089
StatePublished - 2013
Externally publishedYes
Event12th European Conference on Information Warfare and Security 2013, ECIW 2013 - Jyvaskyla, Finland
Duration: 11 Jul 201312 Jul 2013

Publication series

NameEuropean Conference on Information Warfare and Security, ECCWS
ISSN (Print)2048-8602
ISSN (Electronic)2048-8610

Conference

Conference12th European Conference on Information Warfare and Security 2013, ECIW 2013
Country/TerritoryFinland
CityJyvaskyla
Period11/07/1312/07/13

Keywords

  • Database
  • Digital rights management
  • Remote authentication
  • Virtual machine

Fingerprint

Dive into the research topics of 'Efficient remote authentication'. Together they form a unique fingerprint.

Cite this