TY - GEN
T1 - Efficient remote authentication
AU - Kiperberg, Michael
AU - Zaidenberg, Nezer
PY - 2013
Y1 - 2013
N2 - Kennel, R. and Jamieson, H. (2003) describe a method of a remote machine authentication. By authentication the authors mean that the remote machine is non-virtual and the operating system on the remote machine is not malicious. The described method does not consider the variety of versions of each operating system. The description completely ignores the existence of modules that can be plugged into the operating system. In this paper we adapt the method described by Kennel, R. and Jamieson, H. (2003) to the real world, so that the method can be applied without prior knowledge of the operating system or the modules on the remote machine.
AB - Kennel, R. and Jamieson, H. (2003) describe a method of a remote machine authentication. By authentication the authors mean that the remote machine is non-virtual and the operating system on the remote machine is not malicious. The described method does not consider the variety of versions of each operating system. The description completely ignores the existence of modules that can be plugged into the operating system. In this paper we adapt the method described by Kennel, R. and Jamieson, H. (2003) to the real world, so that the method can be applied without prior knowledge of the operating system or the modules on the remote machine.
KW - Database
KW - Digital rights management
KW - Remote authentication
KW - Virtual machine
UR - http://www.scopus.com/inward/record.url?scp=84893491687&partnerID=8YFLogxK
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:84893491687
SN - 9781627489089
T3 - European Conference on Information Warfare and Security, ECCWS
SP - 144
EP - 148
BT - 12th European Conference on Information Warfare and Security 2013, ECIW 2013
PB - Academic Conferences Ltd
T2 - 12th European Conference on Information Warfare and Security 2013, ECIW 2013
Y2 - 11 July 2013 through 12 July 2013
ER -