Just In
- 9 min ago Realme P Series Goes on Sale in India Today: Check Price, Specs, Offers
- 18 hrs ago Moto G64 5G vs Vivo T3x 5G vs Realme P1 5G: Battle of the Affordable 5G Smartphones!
- 1 day ago 11 Exciting Features Coming With Android 15: Satellite Connectivity, App Pairs, App Archiving, and More
- 1 day ago Best Phones Under Rs 15,000 That Are Optimised for BGMI (PUBG Mobile)
Don't Miss
- News Madhvi Latha, BJP's Hyderabad Candidate, Booked For Hurting Religious Sentiments
- Movies Do Aur Do Pyaar Box Office Collection Day 3: Vidya's Film Sees Slight Jump; Crosses 2.5+ Cr In Opening Weekend
- Automobiles Hyundai Aura Achieves Remarkable 29% Sales Growth in March 2024, Becomes India's Second Best-Selling Sedan
- Education Top MBA Programs at Premier Institutes for Enhancing Your Business Acumen
- Lifestyle When Is World Earth Day 2024? Know Date, Theme, History, Significance And Celebrations
- Sports RR vs MI IPL 2024: Sawai Mansingh Stadium Pitch Report, Jaipur Weather Forecast & Live Streaming Info
- Finance Karnataka Bandh: BJP, Muslim Associations Call For Protests Over Neha Hiremath Murder
- Travel Journey From Delhi To Ooty: Top Transport Options And Attractions
A new, safe login system is on research
A study has revealed that the unique login identity that is verified by the network server is user friendly but it has three main flaws namely, the anonymity of communicating users, the identity theft and misplaced trust.
Mohamed Gouda and his colleagues from the University of Texas have worked on a new login based network that is linked with an unlimited list of user selected pseudonyms that bypasses all these issues.
Other the user, the network authority server will know the address of the user and the pool of the pseudonyms that is linked with the address, says the report.
The issue about the anonymous communication using the network is a very old one and it has required a considerable research, claims the statement of the researchers.
In 1981, researchers have tries to address the issue and for these couple of decades, the methods like Onion routing and Tor Protocol were used as the solutions.
However, these approaches has scaling issues that will limit the number of concurrent users without making great investments in the network servers in order to make them carry the requisite data traffic.
In the new network structure, the users will not have identities instead they will have pseudonyms with which they will be contacted and that they can change often.
The authentication is done by the users and not by the central authority certification. This network does not have identity and therefore it does not have any identity theft.
A researcher claims that this will be an all new network that is quite distinct from the reputation based peer-to-peer ones and the traditional client based ones.
-
1,29,999
-
22,999
-
64,999
-
99,999
-
29,999
-
39,999
-
-
63,999
-
1,56,900
-
96,949
-
1,39,900
-
1,29,900
-
79,900
-
65,900
-
12,999
-
96,949
-
16,499
-
38,999
-
30,700
-
49,999
-
19,999
-
17,970
-
21,999
-
13,474
-
18,999
-
22,999
-
19,999
-
17,999
-
26,999
-
5,999