Academic literature on the topic 'Authentication mechanism'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Authentication mechanism.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Authentication mechanism"

1

Putra, Kurnia Prima, Marwan Ramdhany Edy, M. Syahid Nur Wahid, Muhammad Fajar B, and Fadhlirrahman Baso. "FEATURES SIMPLIFICATION USING CUBIC BEZIER PROPERTIES FOR GAIT RECOGNITION ON SMARTPHONE." Journal of Embedded Systems, Security and Intelligent Systems 3, no. 1 (2022): 11. http://dx.doi.org/10.26858/jessi.v3i1.33716.

Full text
Abstract:
Smartphone is widely used around the world. It’s user authentication usually used pin code, pattern code, fingerprint and conventional login authentication. This kinds of authentication mechanism is intrusive because those mechanisms requires users to give exclusive interaction for user authentication during the process. One of authentication method which is non-intrusive during data collection is authentication by using gait. This mechanism classified as non-intrusive because this mechanism could gather biometric data without being noticed by the authentication subjects. Since it is non-intrusive, this mechanism allows re-authentications without bothering the authentication subjects. One of the recent gait recognition is using accelerometer on smartphone to measure and capture acceleration data on gait. This method extract step cycles in various length, map and interpolate the data into higher sample count, and then use each of mapped and interpolated data as feature using recognition. Regardless the classification or recognition method, using each mapped and interpolated data as features would result in high processing time during classification or recognition due to high feature count. In this research, we try to simplify the features of gait data with minimum data loss so it might give robust result with less latency by aligning cubic Bezier curve to step cycle data and extracting the Bezier properties.
APA, Harvard, Vancouver, ISO, and other styles
2

Carrillo-Torres, Diego, Jesús Arturo Pérez-Díaz, Jose Antonio Cantoral-Ceballos, and Cesar Vargas-Rosales. "A Novel Multi-Factor Authentication Algorithm Based on Image Recognition and User Established Relations." Applied Sciences 13, no. 3 (2023): 1374. http://dx.doi.org/10.3390/app13031374.

Full text
Abstract:
Conventional authentication methods, like simple text-based passwords, have shown vulnerabilities to different types of security attacks. Indeed, 61% of all breaches involve credentials, whether stolen via social engineering or hacked using brute force. Therefore, a robust user authentication mechanism is crucial to have secure systems. Combining textual passwords with graphical passwords in a multi-factor approach can be an effective strategy. Advanced authentication systems, such as biometrics, are secure, but require additional infrastructure for efficient implementation. This paper proposes a Multi-Factor Authentication (MFA) based on a non-biometric mechanism that does not require additional hardware. The novelty of the proposed mechanism lies in a two-factor authentication algorithm which requires a user to identify specific images out of a set of randomly selected images, then the user is required to establish a self-pre-configured relation between two given images to complete authentication. A functional prototype of the proposed system was developed and deployed. The proposed system was tested by users of different backgrounds achieving 100% accuracy in identifying and authenticating users, if authentication elements and credentials were not forgotten. It was also found to be accepted by the users as being easy to use and preferable over common MFA mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
3

Taskeen, Fathima, and Mary Vennila S. "An Improved Mechanism for SDN Flow Space to Control Oriented Authentication NAA Network." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2019): 350–54. https://doi.org/10.35940/ijeat.B3014.129219.

Full text
Abstract:
The Open Daylight platform with its power by working with IEEE 802.1X port level authentication for wired and wireless networks has been very supportive because of the massive deployments at mean charge for main design considerations. Within the current marketplace, 802.1X has flourished the ground works for wireless, wire stability, LAN stability and authentication methods. EAP (Extensible Authentication Protocol) supports long time protection of the supplicant and the authentication software till the end condition of the RADIUS (Remote Authentication Dial-In User Service) server is met. This paper is focused on the RAR (RADIUS Access Request) unique identification about the users on the network with SAA (Supplicant, Authenticator and Authentication server) system which records on the attribute cost of RFC 2865 according to the forwarding server. NAA (Non-Adaptive Algorithm) using Flow Visor based virtualization packages drive inward the network timescales or statistics, dynamically controlling the flow space of switches to control the speed and results in scaling of networks. NAA is an application level protocol that contains authentication and configuration information between a Network Access Server and a shared authentication server. It avoids the attacker from listening for requests and responses from the server and calculates the improved MD5 client secret key of the response.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Xiaolong, Wei Wu, and Bin Zhou. "Secure Physical Layer Transmission and Authentication Mechanism Based on Compressed Sensing of Multiple Antenna Arrays." Journal of Sensors 2021 (November 10, 2021): 1–11. http://dx.doi.org/10.1155/2021/7022297.

Full text
Abstract:
Large-scale antenna technology has become one of the most promising technologies in 5G because of its ability to effectively improve the spectral efficiency and energy efficiency of the system, as well as its better robustness. In this paper, a large amount of CSI (channel state information) data is characterized by feature mining and law analysis, and a large number of channel characteristics of the physical layer have the advantages of randomness and uniqueness, etc. From the perspective of improving the security of the authentication mechanism and reducing the computational complexity of the authentication mechanism, the physical layer security authentication model is analyzed, and the signal security transmission path, signal authenticity, and channel estimation are used to propose an effective physical layer secure transmission and authentication mechanism, which can be used as a security enhancement and lightweight authentication mechanism for existing authentication mechanisms. In this paper, we analyze the security advantage mechanism of physical layer authentication and prove the security performance boundary; propose an authentication security enhancement method based on the channel feature generation key, a message authentication method based on superimposed tag signals; and propose a method based on private guide frequency for high-speed service data authentication.
APA, Harvard, Vancouver, ISO, and other styles
5

Kadam, Pankaj Anil. "Enhanced ATM Security based on Machine Vision." International Journal for Research in Applied Science and Engineering Technology 9, no. VIII (2021): 816–20. http://dx.doi.org/10.22214/ijraset.2021.37432.

Full text
Abstract:
Now a days almost all peoples are using ATM for banking transactions like cash withdrawal, check balance, transfer cash. In this research which is based on implementing Fingerprint mechanism in ATM system. We selected this area to provide more security to customers. There is no need to always carry the ATM with us and no fear to lose it. By providing Fingerprint authentication we were providing strong authentication. And now a day’s fingerprint authentication is most trusted and safe than other authentications.
APA, Harvard, Vancouver, ISO, and other styles
6

Herrera-Cubides, Jhon Francined, Paulo Alonso Gaona-García, and Geiner Alexis Salcedo-Salgado. "Towards the Construction of a User Unique Authentication Mechanism on LMS Platforms through Model-Driven Engineering (MDE)." Scientific Programming 2019 (March 11, 2019): 1–16. http://dx.doi.org/10.1155/2019/9313571.

Full text
Abstract:
In LOD, authentication is a key factor in the security dimension of linked data quality models. This is the case of (a) LMS that manages open educational resources (OERs), in training process, and (b) LMS integrated platforms, which also require authenticating users. Authentication tackles a range of problems such as users forgetting passwords and time consumption in repetitive logins in different applications. In the context of linked OERs that are developed in LMS, it is necessary to design guidelines in order to carry out the authentication process. This process authorizes access to different linked resources platforms. Therefore, to provide abstraction methods for this authentication process, it is proposed to work with model-driven architecture (MDA) approach. This paper proposes a security abstraction model on LMS, based on MDA. The proposed metamodel seeks to provide a set of guidelines on how to carry out unified authentication, establishing a common dialogue among stakeholders. Conclusion and future work are proposed in order to generate authentication instances that allow access to resources managed in different platforms.
APA, Harvard, Vancouver, ISO, and other styles
7

Mishra, Gouri Sankar, Pradeep Kumar Mishra, Parma Nand, Rani Astya, and Amrita. "User Authentication: A Three Level Password Authentication Mechanism." Journal of Physics: Conference Series 1712 (December 2020): 012005. http://dx.doi.org/10.1088/1742-6596/1712/1/012005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Talati, Ronak, and Shubham Shah. "4-D Authentication Mechanism." IOSR Journal of Computer Engineering 16, no. 2 (2014): 01–06. http://dx.doi.org/10.9790/0661-16250106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zavrak, Sultan, Seyhmus Yilmaz, Huseyin Bodur, and Sinan Toklu. "The implementation of two-factor web authentication system based on facial recognition." Global Journal of Computer Sciences: Theory and Research 7, no. 2 (2017): 68. http://dx.doi.org/10.18844/gjcs.v7i2.2715.

Full text
Abstract:
The security of the web is a very important issue, because every day we make a variety of operations in it, for different reasons, during the day. Apart from protecting the information, contacts, accounts and data on the web, such data should be inaccessible to third-party persons. This in turn depends on the success of the authentication process performed on the individual web. With authentication, it is possible for users to protect their information and make their transactions only for themselves. However, the authentication mechanism used at this point must have a high level of safety. With the purpose to damage a person's privacy and access account information and gain profit in this way, many malicious persons have developed various methods of attacks to bypass authentication mechanisms. These methods sometimes succeed on a variety of authentication mechanisms, and put users and relevant websites into a difficult situation, and may even damage them in a variety of aspects. In order to protect personal information on the web system and provide the security of transactions carried out at a high level, in this study, we propose a two-factor authentication mechanism based on facial recognition. Besides, we discuss some implementation details about the proposed method. The proposed method aims to bring a new approach to the authentication system to perform our online process with the highest security. In addition to the standard authentication systems, using face recognition as a secondary level of security will contribute to the emergence of a new authentication mechanism.
 
 Keywords: Web authentication, two-factor authentication, web security, facial recognition.
 
 The security of the web is a very important issue, because every day we make a variety of operations in it, for different reasons, during the day. Apart from protecting the information, contacts, accounts and data on the web, such data should be inaccessible to third-party persons. This in turn depends on the success of the authentication process performed on the individual web. With authentication, it is possible for users to protect their information and make their transactions only for themselves. However, the authentication mechanism used at this point must have a high level of safety. With the purpose to damage a person's privacy and access account information and gain profit in this way, many malicious persons have developed various methods of attacks to bypass authentication mechanisms. These methods sometimes succeed on a variety of authentication mechanisms, and put users and relevant websites into a difficult situation, and may even damage them in a variety of aspects. In order to protect personal information on the web system and provide the security of transactions carried out at a high level, in this study, we propose a two-factor authentication mechanism based on facial recognition. Besides, we discuss some implementation details about the proposed method. The proposed method aims to bring a new approach to the authentication system to perform our online process with the highest security. In addition to the standard authentication systems, using face recognition as a secondary level of security will contribute to the emergence of a new authentication mechanism.
 Keywords: Web authentication, two-factor authentication, web security, facial recognition.
APA, Harvard, Vancouver, ISO, and other styles
10

Rayani, Praveen Kumar, Bharath Bhushan, and Vaishali Ravindra Thakare. "Multi-Layer Token Based Authentication Through Honey Password in Fog Computing." International Journal of Fog Computing 1, no. 1 (2018): 50–62. http://dx.doi.org/10.4018/ijfc.2018010104.

Full text
Abstract:
This article describes how fog computing empowers network resource utilization by providing services to low bandwidth users in cloud environment. Here, authentication mechanisms are used by fog nodes while providing services to end users. In cloud computing there are several types of authentication mechanisms, in which token based authentication takes less time for validating password. The proposed technique uses token based authentication mechanism with honey password. The aim of this article is to focus on multi-layer token based authentication for identifying the authorized user at fog node. In authentication phase end user instantaneously frame his user account password with honey password that makes illusion to shoulder surfers password has changed. The proposed mechanism avoids and detects shoulder surfing attacks, password guessing attacks, and application denial of service attacks.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Authentication mechanism"

1

Gerdzhikov, Petko. "Behaviour of Port-knocking authentication mechanism." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-60929.

Full text
Abstract:
Port-knocking is a security mechanism used in computer systems to hide available network services. Its operation relies on a drop policy firewall setting in order to make impossible for port-scanning attacks to occur. This project researches the impact of implementing such a software solution. Furthermore, it looks into the behavior of three chosen implementations and make conclusions on the benefits and disadvantages that they bring. In addition, the surrounding implications related to both user and administrator are explored. This thesis includes tests on the resource consumption of the implementations as well as records of the added delay of using the mechanism when initiating a SSH session. There has not been such research performed in this field and the results of it could be beneficial to those who are involved in computer science and network security in particular. Finally, the product of this study state that port-knocking is overlooked and has great benefits in preventing zero-day exploits and hacker tools relying on exposed network services.
APA, Harvard, Vancouver, ISO, and other styles
2

Velthuis, Paul. "New authentication mechanism using certificates for big data analytic tools." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215694.

Full text
Abstract:
Companies analyse large amounts of sensitive data on clusters of machines, using a framework such as Apache Hadoop to handle inter-process communication, and big data analytic tools such as Apache Spark and Apache Flink to analyse the growing amounts of data. Big data analytic tools are mainly tested on performance and reliability. Security and authentication have not been enough considered and they lack behind. The goal of this research is to improve the authentication and security for data analytic tools.Currently, the aforementioned big data analytic tools are using Kerberos for authentication. Kerberos has difficulties in providing multi factor authentication. Attacks on Kerberos can abuse the authentication. To improve the authentication, an analysis of the authentication in Hadoop and the data analytic tools is performed. The research describes the characteristics to gain an overview of the security of Hadoop and the data analytic tools. One characteristic is that the usage of the transport layer security (TLS) for the security of data transportation. TLS usually establishes connections with certificates. Recently, certificates with a short time to live can be automatically handed out.This thesis develops new authentication mechanism using certificates for data analytic tools on clusters of machines, providing advantages over Kerberos. To evaluate the possibility to replace Kerberos, the mechanism is implemented in Spark. As a result, the new implementation provides several improvements. The certificates used for authentication are made valid with a short time to live and are thus less vulnerable to abuse. Further, the authentication mechanism solves new requirements coming from businesses, such as providing multi-factor authenticationand scalability.In this research a new authentication mechanism is developed, implemented and evaluated, giving better data protection by providing improved authentication.
APA, Harvard, Vancouver, ISO, and other styles
3

J, Sharma Madhu. "Improved IP multimedia subsystem authentication mechanism in next generation networks." Thesis, University of British Columbia, 2011. http://hdl.handle.net/2429/39950.

Full text
Abstract:
The provision of IP Multimedia Subsystem (IMS) introduces important advantages for users of 3G-WLAN access networks. In order to enjoy the benefits of a standardized IMS architecture, the user has to undergo authentication procedure with the access network, followed by an authentication procedure with the IMS layer. This multi-pass authentication procedure is essential for securing IMS from malicious users, resulting in added overhead and possible quality of service degradations. This approach is highly inefficient. The problem is further compounded when the user moves from one WLAN domain into another, which requires the authentication procedure to be repeated. To mitigate this problem, we present a lightweight, robust, and architecture-compatible IMS authentication protocol that implements a one-pass IMS procedure by promoting efficient key re-use for a mobile user. We further show how our protocol is extended to support IMS access over Long Term Evolution (LTE) -Heterogeneous network. IMS, an access network agnostic overlay, is adopted as a de facto standard for for delivering voice over LTE. We make use of Home Node B femtocells to perform the role of IMS proxy. To verify the feasibility of using our protocol in mobile networks, an abstract model of our protocol is derived. The abstract model is emulated using Asterisk server and virtualization techniques. The security of the proposed protocols is verified using the Automated Validation of Internet Security Protocols and Applications (AVISPA) security analyzer. We also analyze the authentication delay of our proposed scheme. Numerical results reveal a reduction in user authentication delay of more than 50 percent compared to the existing authentication procedure.
APA, Harvard, Vancouver, ISO, and other styles
4

Monteiro, Steena D. S. "A Novel Authentication And Validation Mechanism For Analyzing Syslogs Forensically." DigitalCommons@USU, 2008. https://digitalcommons.usu.edu/etd/198.

Full text
Abstract:
This research proposes a novel technique for authenticating and validating syslogs for forensic analysis. This technique uses a modification of the Needham Schroeder protocol, which uses nonces (numbers used only once) and public keys. Syslogs, which were developed from an event-logging perspective and not from an evidence-sustaining one, are system treasure maps that chart out and pinpoint attacks and attack attempts. Over the past few years, research on securing syslogs has yielded enhanced syslog protocols that focus on tamper prevention and detection. However, many of these protocols, though efficient from a security perspective, are inadequate when forensics comes into play. From a legal perspective, any kind of evidence found at a crime scene needs to be validated. In addition, any digital forensic evidence when presented in court needs to be admissible, authentic, believable, and reliable. Currently, a patchy log on the server side and client side cannot be considered as formal authentication of a wrongdoer. This work presents a method that ties together, authenticates, and validates all the entities involved in the crime scene--the user using the application, the system that is being used, and the application being used on the system by the user. This means that instead of merely transmitting the header and the message, which is the standard syslog protocol format, the syslog entry along with the user fingerprint, application fingerprint, and system fingerprint are transmitted to the logging server. The assignment of digital fingerprints and the addition of a challenge response mechanism to the underlying syslogging mechanism aim to validate generated syslogs forensically.
APA, Harvard, Vancouver, ISO, and other styles
5

Maguire, Joseph Noel. "An ecologically valid evaluation of an observation-resilient graphical authentication mechanism." Thesis, University of Glasgow, 2013. http://theses.gla.ac.uk/4708/.

Full text
Abstract:
Alphanumeric authentication, by means of a secret, is not only a powerful mechanism, in theory, but prevails over all its competitors in reality. Passwords, as they are more commonly known, have the potential to act as a fairly strong gateway. In practice, though, password usage is problematic. They are (1) easily shared, (2) trivial to observe and (3) maddeningly elusive when forgotten. Moreover, modern consumer devices only exacerbate the problems of passwords as users enter them in shared spaces, in plain view, on television screens, on smartphones and on tablets. Asterisks may obfuscate alphanumeric characters on entry but popular systems, e.g. Apple iPhone and Nintendo Wii, require the use of an on-screen keyboard for character input. ! ! A number of alternatives to passwords have been proposed but none, as yet, have been adopted widely. There seems to be a reluctance to switch from tried and tested passwords to novel alternatives, even if the most glaring flaws of passwords can be mitigated. One argument is that there has not been sufficient investigation into the feasibility of the password alternatives and thus no convincing evidence that they can indeed act as a viable alternative. ! ! Graphical authentication mechanisms, solutions that rely on images rather than characters, are a case in point. Pictures are more memorable than the words that name them, meaning that graphical authentication mitigates one of the major problems with passwords. This dissertation sets out to investigate the feasibility of one particular observation-resilient graphical authentication mechanism called Tetrad. The authentication mechanism attempted to address two of the core problems with passwords: improved memorability and resistance to observability (with on-screen entry).! ! Tetrad was tested in a controlled lab study, that delivered promising results and was well received by the evaluators. It was then deployed in a realistic context and its viability tested in three separate field tests. The unfortunate conclusion was that Tetrad, while novel and viable in a lab setting, failed to deliver a usable and acceptable experience to the end users. This thorough testing of an alternative authentication mechanism is unusual in this research field and the outcome is disappointing. Nevertheless, it acts to inform inventors of other authentication mechanisms of the problems that can manifest when a seemingly viable authentication mechanism is tested in the wild.
APA, Harvard, Vancouver, ISO, and other styles
6

Frushour, John H. "Design considerations for a computationally-lightweight authentication mechanism for passive RFID tags." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FFrushour.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2009.<br>Thesis Advisor(s): Fulp, J.D. ; Huffmire, Ted. "September 2009." Description based on title screen as viewed on November 6, 2009. Author(s) subject terms: Passive RFID Systems, Tags, Clock, Electro-magnetic induction, authentication, hash, SHA--1. Includes bibliographical references (p. 59-60). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
7

Sakamuri, Sai. "Design and Evaluation of a New Authentication Mechanism for Validating the Sender of an Email." Scholar Commons, 2005. https://scholarcommons.usf.edu/etd/840.

Full text
Abstract:
A new authentication mechanism for validating the source of messages over the Internet is designed and evaluated. This mechanism is applied to email and is called Email++. Email++ prevents identity forging (spoofing) and tampering of email contents. By preventing identity forging, Email++ can reduce the amount of spam received and limit the spread of viruses like Melissa, Love Bug, Bagle Worm, and Killer Resume. Email++ validates both the sender and the receiver of an email by confirming the senders identity with the domain mail server that delivered the email for the sender, and authenticates the receiver with hash value comparisons. Email++ enables payment mechanisms, including micro-cash, and challenge response schemes that use puzzle solving. MD5 hash signatures generated both at the sender and the receiver locations are used for validating the senders identity and for making email tamper resistant in the network. An out-of-band TCP connection established between the sender and the receiver is used as a communication channel for validating the sender as well as the senders email server. The information needed for establishing an out-of-band TCP connection is obtained by querying the DNS (Domain Naming System), instead of using email headers from the received mail, which are susceptible to spoofing. The Email++ technique is compared with existing anti spam and anti-spoof techniques like SPF, Yahoo Domain Keys, Microsoft Sender ID, TEOS and PGP. The Email++ specification is evaluated by developing both Email++ client and Email++ server programs in C language and using Sendmail 8.12 as the mail server. The performance of Email++ is compared with standard SMTP protocol implementation of Sendmail 8.12. Several factors are considered in evaluating the performance. CPU demand, memory demand, bandwidth demand, email latency, and extra DNS load are measured for both email sender and the receiver. The performance evaluation results show that Email++ adds an extra CPU demand of about 11%. The extra memory required by Email++ is nearly 3%. The bandwidth demand of Email++ is around 15% greater than the standard SMTP for sending 500 emails of 3.5KB each. Extra load on DNS increases by one connection for every incoming mail at the receiver.
APA, Harvard, Vancouver, ISO, and other styles
8

Chang, Shun-Shyan, and 張舜賢. "An Anti-Phishing User Authentication Mechanism." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/39480187846522786317.

Full text
Abstract:
碩士<br>逢甲大學<br>資訊工程所<br>98<br>In this treacherous world, many attacks exist in the Internet we use every day, and phishing is one of the most common attacks we might face in our daily life. Nevertheless, the traditional password-based authentication is not remaining to defend users from these attacks. Not only phishing attack but dictionary attack is also a challenge for user authentication method. In this paper, we present the result of our experiment which contains different types of phishing attacks and defense methods. In addition, we point out the key factors of why the phishing attacks are still taking place and invalid the current defense methods. In the end, we propose an anti-phishing user authentication mechanism and implement it by using CAPTCHA, OTP and Visual Cryptography technologies. Our goal is to provide Internet users a more secure environment.
APA, Harvard, Vancouver, ISO, and other styles
9

Hung, Chun-Lai, and 洪春來. "An Authentication Mechanism of Medical Image Application." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/12868917002325471232.

Full text
Abstract:
碩士<br>靜宜大學<br>資訊管理學系<br>91<br>With the approval of the electronic signature law in Taiwan, digital security of patient records, medical certificates, and medical images are paid more attention than before. To authenticate medical image, this study apply image hiding technique and digital signature technique to propose a medical image authentication mechanism. Our proposed scheme can effectively create the connection between the patients and their medical images. Furthermore, the proposed scheme can recognize the slight modifications on the medical image, since the relative authentication message are generated pixel by pixel. These authentication message are randomly stored in the LSBs of each pixel, therefore, the attacker is hard to modify a medical image without being observed. Compared with other scheme, the experiment results show our scheme provides higher image quality of the medical images that hide the authentication message. In addition, the light modification of the medical image do not only can be detected, but also can be recovered.
APA, Harvard, Vancouver, ISO, and other styles
10

Chang, Chi-Hung, and 張啟宏. "OpenID authentication mechanism with enhanced ATM card." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/37602243625006956778.

Full text
Abstract:
碩士<br>輔仁大學<br>資訊工程學系<br>99<br>As the rapid development of Internet, the number of websites grew significantly. Users have to memorize many IDs and Passwords to access the Internet. Mechanisms are proposed, such as OpenID, to provide single sign-on functionality. However, OpenID still suffers the risk of ID/Password theft. If user’s OpenID password is lost, the consequences will be more serious than losing password of a single website. This thesis proposed a two-legged log-in authentication with OpenID. Wth high popularity of ATM IC card, ATM card is integrated into OpenID mechanism. ATM card has advantages of high security, multiple authentication and verification, and low cost. It is a possible candidate as an authentication token. However, ATM card was designed only for financial applications. Internet authentication was not considered to be a native function of ATM card. Communication security issues have to be resolved. This thesis proposed an enhanced ATM card by encrypting the communication between the card and OpenID server throughout the login process. We also design and implement an authentication flow of login OpenID with the enhanced ATM card.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Authentication mechanism"

1

Magno, Marianna B. Survey of user authentication mechanisms. Naval Postgraduate School, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zviran, Moshe. A comparison of password techniques for multilevel authentication mechanisms. Naval Postgraduate School, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Todorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Auerbach Pub, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Martin, Keith M. Entity Authentication. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0008.

Full text
Abstract:
This chapter considers mechanisms for providing entity authentication. We begin with a discussion on randomness and why it is important in cryptography. We compare several different techniques for generating randomness. We then consider the related issue of freshness and why it is important for entity authentication. We compare several different techniques for providing freshness. We then identify various different categories of identification information which can be used in an entity authentication mechanism. We look at the role cryptography plays in supporting basic entity authentication mechanisms such as passwords. We close by examining how cryptography can be used to provide more sophisticated forms of entity authentication through the use of dynamic passwords.
APA, Harvard, Vancouver, ISO, and other styles
5

Survey of User Authentication Mechanisms. Storming Media, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Todorov, Dobromir. Mechanics of User Identification and Authentication. Auerbach Publications, 2007. http://dx.doi.org/10.1201/9781420052206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mechanics of User Identification and Authentication. Taylor and Francis, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Todorov, Dobromir. Mechanics of User Identification and Authentication: Fundamentals of Identity Management. Auerbach Publishers, Incorporated, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Todorov, Dobromir. Mechanics of User Identification and Authentication: Fundamentals of Identity Management. AUERBACH, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Todorov, Dobromir. Mechanics of User Identification and Authentication: Fundamentals of Identity Management. Auerbach Publishers, Incorporated, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Authentication mechanism"

1

Fietkau, Julian, Syeda Mehak Zahra, and Markus Hartung. "Secure Authentication for Everyone! Enabling 2nd-Factor Authentication Under Real-World Constraints." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_8.

Full text
Abstract:
AbstractMillions of user accounts have been exposed by data breaches within the last years. The leaked credentials pose a huge threat to many because they can be used for credential stuffing and brute-force attacks across all online services. The best solution for this problem seems to be the use of 2nd-factor authentication, like hardware tokens or one-time passwords. While these are great solutions, they cause many problems for users because they are too expensive, difficult to manage, or just not user-friendly. In this paper, we will present the results of a study that shows that users need and want secure authentication, as long as it is quick, easy, and free of charge. Hence, we investigate how recent advancements in smartphone security and authentications standards can be used to build a mobile authenticator that is easy to use, free of charge, and as secure as a hardware token. Therefore we leverage the Trusted Execution Environment of the Android platform to implement a FIDO compliant authentication mechanism on the smartphone. Furthermore, we integrate this mobile authenticator into a password manager app, to reduce user interaction, simplify the setup and provide an encompassing solution for the user.
APA, Harvard, Vancouver, ISO, and other styles
2

Yadav, Vinay, Manish Kumar Soni, and Ajay Pratap. "Securing the Cloud Authentication Mechanism using Two-Factor Authentication." In Emerging Trends in IoT and Computing Technologies. CRC Press, 2024. http://dx.doi.org/10.1201/9781003535423-67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Toiruul, Batbold, KyungOh Lee, HyunJun Lee, YoungHan Lee, and YoonYoung Park. "Mutual-Authentication Mechanism for RFID Systems." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11943952_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jeong, Yoon-Su, Bong-Keun Lee, Keon-Myung Lee, and Sang-Ho Lee. "Efficient Unilateral Authentication Mechanism for MIPv6." In Computational Science – ICCS 2006. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11758501_135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Manzanares, Antonio Izquierdo, Joaquín Torres Márquez, Juan M. Estevez-Tapiador, and Julio César Hernández Castro. "Attacks on Port Knocking Authentication Mechanism." In Computational Science and Its Applications – ICCSA 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11424925_134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Guo, Ming-Huang, Horng-Twu Liaw, Jui-Kheng Tang, and Chih-Ta Yen. "High Security Authentication Mechanism for Mobile Networks." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23948-9_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gopali, Saroj, Pranaya Sharma, Praveen Kumar Khethavath, and Doyel Pal. "HyPA: A Hybrid Password-Based Authentication Mechanism." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73100-7_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Khalil, Issa, Zuochao Dou, and Abdallah Khreishah. "TPM-Based Authentication Mechanism for Apache Hadoop." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23829-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ibañez-Ramírez, Juan Alejandro, and Francisco de Asís López-Fuentes. "Authentication Mechanism to Access Multiple-Domain Multimedia Data." In Cryptology and Network Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98678-4_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Saarinen, Markku-Juhani O. "The PASSERINE Public Key Encryption and Authentication Mechanism." In Information Security Technology for Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27937-9_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Authentication mechanism"

1

Zhai, Hongting, Qingrui Zhang, Qi Zhai, et al. "Dual Authentication Mechanism of Reliable Session Initiation Protocol." In 2024 IEEE 7th International Conference on Automation, Electronics and Electrical Engineering (AUTEEE). IEEE, 2024. https://doi.org/10.1109/auteee62881.2024.10869742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gupta, Samikhsha, Sumeet Gupta, and Sachin Gupta. "Smart Card-Based Mutual Authentication Mechanism for UAV Networks." In 2024 IEEE International Conference on Communication, Computing and Signal Processing (IICCCS). IEEE, 2024. http://dx.doi.org/10.1109/iicccs61609.2024.10763670.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Guo, Junli, Qing Liu, Yongteng Ou, and Xiangge Meng. "Electronic Control Unit Authentication Mechanism Based on Endogenous Security." In 2025 4th International Symposium on Computer Applications and Information Technology (ISCAIT). IEEE, 2025. https://doi.org/10.1109/iscait64916.2025.11010535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dostalek, Libor, and Jiri Safarik. "Strong password authentication with AKA authentication mechanism." In 2017 International Conference on Applied Electronics (AE). IEEE, 2017. http://dx.doi.org/10.23919/ae.2017.8053581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sridhar, S., and K. Vimala Devi. "Nested mechanism for mutual authentication." In 2011 3rd International Conference on Electronics Computer Technology (ICECT). IEEE, 2011. http://dx.doi.org/10.1109/icectech.2011.5941679.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jivanadham, L. B., A. K. M. Muzahidul Islam, Yoshiaki Katayama, Shozo Komaki, and S. Baharun. "Cloud Cognitive Authenticator (CCA): A public cloud computing authentication mechanism." In 2013 2nd International Conference on Informatics, Electronics and Vision (ICIEV). IEEE, 2013. http://dx.doi.org/10.1109/iciev.2013.6572626.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Feng, and Jie Wu. "Authentication via Ambassadors: A Novel Authentication Mechanism in MANETs." In MILCOM 2007 - IEEE Military Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/milcom.2007.4455065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yun-kyung Lee, Hong-il Ju, Jee-hye Park, and Jong-wook Han. "User authentication mechanism using authentication server in home network." In 8th International Conference on Advanced Communication Technology. IEEE, 2006. http://dx.doi.org/10.1109/icact.2006.206017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boshoff, Dutliff, Alexander Scriba, Raphael Nkrow, and Gerhard P. Hancke. "Phone Pick-up Authentication: A Gesture-Based Smartphone Authentication Mechanism." In 2023 IEEE International Conference on Industrial Technology (ICIT). IEEE, 2023. http://dx.doi.org/10.1109/icit58465.2023.10143117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Boshoff, Dutliff, Raphael Nkrow, and Gerhard P. Hancke. "Knock-to-Enter Authentication: A Rhythm-Based Smartphone Authentication Mechanism." In IECON 2023- 49th Annual Conference of the IEEE Industrial Electronics Society. IEEE, 2023. http://dx.doi.org/10.1109/iecon51785.2023.10312590.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Authentication mechanism"

1

Cullen, M., S. Hartman, D. Zhang, and T. Reddy. Port Control Protocol (PCP) Authentication Mechanism. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Melnikov, A. Salted Challenge Response HTTP Authentication Mechanism. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7804.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Newman, C., A. Menon-Sen, A. Melnikov, and N. Williams. Salted Challenge Response Authentication Mechanism (SCRAM) SASL and GSS-API Mechanisms. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Leach, P., and C. Newman. Using Digest Authentication as a SASL Mechanism. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2831.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zuccherato, R., and M. Nystrom. ISO/IEC 9798-3 Authentication SASL Mechanism. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Siemborski, R., and A. Menon-Sen. The Post Office Protocol (POP3) Simple Authentication and Security Layer (SASL) Authentication Mechanism. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc5034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zeilenga, K. Anonymous Simple Authentication and Security Layer (SASL) Mechanism. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zeilenga, K., ed. The PLAIN Simple Authentication and Security Layer (SASL) Mechanism. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Howlett, J. A GSS-API Mechanism for the Extensible Authentication Protocol. Edited by S. Hartman. RFC Editor, 2013. http://dx.doi.org/10.17487/rfc7055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Melnikov, A., ed. The Kerberos V5 ("GSSAPI") Simple Authentication and Security Layer (SASL) Mechanism. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!