Academic literature on the topic 'Authentication Systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Authentication Systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Authentication Systems"

1

Pagnin, Elena, and Aikaterini Mitrokotsa. "Privacy-Preserving Biometric Authentication: Challenges and Directions." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/7129505.

Full text
Abstract:
An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a means of authenticating people due to the wide range of advantages that they provide with respect to classical authentication methods (e.g., password-based authentication). The most characteristic feature of this authentication method is the naturally strong bond between a user and her biometric credentials. This very same advantageous property, however, raises serious security and privacy concerns in case the biometric trait gets compromised. In this article, we present the most challenging issues that need to be taken into consideration when designing secure and privacy-preserving biometric authentication protocols. More precisely, we describe the main threats against privacy-preserving biometric authentication systems and give directions on possible countermeasures in order to design secure and privacy-preserving biometric authentication protocols.
APA, Harvard, Vancouver, ISO, and other styles
2

Papaspirou, Vassilis, Maria Papathanasaki, Leandros Maglaras, et al. "A Novel Authentication Method That Combines Honeytokens and Google Authenticator." Information 14, no. 7 (2023): 386. http://dx.doi.org/10.3390/info14070386.

Full text
Abstract:
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. To address this, this study proposes a new two-factor authentication method that uses honeytokens. Honeytokens and Google Authenticator are combined to create a stronger authentication process. The proposed approach aims to provide additional layers of security and protection to computer systems, increasing their overall security beyond what is currently provided by single-password or standard two-factor authentication methods. The key difference is that the proposed system resembles a two-factor authentication but, in reality, works like a multi-factor authentication system. Multi-factor authentication (MFA) is a security technique that verifies a user’s identity by requiring multiple credentials from distinct categories. These typically include knowledge factors (something the user knows, such as a password or PIN), possession factors (something the user has, such as a mobile phone or security token), and inherence factors (something the user is, such as a biometric characteristic like a fingerprint). This multi-tiered approach significantly enhances protection against potential attacks. We examined and evaluated our system’s robustness against various types of attacks. From the user’s side, the system is as friendly as a two-factor authentication method with an authenticator and is more secure.
APA, Harvard, Vancouver, ISO, and other styles
3

Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.

Full text
Abstract:
Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know the secret credentials) or the identity has been impersonated by someone else after the authentication’s process was completed. Continuous authentication does not require the active participation of the user. Aiming to identify the different technologies involved in continuous authentication’s implementations, evaluation methods, and its use cases, this paper presents a systematic review that synthesizes the state of the art. This review is conducted to get a picture about which data sources could allow continuous authentication, in which systems it has been successfully implemented, and which are the most adequate ways to process the data. This review also identifies the defining dimensions of continuous authentication systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Song, Yubo, Bing Chen, Tianqi Wu, Tianyu Zheng, Hongyuan Chen, and Junbo Wang. "Enhancing Packet-Level Wi-Fi Device Authentication Protocol Leveraging Channel State Information." Wireless Communications and Mobile Computing 2021 (November 17, 2021): 1–12. http://dx.doi.org/10.1155/2021/2993019.

Full text
Abstract:
Wi-Fi device authentication is crucial for defending against impersonation attacks and information forgery attacks. Most of the existing authentication technologies rely on complex cryptographic algorithms. However, they cannot be supported well on the devices with limited hardware resources. A fine-grained device authentication technology based on channel state information (CSI) provides a noncryptographic method, which uses the CSI fingerprints for authentication since CSI can uniquely identify the devices. But long-term authentication based on CSI fingerprints is a challenging work. First, the CSI fingerprints are environment-sensitive, which means that the local authenticator should be updated to adapt to the changing channel state. Second, the local authenticator trained with old CSI fingerprints is outdated when users reconnect to the network after being offline for a long time, thus, it needs to be retrained in the access phase with new fingerprints. To tackle these challenges, we propose a CSI-based enhancing Wi-Fi device authentication protocol and an authentication framework. The protocol helps to collect new CSI fingerprints for authenticator’s training in access phase and performs the fingerprints’ dispersion analysis for authentication. In the association phase, it provides packet-level authentication and updates the authenticator with valid CSI fingerprints. The authenticator consists of an ensemble of small-scale autoencoders, which has high enough time efficiency for packet-level authentication and authenticator’s update. Experiments show that the accuracy of the framework is up to 98.7%, and the authenticator updating method can help the framework maintains high accuracy.
APA, Harvard, Vancouver, ISO, and other styles
5

Loginovskiy, O. V., M. E. Koval, and A. A. Shinkarev. "Using the ideal point method to search the best authentication method in corporate information systems." Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control & Radioelectronics 22, no. 3 (2022): 5–18. http://dx.doi.org/10.14529/ctcr220301.

Full text
Abstract:
Nowadays, various information systems, including enterprise ones, are becoming increasingly popular. Many of these systems store sensitive data of their users. Basically, this data is protected only by a login and a password, which today can no longer provide a high level of security and guarantee the safety of the data. Along with the development of information systems, methods and tools that attackers can use to get hold of confidential information are also evolving. It is not uncommon to hear news that some of the large companies have leaked its users' personal data. So, in order to minimize the risk of compromising user data, it is worth taking a more careful approach to selecting a method of authenticating users in the system. Aim. To determine the most appropriate method of authentication in enterprise information systems with the help of a mathematical approach and taking into account certain criteria. Materials and methods. The following types of authentication were considered: reusable password authentication, TOTP (Time-based one-time password authentication), SMS-based authentication, biometric authentication, OpenID, SAML (Security Assertion Markup Language). The Pareto set method and the ideal point method were used to determine the most preferable authentication method to implement. Results. In the article, the authors describe the authentication methods considered, the algorithm of their work, and diagrams of their interaction. Using the ideal point method, SAML was determined to be the most appropriate authentication method.
APA, Harvard, Vancouver, ISO, and other styles
6

B, Dhainje Prakash, and Dhainje Dattatray B. "3D Authentication Systems." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 5 (2017): 713–17. http://dx.doi.org/10.23956/ijarcsse/sv7i5/0328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Yajie, Xiaomei Zhang, and Haomin Hu. "Continuous User Authentication on Multiple Smart Devices." Information 14, no. 5 (2023): 274. http://dx.doi.org/10.3390/info14050274.

Full text
Abstract:
Recent developments in the mobile and intelligence industry have led to an explosion in the use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve lasting security after initial authentication, many studies have been conducted to apply user authentication through behavioral biometrics. However, few of them consider continuous user authentication on multiple smart devices. In this paper, we investigate user authentication from a new perspective—continuous authentication on multi-devices, that is, continuously authenticating users after both initial access to one device and transfer to other devices. In contrast to previous studies, we propose a continuous user authentication method that exploits behavioral biometric identification on multiple smart devices. In this study, we consider the sensor data captured by accelerometer and gyroscope sensors on both smartphones and tablets. Furthermore, multi-device behavioral biometric data are utilized as the input of our optimized neural network model, which combines a convolutional neural network (CNN) and a long short-term memory (LSTM) network. In particular, we construct two-dimensional domain images to characterize the underlying features of sensor signals between different devices and then input them into our network for classification. In order to strengthen the effectiveness and efficiency of authentication on multiple devices, we introduce an adaptive confidence-based strategy by taking historical user authentication results into account. This paper evaluates the performance of our multi-device continuous user authentication mechanism under different scenarios, and extensive empirical results demonstrate its feasibility and efficiency. Using the mechanism, we achieved mean accuracies of 99.8% and 99.2% for smartphones and tablets, respectively, in approximately 2.3 s, which shows that it authenticates users accurately and quickly.
APA, Harvard, Vancouver, ISO, and other styles
8

Nigam, Dhananjay, Shilp Nirajbhai Patel, P. M. Durai Raj Vincent, Kathiravan Srinivasan, and Sinouvassane Arunmozhi. "Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems." Journal of Healthcare Engineering 2022 (March 24, 2022): 1–15. http://dx.doi.org/10.1155/2022/1789996.

Full text
Abstract:
Secure identification is a critical system requirement for patients seeking health-related services. In the event of critical, aged, or disabled patients who require frequent health treatments, quick and easy identification is vital. Researchers describe the notion of the unprotected environment in this study, in which patients can receive health services from the hospital’s smart and intelligent surroundings without the use of explicit equipment. Patients would interact directly with the environment and be identified through it. We suggest a biometric-based authentication technique for the unprotected hospital environment that also safeguards the patient’s identity privacy. Furthermore, we demonstrate that this authentication technique is resistant to many well-known assaults, including insider attacks, replay attacks, and identity privacy. Doctors and other staff members showed enthusiastic responses after installing 2-factor authentications, as it makes their workflow efficient and makes things easier for patients. It also lets them focus on other factors rather than worrying about data security; hence, we need biometric authentication in intelligent and privacy-preserving healthcare systems. The paper deals with two-factor biometric authentication, and despite the added security, two-factor authentication adoption is said to be poor. It is due to a lack of awareness and difficulty to use and configure two-factor authentication (2FA) into a particular application by some individuals who struggle with the concept of authentication and its technology. Also, many 2FA methods in widespread use today have not been subjected to adequate usability testing. Research focuses on the point that there is still a large section of people unaware of the use of biometric systems to protect their online data. Researchers collected quantitative and qualitative data from 96 individuals during a two-week between-subjects usability survey of some common and rarely used 2FA approaches. The survey allowed the researcher to investigate which authentication methods are given higher priority and why, along with the relationship between different usage patterns and perceived usability, and identify user misconceptions and insecure habits to determine ease of use. It was observed that the biometric-based method was given the utmost preferability.
APA, Harvard, Vancouver, ISO, and other styles
9

Karim, Nader Abdel, Hasan Kanaker, Waleed K. Abdulraheem, Majdi Ali Ghaith, Essam Alhroob, and Abdulla Mousa Falah Alali. "Choosing the right MFA method for online systems: A comparative analysis." International Journal of Data and Network Science 8, no. 1 (2024): 201–12. http://dx.doi.org/10.5267/j.ijdns.2023.10.003.

Full text
Abstract:
A robust authentication method is needed to protect online user accounts and data from cyber-attacks. Using only passwords is insufficient because they can be easily stolen or cracked. Multi-factor authentication (MFA) increases security by requiring two or more verification factors from the user before granting access to a resource such as an online account or an application. MFA is essential to a strong identity and access management (IAM) policy. This study evaluates and contrasts several MFA methods for online systems, including Microsoft Authenticator, FIDO2 security keys, SMS, voice calls, and biometrics. We assess these methods based on four criteria: security, usability, cost, and compatibility. We discover that only some MFA methods excel across the board. The best MFA method will depend on the organization's and users' specific needs and preferences. Each MFA method has benefits and drawbacks on its own. Based on our analysis, we do, however, make some general observations and recommendations, such as preferring FIDO2 security keys and certificate-based authentication for high-security scenarios, choosing Microsoft Authenticator and biometrics for high-usability scenarios, and avoiding SMS and voice calls for low-security and low-usability scenarios.
APA, Harvard, Vancouver, ISO, and other styles
10

Noh, Seungil, Jaehan Kim, Seokmin Lee, Youngshin Kang, Cheolsoo Park, and Youngjoo Shin. "Broken Heart: Privacy Leakage Analysis on ECG-Based Authentication Schemes." Security and Communication Networks 2022 (September 29, 2022): 1–14. http://dx.doi.org/10.1155/2022/7997509.

Full text
Abstract:
Authentications using biometrics, such as fingerprint recognition and electrocardiogram (ECG), have been actively used in various applications. Unlike traditional authentication methods, such as passwords or PINs, biometric-based authentication has an advantage in terms of security owing to its capability of liveness detection. Among the various types of biometrics, ECG-based authentication is widely utilized in many fields. Because of the inherent characteristics of ECG, however, the incautious design of ECG-based authentication may result in serious leakage of personal private information. In this paper, we extensively investigate ECG-based authentication schemes previously proposed in the literature and analyze possible privacy leakages by employing machine learning and deep learning techniques. We found that most schemes suffer from vulnerabilities that lead to the leakage of personal information, such as gender, age, and even diseases. We also identified some privacy-insensitive ECG fiducial points by utilizing feature selection algorithms. Based on these features, we present a privacy-preserving ECG-based authentication scheme.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Authentication Systems"

1

Sandnes, Are Haugen. "National Authentication Systems." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18349.

Full text
Abstract:
Information security has to adapt to an ever-changing environment. Recently there has been a significant increase in the use of smartphones and other mobile devices to access services on the Internet that originally is designed for desktop computers.This thesis examines authentication systems on the Internet aimed at large user groups in light of the evolving threats due to increased use of mobile devices. It examines these authentication systems from the perspective of the end user and investigates problems arising with increased use of mobile devices.This work shows that much can be done in all stages to improve the security of web authentication. Users can protect their devices better and use stronger passwords, service providers can do simple steps to configure their web servers better, and developers of operating systems on mobile devices can reduce the amount of data an application can access on the device. In particular this thesis highlights how the way people are using their smartphones, and how authentication systems work, makes it easy for attackers to exploit the users.
APA, Harvard, Vancouver, ISO, and other styles
2

Putienkov, O. M., та А. V. Bulashenko. "Вiometric authentication systems". Thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/67602.

Full text
Abstract:
Authentication - authentication of the user-submitted identifier. Authentication is required when accessing such Internet services as e-mail, web-forum, social networks, Internet banking, payment systems, corporate websites, online stores.
APA, Harvard, Vancouver, ISO, and other styles
3

Merritt, John W. "Distributed file systems in an authentication system." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Madero, Alvaro. "Password secured systems and negative authentication." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/90691.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Program, 2013.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 50-52).<br>Today's industry, government, and critical infrastructure are dependent on software systems. In their absence, our modern world would come to a stop. Given our dependence, the mounting cyber threat is of critical concern. In the majority of our systems, passwords are the keys to the system. Unfortunately, there has been little innovation and vulnerabilities keep mounting. Even with established and well known defenses, no authority has emerged to establish policies or laws that guarantee their implementation. The response has been more complex passwords. This is not working. This thesis presents the state of the practice in password systems and introduces work in Negative Authentication and its implementations.<br>by Alvaro Madero.<br>S.M. in Engineering and Management
APA, Harvard, Vancouver, ISO, and other styles
5

Ruoti, Scott. "Authentication Melee: A Usability Analysis of Seven Web Authentication Systems." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/4376.

Full text
Abstract:
Passwords continue to dominate the authentication landscape in spite of numerous proposals to replace them. Even though usability is a key factor in replacing passwords, very few alternatives have been subjected to formal usability studies and even fewer have been analyzed using a standard metric. We report the results of four within-subjects usability studies for seven web authentication systems. These systems span federated, smartphone, paper tokens, and email-based approaches. Our results indicate that participants prefer single sign-on systems. We utilize the Systems Usability Scale (SUS) as a standard metric for empirical analysis and find that it produces reliable, replicable results. SUS proves to be an accurate measure of baseline usability and we recommend that going forward all new authentication proposals be required to meet a minimum SUS score before being accepted by the security community. Our usability studies also gather insightful information from participants' qualitative responses: we find that transparency increases usability but also leads to confusion and a lack of trust, participants prefer single sign-on but wish to augment it with site-specific low-entropy passwords, and participants are intrigued by biometrics and phone-based authentication.
APA, Harvard, Vancouver, ISO, and other styles
6

Aggarwal, Pankaj. "Mobile authentication in wireless systems." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0010839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Yu. "Research on extended noise tolerant message authentication codes and applications on noisy information authentication." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 148 p, 2007. http://proquest.umi.com/pqdweb?did=1354135421&sid=36&Fmt=2&clientId=8331&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fält, Markus. "Multi-factor Authentication : System proposal and analysis of continuous authentication methods." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-39212.

Full text
Abstract:
It is common knowledge that the average user has multiple online accounts which all require a password. Some studies have shown that the number password for the average user is around 25. Considering this, one can see that it is unreasonable to expect the average user to have 25 truly unique passwords. Because of this multi-factor authentication could potentially be used to reduce the number of passwords to remember while maintaining and possibly exceeding the security of unique passwords. This thesis therefore, aims to examine continuous authentication methods as well as proposing an authentication system for combining various authentication methods. This was done by developing an authentication system using three different authentication factors. This system used a secret sharing scheme so that the authentication factors could be weighted according to their perceived security. The system also proposes a secure storage method for the secret shares and the feasibility of this is shown. The continuous authentication methods tests were done by testing various machine learning methods on two public datasets. The methods were graded on accuracy and the rate at which the wrong user was accepted. This showed that random forest and decision trees worked well on the particular datasets. Ensemble learning was then tested to see how the two continuous factors performed once combined into a single classifier. This gave an equal error rate of around 5% which is comparable to state-of-the-art methods used for similar datasets.
APA, Harvard, Vancouver, ISO, and other styles
9

Åslund, Jonas. "Authentication in peer-to-peer systems." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1222.

Full text
Abstract:
<p>In the environment of the 3:rd generation Internet based on peer-to-peer architecture, well-trusted methods must exist to establish a secure environment. One main issue is the possibility to verify that a node actually is who it claims to be (authentication). Establishment of authentication between nodes in a peer-to-peer environment where nodes are exchanging information directly with each other requires more planning than in a typical client-server environment where the authentication methods are server-based. The peer-to-peer applications described in this report use authentication methods based on central authorities as well as solutions without central authorities. </p><p>Lack of standards in the way peer-to-peer systems should communicate and apply security lead to a variety of “local” communication and security solutions. These local solutions make different applications incompatible with each other, meaning that a peer using one application will not be able to communicate and exchange information with other peers using some other application.</p>
APA, Harvard, Vancouver, ISO, and other styles
10

Hakobyan, Davit. "Authentication and Authorization Systems in Cloud Environments." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102870.

Full text
Abstract:
The emergence of cloud computing paradigm offers attractive and innovative computing services through resource pooling and virtualization techniques. Cloud providers deliver various types of computing services to customers according to a pay-per-use economic model. However, this technology shift introduces a new concern for enterprises and businesses regarding their privacy and security. Security as a Service is a new cloud service model for the security enhancement of a cloud environment. This is a way of centralizing security solutions under the control of professional security specialists. Identity and access control services are one of the areas of cloud security services, and sometimes, are presented under the term Identity as a Service. This master thesis research is focused on identity-security solutions for cloud environments. More specifically, architecture of a cloud security system is designed and proposed for providing two identity services for cloud-based systems: authentication and authorization. The main contribution of this research is to design these services using service-oriented architectural approach, which will enable cloud-based application service providers to manage their online businesses in an open, flexible, interoperable and secure environment. First, the architecture of the proposed services is described. Through this architecture all system entities that are necessary for managing and providing those identity services are defined. Then, the design and specification of each service is described and explained. These services are based on existing and standardized security mechanisms and frameworks. As a demonstration, a prototype system of an authorization service is implemented and tested based on the designed authorization solution. The implementation is done using Web Service technology respective to the service-oriented design approach. It is shown that both services are at least computationally secure against potential security risks associated with replay attacks, message information disclosure, message tampering, repudiation and impersonation. The designed security system ensures a secure and reliable environment for cloud-based application services which is very easy to deploy and exploit on cloud-based platforms.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Authentication Systems"

1

Smith-Creasey, Max. Continuous Biometric Authentication Systems. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-49071-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Terry, Plum, Bleiler Richard, and Association of Research Libraries. Office of Leadership and Management Services., eds. User authentication. Association of Research Libraries, Office of Leadership and Management Services, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Asad, Ali. Biometrics: An investigation of fingerprint authentication systems. University of East London, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

W, Mak M., and Lin Shang-Hung 1968-, eds. Biometric authentication: A machine learning approach. Prentice Hall Professional Technical Reference, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, David. Biometric Solutions: For Authentication in an E-World. Springer US, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jakobsson, Markus. Mobile Authentication: Problems and Solutions. Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

National Computer Security Center (U.S.), ed. A Guide to understanding identification and authentication in trusted systems. National Computer Security Center, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zviran, Moshe. A comparison of password techniques for multilevel authentication mechanisms. Naval Postgraduate School, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Borivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Auerbach Publications, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

ECCV 2004 International Workshop (2004 Prague, Czech Republic). Biometric authentication: ECCV 2004 International Workshop, BioAW 2004, Prague, Czech Republic, May 15th, 2004 : proceedings. Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Authentication Systems"

1

Melone, Michael. "Authentication." In Designing Secure Systems. CRC Press, 2021. http://dx.doi.org/10.1201/9781003144182-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Blanton, Marina. "Authentication." In Encyclopedia of Database Systems. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_32-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Blanton, Marina. "Authentication." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Blanton, Marina. "Authentication." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ali, Asad, François Tuot, and Gerald Maunier. "Authentication and Mutual Authentication." In Trusted Computing for Embedded Systems. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09420-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jain, Anil K., Sarat C. Dass, and Karthik Nandakumar. "Soft Biometric Traits for Personal Recognition Systems." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_99.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, J. S., Y. S. Moon, and K. F. Fong. "Efficient Fingerprint Image Enhancement for Mobile Embedded Systems." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25976-3_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tuyls, Pim, and Jasper Goseling. "Capacity and Examples of Template-Protecting Biometric Authentication Systems." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25976-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Park, Seung Bae, Moon Seol Kang, and Sang Jun Lee. "New Authentication Systems." In Grid and Cooperative Computing. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24679-4_189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dasgupta, Dipankar, Arunava Roy, and Abhijit Nag. "Negative Authentication Systems." In Infosys Science Foundation Series. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58808-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Authentication Systems"

1

Ganiga, Prakruthi, Priyadarshini, Vineela Chandra Dodda, Ravi Kumar, and Inbarasan Muniraj. "Hologram authentication and classification via a Convolutional Neural Network." In Imaging Systems and Applications. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/isa.2024.itu3g.4.

Full text
Abstract:
Authentication techniques can be used to overcome the hologram counterfeiting problems. Here, we demonstrate an authentication scheme for digital holograms in a raw-complex form that is stored either in the cloud or on the metasurface using a CNN.
APA, Harvard, Vancouver, ISO, and other styles
2

Denes, Istvan, and Sándor Semperger. "Improvement of Physical Security through Continuous Authentication for SCADA and DCS Systems in Industrial Automation and Control Systems." In 10th International Scientific Conference on Advances in Mechanical Engineering. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-nl1llk.

Full text
Abstract:
As the treat landscape in Operational Technology (OT) cyber security is getting more complicated, there is a general demand in most industries to increase the Target Security Level (SL-T) of Industry Automation and Control Systems (IACS). More sophisticated treat actors with higher motivation are on stage, and treat actors are getting increasingly familiar with IACS. Yet some security controls, widely used in Information Technology, are often hard to implement in IACS. Inability to go away from obsolete Operational System (OS), using shared accounts for operators, limited applicability of security patching, limited applicability of multifactor authentication, Intrusion Prevention Systems (IPS) are specific challenges of IACS security, caused mainly by real time operation and safety requirements. One way to reach SL-T is introducing compensating controls. For instance, if the use of an obsolete, unpatched SCADA system is unavoidable, security monitoring or physical security can be increased to compensate the lack of direct control. This paper aims to elaborate the compensating effect of continuous authentication as a mean of Identification and Authentication (I&amp;A) for the operating room workstations of obsolete SCADA and DCS systems.
APA, Harvard, Vancouver, ISO, and other styles
3

Shah, Mahi Mukesh, Unnati Sitaram Rathi, Amol Murlidhar Patil, et al. "Blockchain Based Goods Authentication System." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Green, R. "User requirements of image security systems." In IEE Seminar on Secure Images and Image Authentication. IEE, 2000. http://dx.doi.org/10.1049/ic:20000224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Özgür, Hafızullah, and Yunus Emre Selçuk. "Authentication in ATM/ITM Machines using Iris Recognition Biometrics." In 10th International Conference on Artificial Intelligence & Applications. Academy & Industry Research Collaboration Center, 2023. http://dx.doi.org/10.5121/csit.2023.131901.

Full text
Abstract:
Biometric identification is a method that encompasses many types of authentication systems, including iris features and characteristics. The behaviour of the tiny pixels in a person’s iris and pupil can be extracted and uniquely used for authentication in ATM/ITM machines. In this study, achieving higher accuracy and success is the goal. We have found out that the Daugman algorithm can enable the implementation of iris biometrics in a faster and more accurate way compared to other algorithms. This will allow ATM/ITM users can comfortably access their accounts and make transactions without the need for a card or PIN, while authenticating their identity in the machines using their iris biometrics. Such a system can also be used to authenticate national ID entitlement in programmes. Furthermore, such a system can enhance the accessibility of social benefits, subsidies, and other entitlements while minimizing fraudulent activities [1]
APA, Harvard, Vancouver, ISO, and other styles
6

Cristescu, Robert madalin. "AUTHENTICATION BASED ON OCULAR RETINA RECOGNITION IN E-LEARNING SYSTEMS." In eLSE 2019. Carol I National Defence University Publishing House, 2019. http://dx.doi.org/10.12753/2066-026x-19-098.

Full text
Abstract:
Authentication in E-learning systems must be secure because many users access E-learning systems for educational purpose and information must be secure for each user. Many users choose E-learning systems because they offer the possibility to study online wherever they are. Also, users have the possibility to take the exams online based on the moment they havefinished the courses. The recognition of ocular retina can be implemented using biometric data that are integrated with artificial intelligence. Implementing authentication based on ocular retina can be done only by software developers because they have access to sources of informatic systems and they can modify them as many times as they are required. Biometric data is different for each user and its scanning is very important so that the authentication be successful. Authentication based on scanning ocular retina presents a big advantage regarding the security of each informatic system because any other user cannot have access to that system if he does not have personal biometric information saved in the database. For each user authentication is relatively easy because he just looks at the authentication page and next his ocular retina is authomatically scanned and then every biometric information is automatically sent to a database. Security plays a very important role in informatic systems because nowadays there are more and more attacks from unauthorized groups or persons towards different informatic systems in order to collect some information. In E-learning systems there is various confidential information for educational purpose and a very advanced security is necessary.
APA, Harvard, Vancouver, ISO, and other styles
7

Lampson, Butler, Martín Abadi, Michael Burrows, and Edward Wobber. "Authentication in distributed systems." In the thirteenth ACM symposium. ACM Press, 1991. http://dx.doi.org/10.1145/121132.121160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Boechat, Glaucya C., Jeneffer C. Ferreira, and Edson C. B. Carvalho Filho. "Authentication personal." In 2007 International Conference on Intelligent and Advanced Systems (ICIAS). IEEE, 2007. http://dx.doi.org/10.1109/icias.2007.4658385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lopes, Ana Paula Golembiouski, Paulo R. L. Gondim, and Jaime Lloret. "Mutual Authentication Protocol for Cloud-based E-health Systems." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/sbseg_estendido.2018.4145.

Full text
Abstract:
The development of the Internet of Things predicts several new applications, of which some are designed to be incorporated to e-health systems. The assistance of cloud computing in the authentication procedure can relieve resource-constrained devices employed in Telecare Medicine Information Systems (TMIS). Their security is fundamental for the achievement of optimal performance, regarding the sensibility of e-health shared data and, especially, the anonymity of patients and other entities. This paper introduces a new mutual authentication protocol for e-health systems that ensures security and surpasses the performance and security of other authentication procedures reported in the literature.
APA, Harvard, Vancouver, ISO, and other styles
10

Hong, Feng, Meiyu Wei, Shujuan You, Yuan Feng, and Zhongwen Guo. "Waving Authentication." In CHI '15: CHI Conference on Human Factors in Computing Systems. ACM, 2015. http://dx.doi.org/10.1145/2702613.2725444.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Authentication Systems"

1

Mangan, D. L., C. S. Sonnier, and D. D. Drayer. Authentication of operator-designed monitoring systems. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6171425.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fisher, Bill. Multifactor Authentication for Law Enforcement Systems. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8523.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Poplawski, Michael, Adam St. Lawrence, and Hung Ngo. An Authentication Vulnerability Assessment of Connected Lighting Systems. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1618038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lamb, Christopher, Benjamin Karch, Minami Tanaka, and Romuald Valme. Advanced Reactor Control Systems Authentication Methods and Recommendations. Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/2430252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Full text
Abstract:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum error correction (QEC), deep learning-driven anomaly detection, and reinforcement learning for adaptive encryption, provide a self-learning security model for quantum communication systems. The study also examines quantum blockchain integration, AI-optimized quantum network traffic management, and secure quantum biometric authentication as emerging trends in AI-enhanced quantum cybersecurity. Additionally, it evaluates industry adoption, policy considerations, and global quantum security initiatives across China, the US, the EU, and India. By addressing scalability, automation, and real-time quantum security monitoring, this research provides a roadmap for leveraging AI in next-generation secure quantum networks to enable fault-tolerant, self-healing cybersecurity frameworks. Keywords: Quantum intelligence, machine learning, secure quantum networks, AI-driven quantum cryptography, quantum key distribution, post-quantum cryptography, neural network-based quantum error correction, deep learning anomaly detection, reinforcement learning in quantum security, AI-driven quantum authentication, quantum blockchain security, quantum biometric authentication, quantum-enhanced AI cybersecurity, real-time quantum security monitoring, AI-optimized quantum routing, scalable quantum encryption, quantum cybersecurity policy, AI-powered post-quantum security, self-healing quantum networks, AI-driven quantum forensics.
APA, Harvard, Vancouver, ISO, and other styles
6

Varastehpour, Soheil, Hamid Sharifzadeh, Iman Ardekani, and Abdolhossein Sarrafzadeh. Human Biometric Traits: A Systematic Review Focusing on Vascular Patterns. Unitec ePress, 2020. http://dx.doi.org/10.34074/ocds.086.

Full text
Abstract:
Authentication methods based on human traits, including fingerprint, face, iris, and palm print, have developed significantly, and currently they are mature enough to be reliably considered for human identification purposes. Recently, as a new research area, a few methods based on non-facial skin features such as vein patterns have been developed. This literature review paper explores some key biometric systems such as face recognition, iris recognition, fingerprint, and palm print, and discusses their respective advantages and disadvantages; then by providing a comprehensive analysis of these traits, and their applications, vein pattern recognition is reviewed.
APA, Harvard, Vancouver, ISO, and other styles
7

Smid, Miles E., Elaine Barker, David Balenson, and Martha Haykin. Message authentication code (MAC) validation system. National Bureau of Standards, 1988. http://dx.doi.org/10.6028/nbs.sp.500-156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, T., and R. Atkinson. Intermediate System to Intermediate System (IS-IS) Cryptographic Authentication. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wu, T. The SRP Authentication and Key Exchange System. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2945.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Serhrouchni, A., and H. Labiod. TLS Authentication Using Intelligent Transport System (ITS) Certificates. Edited by M. Msahli, N. Cam-Winget, and W. Whyte. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8902.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography