To see the other types of publications on this topic, follow the link: Use of strong authentication.

Journal articles on the topic 'Use of strong authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Use of strong authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ju, Seung-hwan, Hee-suk Seo, Sung-hyu Han, Jae-cheol Ryou, and Jin Kwak. "A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information." BioMed Research International 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/427542.

Full text
Abstract:
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But
APA, Harvard, Vancouver, ISO, and other styles
2

Han, Jinho. "Fingerprint Authentication Schemes for Mobile Devices." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 3 (2015): 579. http://dx.doi.org/10.11591/ijece.v5i3.pp579-585.

Full text
Abstract:
In certain applications, fingerprint authentication systems require templates to be stored in databases. The possible leakage of these fingerprint templates can lead to serious security and privacy threats. Therefore, with the frequent use of fingerprint authentication on mobile devices, it has become increasingly important to keep fingerprint data safe. Due to rapid developments in optical equipment, biometric systems are now able to gain the same biometric images repeatedly, so strong features can be selected with precision. Strong features refer to high-quality features which can be easily
APA, Harvard, Vancouver, ISO, and other styles
3

de Almeida, Marcone, Rafael de Sousa Júnior, Luis García Villalba, and Tai-Hoon Kim. "New DoS Defense Method Based on Strong Designated Verifier Signatures." Sensors 18, no. 9 (2018): 2813. http://dx.doi.org/10.3390/s18092813.

Full text
Abstract:
We present a novel technique for source authentication of a packet stream in a network, which intends to give guarantees that a specific network flow really comes from a claimed origin. This mechanism, named packet level authentication (PLA), can be an essential tool for addressing Denial of Service (DoS) attacks. Based on designated verifier signature schemes, our proposal is an appropriate and unprecedented solution applying digital signatures for DoS prevention. Our scheme does not rely on an expensive public-key infrastructure and makes use of light cryptography machinery that is suitable
APA, Harvard, Vancouver, ISO, and other styles
4

Leaby, Akeel Kassim, A. Yassin, Mushtaq Hasson, and Abdullah Rashid. "Towards design strong emergency and COVID-19 authentication scheme in VANET." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1808. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1808-1819.

Full text
Abstract:
The wide use of vehicular ad hoc networks (VANETs) in the last decade hasled many researchers to find efficient and reliable methods to obtain the desired benefits and offer services, such as healthcare and traffic management. However, VANETs suffer from security issues represented by authentication and data integrity. In thispaper, we propose a robust mutual authentication scheme based on elliptic curve cryptography (ECC), cryptography hash function, and a pseudonym. The proposed work was twofold in focus: first, on healthcare in emergency cars which use VANETs, and second, on overcoming secu
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, LiMing, and XinGang Zhang. "New Authentication Method for Vector Geographic Data Based on Perceptual Hash." Abstracts of the ICA 1 (July 15, 2019): 1–2. http://dx.doi.org/10.5194/ica-abs-1-431-2019.

Full text
Abstract:
<p><strong>Abstract.</strong> In the Internet era, vector data can conveniently be stored, distributed and disseminated. This make it convenience for people to use them, and also make it easier for people to edit or modify them, which can reduce the credibility of Geo-information. Traditionally, authentication is done by using a hash function to generate a digital signature for data authentication. However, this method is very sensitive for change even one bit and it is appropriate for accurate authentication such as text. For geographic data, it may experience lossy compress
APA, Harvard, Vancouver, ISO, and other styles
6

AGUIAR, JONAS JOSÉ MENDES, JEAN CARLOS SANTOS, and MARIA VIRGINIA URSO-GUIMARÃES. "On the use of photography in science and taxonomy: how images can provide a basis for their own authentication." Bionomina 12, no. 1 (2017): 44–47. http://dx.doi.org/10.11646/bionomina.12.1.4.

Full text
Abstract:
Photography has, since its inception, significantly contributed as a tool to many areas of scientific research and consequently, has been able to achieve a high level of prestige in the scientific field. In recent years, there has been an increasing debate within the scientific community regarding the need for the deposition of type specimens when describing new species. Recently, Marshall & Evenhuis (2015) described a new species of Diptera, based exclusively on a few photographs. Even if one withholds judgement about whether the photographs used present sufficient characteristics for the
APA, Harvard, Vancouver, ISO, and other styles
7

Tanwar, Sarvesh, and Anil Kumar. "A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority." International Journal of Information Security and Privacy 11, no. 3 (2017): 1–14. http://dx.doi.org/10.4018/ijisp.2017070101.

Full text
Abstract:
PKI offers authentication via digital certificates, which are signed and provided by Certificate Authority (CA). A certificate can be signed by single CA or multiple CAs. A document signed by multiple CAs has less probability to be forged as compared to signed by a single CA. CA is a single point of failure, if CA issue forged certificate intentionally or maliciously the whole PKI system effected. Still PKI ensures a secure method for exchanging sensitive information over unsecured channels through the use of cryptographic public private key pair, issued by Certification Authority (CA) but eve
APA, Harvard, Vancouver, ISO, and other styles
8

YU, Jiang, Jin-hai SU, and Yong-fu ZHANG. "Design and analysis of USB-Key based strong password authentication scheme." Journal of Computer Applications 31, no. 2 (2011): 511–13. http://dx.doi.org/10.3724/sp.j.1087.2011.00511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Refish, Salah H. Abbdal, and Salam Waley Shneen. "E-PAC: efficient password authentication code based RMPN method and diffie-hellman algorithm." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 1 (2020): 485. http://dx.doi.org/10.11591/ijeecs.v19.i1.pp485-491.

Full text
Abstract:
<p>Users need more efficient and more secure when they use the Internet. Password authentication code (PAC) is the critical issue in many applications such as web-sites and data base systems etc. In this paper, PAC between two users to confirm authentication between them based two factors has presented.. Two factors is the most good solution in this field. A legitimate user needs to make sure about his partner to ensure their communication. So, this solution produces two important algorithms, the first one is utilized the Diffie-Hellman which considered the base of this work. The second
APA, Harvard, Vancouver, ISO, and other styles
10

V. Sampangi, Raghav, and Srinivas Sampalli. "RFID Mutual Authentication Protocols based on Gene Mutation and Transfer." Journal of Communications Software and Systems 9, no. 1 (2013): 44. http://dx.doi.org/10.24138/jcomss.v9i1.157.

Full text
Abstract:
Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to a range of security attacks. Such vulnerability often results in the loss of privacy of the tag owner and other attacks on tags. Previous research in RFID security has mainly focused on authenticating entities such as readers / servers, which communicate with the tag. Any security mechanism is only
APA, Harvard, Vancouver, ISO, and other styles
11

Jain, Ayush. "Secure Authentication for Banking Using Face Recognition." Journal of Informatics Electrical and Electronics Engineering (JIEEE) 2, no. 2 (2021): 1–8. http://dx.doi.org/10.54060/jieee/002.02.001.

Full text
Abstract:
With the increasing demand for online banking lack of security in the system has been felt due to a tremendous increase in fraudulent activities. Facial recognition is one of the numerous ways that banks can increase security and accessibility. This paper proposes to inspect the use of facial recognition for login and for banking purposes. The potency of our system is that it provides strong security, username and password verification, face recognition and pin for a successful transaction. Multilevel Security of this system will reduce problems of cyber-crime and maintain the safety of the in
APA, Harvard, Vancouver, ISO, and other styles
12

Kim, HyunGon, and Jong-Hyouk Lee. "Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6." Mobile Information Systems 6, no. 1 (2010): 107–21. http://dx.doi.org/10.1155/2010/934286.

Full text
Abstract:
Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security t
APA, Harvard, Vancouver, ISO, and other styles
13

Bibak, Khodakhast, Robert Ritchie, and Behrouz Zolfaghari. "Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash." quantum Information and Computation 21, no. 3&4 (2021): 0181–202. http://dx.doi.org/10.26421/qic21.3-4-1.

Full text
Abstract:
Quantum key distribution (QKD) offers a very strong property called everlasting security, which says if authentication is unbroken during the execution of QKD, the generated key remains information-theoretically secure indefinitely. For this purpose, we propose the use of certain universal hashing based MACs for use in QKD, which are fast, very efficient with key material, and are shown to be highly secure. Universal hash functions are ubiquitous in computer science with many applications ranging from quantum key distribution and information security to data structures and parallel computing.
APA, Harvard, Vancouver, ISO, and other styles
14

Cao, Lai Cheng, and Wei Han. "An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing." Applied Mechanics and Materials 571-572 (June 2014): 34–38. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.34.

Full text
Abstract:
Due to the strong capacity of computing and storage, more and more hackers choose to attack cloud systems for their own use to obtain illegal benefits. In order to prevent the occurrence of this phenomenon, when a cloud user enters into the cloud system, their identity must be verified to protect the security of cloud platform and the interests of legitimate users. Then, we propose a new ECC dynamic password-based authentication scheme for cloud computing in this paper. The proposed scheme provides mutual authentication and identity management. A user also can change his/her password whenever
APA, Harvard, Vancouver, ISO, and other styles
15

Li, Jian Bing, Xiao Ping Li, Fan Yang, and Qing Kuan Dong. "An IPv6 Security Multicast System Based on CA Authentication." Advanced Materials Research 989-994 (July 2014): 4519–23. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4519.

Full text
Abstract:
To deploy network components of a security multicast which is based on the multicast group security architecture and its key management architecture, an IPv6 security multicast system using CA authentication is designed. The multicast group members use CA certificate to access network, while the role of Group Controller/key Server deployed in the network is to establish and manage the group key and negotiate SA with multicast source. The proposed scheme solves the problem of components deployment of multicast system with security, and has strong scalability as well which means various multicas
APA, Harvard, Vancouver, ISO, and other styles
16

Han, Gang, and Hui Li. "An Authentication and Data Protection Scheme Research for Mass Storage Devices." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 36, no. 3 (2018): 550–57. http://dx.doi.org/10.1051/jnwpu/20183630550.

Full text
Abstract:
Universal serial bus mass storage is a widely used storage device. In order to protect the user data security in USB storage devices, an effective authentication and data protection scheme is proposed. Using the attribute-based control technology, the security authentication of the USB device user is realized, and the privacy data fine-grained control of the USB device is realized. Security analysis shows that the scheme has strong security, it can resist replay attack, denial of service attack, the online password guessing attack, user impersonation attack, etc. Experimental performance analy
APA, Harvard, Vancouver, ISO, and other styles
17

Kim, Hanvit, Haena Kim, Se Chun, et al. "A Wearable Wrist Band-Type System for Multimodal Biometrics Integrated with Multispectral Skin Photomatrix and Electrocardiogram Sensors." Sensors 18, no. 8 (2018): 2738. http://dx.doi.org/10.3390/s18082738.

Full text
Abstract:
Multimodal biometrics are promising for providing a strong security level for personal authentication, yet the implementation of a multimodal biometric system for practical usage need to meet such criteria that multimodal biometric signals should be easy to acquire but not easily compromised. We developed a wearable wrist band integrated with multispectral skin photomatrix (MSP) and electrocardiogram (ECG) sensors to improve the issues of collectability, performance and circumvention of multimodal biometric authentication. The band was designed to ensure collectability by sensing both MSP and
APA, Harvard, Vancouver, ISO, and other styles
18

Choudhary, Karanjeet, Gurjot Singh Gaba, Ismail Butun, and Pardeep Kumar. "MAKE-IT—A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things." Sensors 20, no. 18 (2020): 5166. http://dx.doi.org/10.3390/s20185166.

Full text
Abstract:
Continuous development of the Industrial Internet of Things (IIoT) has opened up enormous opportunities for the engineers to enhance the efficiency of the machines. Despite the development, many industry administrators still fear to use Internet for operating their machines due to untrusted nature of the communication channel. The utilization of internet for managing industrial operations can be widespread adopted if the authentication of the entities are performed and trust is ensured. The traditional schemes with their inherent security issues and other complexities, cannot be directly deplo
APA, Harvard, Vancouver, ISO, and other styles
19

Teh, Pin Shen, Ning Zhang, Andrew Beng Jin Teoh, and Ke Chen. "TDAS: a touch dynamics based multi-factor authentication solution for mobile devices." International Journal of Pervasive Computing and Communications 12, no. 1 (2016): 127–53. http://dx.doi.org/10.1108/ijpcc-01-2016-0005.

Full text
Abstract:
Purpose The use of mobile devices in handling our daily activities that involve the storage or access of sensitive data (e.g. on-line banking, paperless prescription services, etc.) is becoming very common. These mobile electronic services typically use a knowledge-based authentication method to authenticate a user (claimed identity). However, this authentication method is vulnerable to several security attacks. To counter the attacks and to make the authentication process more secure, this paper aims to investigate the use of touch dynamics biometrics in conjunction with a personal identifica
APA, Harvard, Vancouver, ISO, and other styles
20

Johnson, Korey, and Steffen Werner. "Memorability of Alphanumeric and Composite Scene Authentication (CSA) Passcodes Over Extended Retention Intervals." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 51, no. 5 (2007): 434–38. http://dx.doi.org/10.1177/154193120705100502.

Full text
Abstract:
Current authentication strategies seek to increase security by requiring users to create more secure alphanumeric passwords. Unfortunately, the inverse relationship between alphanumeric password security and memorability prevents users from being able to create a password that is both secure and memorable. Graphical user authentication mechanisms have been explored as a means to maintain security while enhancing memorability of passcodes. Current approaches often use unrelated picture sets from which participants have to remember a subset, with mixed results. The study outlined in this paper s
APA, Harvard, Vancouver, ISO, and other styles
21

Drahansky, Martin, Michal Dolezel, Jaroslav Urbanek, Eva Brezinova, and Tai-hoon Kim. "Influence of Skin Diseases on Fingerprint Recognition." Journal of Biomedicine and Biotechnology 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/626148.

Full text
Abstract:
There are many people who suffer from some of the skin diseases. These diseases have a strong influence on the process of fingerprint recognition. People with fingerprint diseases are unable to use fingerprint scanners, which is discriminating for them, since they are not allowed to use their fingerprints for the authentication purposes. First in this paper the various diseases, which might influence functionality of the fingerprint-based systems, are introduced, mainly from the medical point of view. This overview is followed by some examples of diseased finger fingerprints, acquired both fro
APA, Harvard, Vancouver, ISO, and other styles
22

Castiglione, Aniello, Francesco Palmieri, Chin-Ling Chen, and Yao-Chung Chang. "A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment." International Journal of Data Warehousing and Mining 12, no. 1 (2016): 34–48. http://dx.doi.org/10.4018/ijdwm.2016010103.

Full text
Abstract:
In recent years, Cloud services have become an important part of people's lives, providing them with a large amount of IT resources, available from anywhere and at any time. The access to the services offered is controlled basing on users' identification credentials. As people acquire services from multiple cloud providers, in order to avoid the proliferation of identities associated to a single user, new cross-organization authentication methods, allowing the authorized transfer of users' identification data from one Cloud to another, are emerging. However, since most of these techniques do n
APA, Harvard, Vancouver, ISO, and other styles
23

Martins, Patrícia, Manuel Madeira, Fernando Monteiro, Raúl Bruno de Sousa, António Sérgio Curvelo-Garcia, and Sofía Catarino. "87sr/86sr ratio in vineyard soils from Portuguese denominations of origin and its potential for origin authentication." OENO One 48, no. 1 (2014): 21. http://dx.doi.org/10.20870/oeno-one.2014.48.1.1652.

Full text
Abstract:
<p style="text-align: justify;"><strong>Aim</strong>: The control of geographical origin is one of the most challenging topics regarding wine authenticity. The aim of the present study was to assess the <sup>87</sup>Sr/<sup>86</sup>Sr ratio of vineyard soils from Portuguese Denominations of Origin (DO) and evaluate its suitability as a tool for origin authentication.</p><p style="text-align: justify;"><strong>Methods and results</strong>: An analytical protocol was optimized (chromatographic separation of Sr and Rb, followed by
APA, Harvard, Vancouver, ISO, and other styles
24

Umaroh, Lia, and Machsun Rifauddin. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG." BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, no. 2 (2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.

Full text
Abstract:
This study aims to explain to use a VPN in the UNISMA Library. The research method used is descriptive-qualitative and data was obtained through interviews with five informants, observation, and documentation. Data analysis techniques by collecting data, data reduction, data presentation and drawing conclusions. While the validity of the data was obtained through triangulation. The results showed that the use of VPN in the UNISMA Library to speed up internet connection and data privacy. UNISMA library uses a proxy server router operating system for VPN networks. To be able to make Mikrotik a V
APA, Harvard, Vancouver, ISO, and other styles
25

Yang, Xiao-Dong, Li-Kun Xiao, Chun-Lin Chen, and Cai-Fen Wang. "A Strong Designated Verifier Proxy Re-Signature Scheme for IoT Environments." Symmetry 10, no. 11 (2018): 580. http://dx.doi.org/10.3390/sym10110580.

Full text
Abstract:
With the rapid popularization of the Internet of Things (IoT) in our daily lives, the communication security and identity privacy of IoT devices must be ensured. However, traditional authentication mechanisms utilized in IoT cannot completely ensure a user’s privacy when his/her messages are routed via an untrusted intermediate device. Strong designated-verifier proxy re-signature (SDVPRS) is a new cryptographic technology that combines the advantages of strong designated verifier signature and proxy re-signature. Therefore, SDVPRS is considered to be a better approach to maintain data integri
APA, Harvard, Vancouver, ISO, and other styles
26

Chia, Jason, Ji-Jian Chin, and Sook-Chin Yip. "Digital signature schemes with strong existential unforgeability." F1000Research 10 (September 16, 2021): 931. http://dx.doi.org/10.12688/f1000research.72910.1.

Full text
Abstract:
Digital signature schemes (DSS) are ubiquitously used for public authentication in the infrastructure of the internet, in addition to their use as a cryptographic tool to construct even more sophisticated schemes such as those that are identity-based. The security of DSS is analyzed through the existential unforgeability under chosen message attack (EUF-CMA) experiment which promises unforgeability of signatures on new messages even when the attacker has access to an arbitrary set of messages and their corresponding signatures. However, the EUF-CMA model does not account for attacks such as an
APA, Harvard, Vancouver, ISO, and other styles
27

Lin, Tsung-Hung, Cheng-Chi Lee, Chwei-Shyong Tsai, and Shin-Dong Guo. "A tabular steganography scheme for graphical password authentication." Computer Science and Information Systems 7, no. 4 (2010): 823–41. http://dx.doi.org/10.2298/csis081223028l.

Full text
Abstract:
Authentication, authorization and auditing are the most important issues of security on data communication. In particular, authentication is the life of every individual essential closest friend. The user authentication security is dependent on the strength of user password. A secure password is usually random, strange, very long and difficult to remember. For most users, remember these irregular passwords are very difficult. To easily remember and security are two sides of one coin. In this paper, we propose a new graphical password authentication protocol to solve this problem. Graphical pas
APA, Harvard, Vancouver, ISO, and other styles
28

Han, Jinho. "How to Use Bit-string Representation of the Face in a Multi-factor Authentication System." International Journal of Computing and Digital Systems 10, no. 1 (2021): 47–51. http://dx.doi.org/10.12785/ijcds/100105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Gunson, Nancie, Diarmid Marshall, Fergus McInnes, Hazel Morton, and Mervyn Jack. "Usability Evaluation of Dialogue Designs for Voiceprint Authentication in Automated Telephone Banking." International Journal of Technology and Human Interaction 10, no. 2 (2014): 59–77. http://dx.doi.org/10.4018/ijthi.2014040104.

Full text
Abstract:
This paper describes an empirical investigation of the usability of different dialogue designs for voiceprint authentication in automated telephone banking. Three strategies for voice authentication were evaluated in an experiment with 120 telephone banking end-users: 1-Factor (voiceprint authentication based on customers' utterances of their account number and sort code); 1-Factor with Challenge (1-Factor plus a randomly generated digit string); and 2-Factor (1-Factor plus secret information known only to the caller). The research suggests the 2-Factor approach is the most effective strategy
APA, Harvard, Vancouver, ISO, and other styles
30

Prodanovic, Radomir, and Dejan Simic. "Holistic approach to Wep protocol in securing wireless network infrastructure." Computer Science and Information Systems 3, no. 2 (2006): 97–113. http://dx.doi.org/10.2298/csis0602097p.

Full text
Abstract:
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication confidentiality and integrity. The paper, also, gives a summary of security improvements of WEP protocol that can lead to the higher level of wireless network infrastructure protection. Comparative analysis shows the advantages of the n
APA, Harvard, Vancouver, ISO, and other styles
31

Nita, Stefania, Marius Mihailescu, and Valentin Pau. "Security and Cryptographic Challenges for Authentication Based on Biometrics Data." Cryptography 2, no. 4 (2018): 39. http://dx.doi.org/10.3390/cryptography2040039.

Full text
Abstract:
Authentication systems based on biometrics characteristics and data represents one of the most important trend in the evolution of the society, e.g., Smart City, Internet-of-Things (IoT), Cloud Computing, Big Data. In the near future, biometrics systems will be everywhere in the society, such as government, education, smart cities, banks etc. Due to its uniqueness, characteristic, biometrics systems will become more and more vulnerable, privacy being one of the most important challenges. The classic cryptographic primitives are not sufficient to assure a strong level of secureness for privacy.
APA, Harvard, Vancouver, ISO, and other styles
32

Huang, Bin Wen, and Jie Yu Li. "A Teaching Resources Platform Based on Cloud Computing Technology." Applied Mechanics and Materials 687-691 (November 2014): 3074–77. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.3074.

Full text
Abstract:
This paper gives a teaching resources platform that is a comprehensive feature rich, convenient use, strong interactivity based on cloud computing technology. Platform includes various cloud functions and cloud spaces such as identity authentication function, single sign-on function, resources upload/download function, resources collection function, resource integration function, instant communication function, teacher resource cloud space, student resources cloud space, theme resources cloud space, department resources cloud space and schools resources cloud space. Compared with available tec
APA, Harvard, Vancouver, ISO, and other styles
33

Das, Sanchari, Joshua Streiff, Lesa L. Huber, and L. Jean Camp. "WHY DON’T ELDERS ADOPT TWO-FACTOR AUTHENTICATION? BECAUSE THEY ARE EXCLUDED BY DESIGN." Innovation in Aging 3, Supplement_1 (2019): S325—S326. http://dx.doi.org/10.1093/geroni/igz038.1186.

Full text
Abstract:
Abstract Two-Factor Authentication (2FA) provides effective protection for online accounts by providing efficient and highly robust access control. Adoption and usability, however, remain challenges for such technologies. Most research on 2FA focuses on students or employees in the tech sector. For example, our research with student populations found that lack of adoption was primarily due to a lack user risk concern matched with confidence in their ‘strong’ password strategies. The situation for older adults (> 60 years) was quite different, as we discovered through detailed interviews
APA, Harvard, Vancouver, ISO, and other styles
34

Agustina, Esti Rahmawati, Magdalena Christine, and Irma Fitriani. "Analisis Protokol CryptO-0N2 dengan Menggunakan Scyther Tool." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 1 (2019): 107. http://dx.doi.org/10.25126/jtiik.2019611303.

Full text
Abstract:
<p>Pemilihan Umum (pemilu) di Indonesia merupakan peristiwa yang sangat penting mengingat Indonesia merupakan negara yang menganut paham demokrasi. Metode yang digunakan dalam pemilihan umum di Indonesia adalah dengan menggunakan kertas suara yang ditandai yaitu dicentang atau dicoblos. Banyak kelemahan dan kecurangan yang terjadi dalam sistem konvensional ini. Misalnya pemilih ganda, data pemilih tidak valid, surat suara rusak dan lain sebagainya. Salah satu solusi untuk menyelesaikan permasalahan pada sistem pemilu konvensional adalah dengan menerapkan <em>electronic voting </
APA, Harvard, Vancouver, ISO, and other styles
35

Ivanov, Alexander, and Alexeiy Sulavko. "Draft of the Third National Standard of Russia for Fast Automatic Learning of Large Correlation Neural Networks on Small Training Samples of Biometric Data." Voprosy kiberbezopasnosti, no. 3(43) (2021): 84–93. http://dx.doi.org/10.21681/2311-3456-2021-3-84-93.

Full text
Abstract:
The aim of the study is to show that a biometrics-to-access code converter based on large networks of correlation neurons makes it possible to obtain an even longer key at the output while ensuring the protection of biometric data from compromise. The research method is the use of large «wide» neural networks with automatic learning for the implementation of the biometric authentication procedure, ensuring the protection of biometric personal data from compromise. Results of the study - the first national standard GOST R 52633.5 for the automatic training of neuron networks was focused only on
APA, Harvard, Vancouver, ISO, and other styles
36

Haidar, Ali N., Stefan J. Zasada, Peter V. Coveney, Ali E. Abdallah, Bruce Beckles, and Mike A. S. Jones. "Audited credential delegation: a usable security solution for the virtual physiological human toolkit." Interface Focus 1, no. 3 (2011): 462–73. http://dx.doi.org/10.1098/rsfs.2010.0026.

Full text
Abstract:
We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD
APA, Harvard, Vancouver, ISO, and other styles
37

Zhang, Yuanyuan, and Zhibo Zhai. "An efficient and provably secure key agreement scheme for satellite communication systems." PLOS ONE 16, no. 4 (2021): e0250205. http://dx.doi.org/10.1371/journal.pone.0250205.

Full text
Abstract:
Satellite communication has played an important part in many different industries because of its advantages of wide coverage, strong disaster tolerance and high flexibility. The security of satellite communication systems has always been the concern of many scholars. Without authentication, user should not obtain his/her required services. Beyond that, the anonymity also needs to be protected during communications. In this study, we design an efficient and provably secure key agreement scheme for satellite communication systems. In each session, we replace user’s true identity by a temporary i
APA, Harvard, Vancouver, ISO, and other styles
38

Rai, Laxmisha, Zhiyuan Wang, Amila Rodrigo, Zhaopeng Deng, and Haiqing Liu. "Software Development Framework for Real-Time Face Detection and Recognition in Mobile Devices." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 04 (2020): 103. http://dx.doi.org/10.3991/ijim.v14i04.12077.

Full text
Abstract:
With the rapid use of Android OS in mobile devices and related products, face recognition technology is an essential feature, so that mobile devices have a strong personal identity authentication. In this paper, we propose Android based software development framework for real-time face detection and recognition using OpenCV library, which is applicable in several mobile applications. Initially, the Gaussian smoothing and gray-scale transformation algorithm is applied to preprocess the source image. Then, the Haar-like feature matching method is used to describe the characteristics of the opera
APA, Harvard, Vancouver, ISO, and other styles
39

Renuka, Km, Sachin Kumar, Saru Kumari, and Chien-Ming Chen. "Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks." Sensors 19, no. 21 (2019): 4625. http://dx.doi.org/10.3390/s19214625.

Full text
Abstract:
Wireless sensor networks (WSNs) are of prominent use in unmanned surveillance applications. This peculiar trait of WSNs is actually the underlying technology of various applications of the Internet of Things (IoT) such as smart homes, smart cities, smart shopping complexes, smart traffic, smart health, and much more. Over time, WSNs have evolved as a strong base for laying the foundations of IoT infrastructure. In order to address the scenario in which a user wants to access the real-time data directly from the sensor node in wireless sensor networks (WSNs), Das recently proposed an anonymity-
APA, Harvard, Vancouver, ISO, and other styles
40

Lee, Yun Seok, Eun Kim, Sung Jin Kim, and Min Soo Jung. "Efficient Mobile Payment System Using a near Field Communication (NFC)." Applied Mechanics and Materials 263-266 (December 2012): 2785–91. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2785.

Full text
Abstract:
Today, users can access in the network environments anywhere and anytime through a mobile devices. These environments also can be able to perform mobile payment through these devices anytime and anywhere. Especially, in case of a recently being spotlighted NFC can operate high-strength crypto algorithms unlike the existing RFID. And also, this supports the technology as ‘Tag to Device’, ‘Device to Device’. Recently, various studies are being actively researched about the mobile payment system through these NFC devices. In case of existing papers are performed payment steps using most of a Publ
APA, Harvard, Vancouver, ISO, and other styles
41

Khobragade, Shrutika, Rohini Bhosale, and Rahul Jiwahe. "High Security Mechanism: Fragmentation and Replication in the Cloud with Auto Update in the System." APTIKOM Journal on Computer Science and Information Technologies 5, no. 2 (2020): 54–59. http://dx.doi.org/10.34306/csit.v5i2.138.

Full text
Abstract:
Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, t
APA, Harvard, Vancouver, ISO, and other styles
42

Singh, Yogendra Narain, Sanjay Kumar Singh, and Amit Kumar Ray. "Bioelectrical Signals as Emerging Biometrics: Issues and Challenges." ISRN Signal Processing 2012 (July 26, 2012): 1–13. http://dx.doi.org/10.5402/2012/712032.

Full text
Abstract:
This paper presents the effectiveness of bioelectrical signals such as the electrocardiogram (ECG) and the electroencephalogram (EEG) for biometric applications. Studies show that the impulses of cardiac rhythm and electrical activity of the brain recorded in ECG and EEG, respectively; have unique features among individuals, therefore they can be suggested to be used as biometrics for identity verification. The favourable characteristics to use the ECG or EEG signals as biometric include universality, measurability, uniqueness and robustness. In addition, they have the inherent feature of vita
APA, Harvard, Vancouver, ISO, and other styles
43

Khobragade, Shrutika, Rohini Bhosale, and Rahul Jiwane. "High security mechanism: fragmentation and replication in the cloud with auto update in the system." Computer Science and Information Technologies 1, no. 2 (2020): 78–83. http://dx.doi.org/10.11591/csit.v1i2.p78-83.

Full text
Abstract:
Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, t
APA, Harvard, Vancouver, ISO, and other styles
44

Williams, GL, J. Gray, and J. Beynon. "Cancer Genetics Clinics and the Surgeon: A Valuable Role for Family History Screening." Annals of The Royal College of Surgeons of England 89, no. 2 (2007): 127–29. http://dx.doi.org/10.1308/003588407x155789.

Full text
Abstract:
INTRODUCTION This study examines how a colorectal surgeon can use a regional cancer genetics service to deal safely and efficiently, with community referrals for colorectal cancer screening on the basis of family history. PATIENTS AND METHODS A retrospective review of consecutive asymptomatic people with a strong family of colorectal cancer referred by the surgeon to the genetics service over a 30-month period. RESULTS A total of 45 people were referred by the surgeon to the cancer genetics service. Following official verification of family histories, 15 were thought to be in a low-risk catego
APA, Harvard, Vancouver, ISO, and other styles
45

Tarmizi, Auni Aqilah Ahmad, Alina Wagiran, Faezah Mohd Salleh, et al. "Integrated Approach for Species Identification and Quality Analysis for Labisia pumila Using DNA Barcoding and HPLC." Plants 10, no. 4 (2021): 717. http://dx.doi.org/10.3390/plants10040717.

Full text
Abstract:
Labisia pumila is a precious herb in Southeast Asia that is traditionally used as a health supplement and has been extensively commercialized due to its claimed therapeutic properties in boosting a healthy female reproductive system. Indigenous people used these plants by boiling the leaves; however, in recent years it has been marketed as powdered or capsuled products. Accordingly, accuracy in determination of the authenticity of these modern herbal products has faced great challenges. Lack of authenticity is a public health risk because incorrectly used herbal species can cause adverse effec
APA, Harvard, Vancouver, ISO, and other styles
46

Keikavousi, Mohammad Reza, Farkhondeh Asadi, Somayeh Paydar, and Fariba Khounraz. "Development of Inflammatory Bowel Diseases Registry Software." Middle East Journal of Digestive Diseases 13, no. 2 (2021): 145–52. http://dx.doi.org/10.34172/mejdd.2021.218.

Full text
Abstract:
BACKGROUND With an increase in the prevalence and incidence of inflammatory bowel diseases (IBDs), they have become a global challenge. The IBD registry provides complete and timely data, thereby greatly contributing to the estimation of the burden of these diseases and development of control and prevention programs. We aimed to develop an IBD registry software. METHODS The present applied-developmental study had two main stages: determining user requirements, and developing the IBD registry software. The software was created using a Web-based software development technology called ASP.NET Cor
APA, Harvard, Vancouver, ISO, and other styles
47

Mouly, Daniel. "Strong User Authentication." Information Systems Security 11, no. 2 (2002): 47–53. http://dx.doi.org/10.1201/1086/43320.11.2.20020501/36769.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Rehan, Mohammed. "An Analysis of Public e-Procurement System." International Journal of Technology Diffusion 4, no. 4 (2013): 66–81. http://dx.doi.org/10.4018/ijtd.2013100104.

Full text
Abstract:
In today's global economy, organizations are focusing on customer oriented business models to use information technologies not only for suppliers and customers, but also for effective communication and collaboration with public agencies. This need quick exchange of related and current information in standard formats and publishing widely in the process by encouraging the provision of e-commerce with the application of Internet technologies in the supply chain. It can be applied to any type of governmental work, such as training, provision of justice, tax audits, budget execution, financial con
APA, Harvard, Vancouver, ISO, and other styles
49

R.K, Nadesh, Srinivasa Perumal R, Shynu P.G, and Gaurav Sharma. "Enhancing security for end users in cloud computing environment using hybrid encryption technique." International Journal of Engineering & Technology 7, no. 1.8 (2018): 152. http://dx.doi.org/10.14419/ijet.v7i1.8340.

Full text
Abstract:
In the era of cloud, anything and everything as a service facilitates number of remote user connected from anywhere, anytime and any form of access to the storage services. Today, Cloud storage has become an essential aspect of cloud computing, stores information and support any kind of applications. Applications like Internet of Things, Big Data analytics, Data warehousing, Databases, Backups and archive applications all rely on some form or the other on cloud storage architecture. Users may have a different variants of smart devices such as tablet, PCs, notebook and smart phones. Cloud stora
APA, Harvard, Vancouver, ISO, and other styles
50

Hung-Yu Chien. "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity." IEEE Transactions on Dependable and Secure Computing 4, no. 4 (2007): 337–40. http://dx.doi.org/10.1109/tdsc.2007.70226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!