Search results for " authentication"

showing 10 items of 43 documents

Privacy enhanced mutual authentication in LTE

2013

In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…

AuthenticationInformation privacybusiness.industryComputer scienceMutual authenticationEncryptionComputer securitycomputer.software_genrePublic-key cryptographyIdentifierUser equipmentMessage authentication codebusinesscomputerComputer network2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

Influence of regionality and maturation time on the chemical fingerprint of whisky.

2020

International audience; Understanding the chemical composition of whisky and the impact of each step in the manufacturing process provides a basis for responding to the challenges of producing high quality spirits. In this study, the objective was to discriminate whiskies according to their geographical origin and authenticate the maturation time in cask based on the non-volatile profiles. The combination of FT-ICR-MS and chemometrics allowed the distinction of whiskies from four geographical origins in Scotland (Highlands, Lowlands, Speyside and Islay). Statistical modeling was also used to discriminate whiskies according to the maturation time in cask and reveal chemical markers associate…

AuthenticationManufacturing processWhisky010401 analytical chemistry04 agricultural and veterinary sciencesGeneral MedicineBiologyBarrel (unit)040401 food science01 natural sciences0104 chemical sciencesAnalytical Chemistry0404 agricultural biotechnologyChemical markerHomogeneousWhisky ; Metabolomics ; Chemometrics ; Authentication ; Geographical Origin ; Maturation TimeGeographical originMetabolomicsFood scienceChemometrics[SDV.AEN]Life Sciences [q-bio]/Food and NutritionFood ScienceMaturation timeFood chemistry
researchProduct

Analysis and Optimization Technique of Secure Smart Grid Communication Network for Sustainable Development

2019

The smart network includes many sub-frameworks, for example, the Home Area Network (HAN), which are at risk and prone to be attacked remotely. A smart grid communication is meant to design a mutual authentication scheme and a key management protocol. This study is aimed with an efficient arrangement for HAN that analyzes a framework set-up for HAN. In this paper, we have analyzed three cases: First, we show the normal execution then execution along with attackers. Using mutual authentication, we overcome attacks. It has introduced a number of routing schemes for grid networks in recent years, and they provide different level of privacy protection at different cost. First, an unspecified key…

AuthenticationSmart gridComputer sciencebusiness.industryMutual authenticationSession (computer science)Routing (electronic design automation)GridKey managementbusinessProtocol (object-oriented programming)Computer network
researchProduct

A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users

2003

Currently used in mobile devices PIN-based user authentication cannot provide a sufficient security level. Methods based on multi-modal user authentication involving biometrics (i.e. physical and behavioral characteristics of a person) may be employed to cope with this problem. However, dealing with physical characteristics only, these methods are either unable to provide continuous and user-friendly identity verification, or are resource consuming.

AuthenticationUser authenticationResource (project management)BiometricsHuman–computer interactionComputer scienceIdentity (object-oriented programming)Security levelComputer securitycomputer.software_genreMobile devicecomputer
researchProduct

An improvement of the batch-authentication and key agreement framework for P2P-based online social networks

2014

Batch authentication is the way to authenticate multiple users simultaneously to provide better efficiency. In [1], three batch authentication protocols are proposed based on different primitives, to provide simultaneous authentication of multiple users in online social networks (OSNs). In this paper, we briefly introduce the original protocols, describe their security vulnerabilities and related attacks, and propose modifications to make them secure again.

Authenticationbusiness.industryComputer scienceAuthentication protocolNetwork Access ControlData_MISCELLANEOUSChallenge–response authenticationEncryptionbusinessAKAComputer network2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
researchProduct

A multimodal retina-iris biometric system using the Levenshtein distance for spatial feature comparison

2020

Abstract The recent developments of information technologies, and the consequent need for access to distributed services and resources, require robust and reliable authentication systems. Biometric systems can guarantee high levels of security and multimodal techniques, which combine two or more biometric traits, warranting constraints that are more stringent during the access phases. This work proposes a novel multimodal biometric system based on iris and retina combination in the spatial domain. The proposed solution follows the alignment and recognition approach commonly adopted in computational linguistics and bioinformatics; in particular, features are extracted separately for iris and…

Biometric systemComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONspatial domain biometric featuresbiometric authentication system4603 Computer Vision and Multimedia Computation46 Information and Computing SciencesmedicineIris (anatomy)multimodal systemRetinabusiness.industrymultimodal retina-iris biometric systemLevenshtein distancePattern recognitionbiometric recognition systemQA75.5-76.95Levenshtein distanceretina and iris featuresmedicine.anatomical_structureFeature (computer vision)Electronic computers. Computer scienceSignal ProcessingComputer Vision and Pattern RecognitionArtificial intelligencebusinessSoftware
researchProduct

I ‘vasi di Centuripe’: per un approccio integrato

2017

Il contributo intende evidenziare le prospettive di un approccio interdisciplinare integrato allo studio della ceramica policroma “di Centuripe”. Dagli inizi del XX secolo, tale classe ha riscosso ampio apprezzamento per le sue delicate pitture e la ricchezza di ornamenti a rilievo applicati (dipinti e dorati) che abbelliscono i vasi, rendendoli pressoché inutilizzabili nella pratica per scopi funzionali, ma altamente efficaci come doni funerari in antico, e oggi come pezzi di grande impatto per commercianti di antichità e collezionisti moderni. Data la piaga, diffusa fino a tempi recenti, degli scavi clandestini, dei “restauri” arbitrari e delle falsificazioni, i vasi di Centuripe necessit…

Centuripe pitture ellenistiche a tempera colori antichi autenticità e falsificazioni tecniche analitiche XRF FTIRSettore L-ANT/10 - Metodologie Della Ricerca ArcheologicaCenturipe Hellenistic Tempera Painting Ancient Colours Authentication Forgeries XRF FTIR AnalysesSettore L-ANT/07 - Archeologia ClassicaSettore CHIM/02 - Chimica Fisica
researchProduct

Mutual entity authentication for LTE

2011

In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses. In this paper we propose an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol. We also analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.

Challenge-Handshake Authentication ProtocolKey-agreement protocolAuthenticationbusiness.industryComputer scienceAuthorizationMutual authenticationEnterprise information security architectureCryptographic protocolComputer securitycomputer.software_genreDistributed System Security ArchitectureGSMAuthentication protocolLightweight Extensible Authentication ProtocolbusinesscomputerAKAComputer network2011 7th International Wireless Communications and Mobile Computing Conference
researchProduct

Design and Implementation of Deep Learning Based Contactless Authentication System Using Hand Gestures

2021

Hand gestures based sign language digits have several contactless applications. Applications include communication for impaired people, such as elderly and disabled people, health-care applications, automotive user interfaces, and security and surveillance. This work presents the design and implementation of a complete end-to-end deep learning based edge computing system that can verify a user contactlessly using &lsquo

Edge deviceComputer Networks and CommunicationsComputer scienceSpeech recognitionlcsh:TK7800-8360securitySign languageVDP::Teknologi: 500::Elektrotekniske fag: 540edge computingCode (cryptography)ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSElectrical and Electronic EngineeringEdge computingAuthenticationhand gestures recognitionArtificial neural networkbusiness.industryDeep learninglcsh:Electronicsdeep learningneural networkscontactless authenticationHardware and ArchitectureControl and Systems Engineeringcamera based authenticationSignal ProcessingArtificial intelligencebusinessGesture
researchProduct

Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study

2022

In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solutio…

Electrical and Electronic EngineeringAPI; REST; spring-boot; Keycloak; authentication; authorization; encryption; external attacksVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550BiochemistryInstrumentationComputer SecuritySoftwareAtomic and Molecular Physics and OpticsAnalytical ChemistrySensors
researchProduct