Search results for " Authentication"
showing 10 items of 43 documents
A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud
2020
Healthcare data in cloud computing facilitates the treatment of patients efficiently by sharing information about personal health data between the healthcare providers for medical consultation. Furthermore, retaining the confidentiality of data and patients' identity is a another challenging task. This paper presents the concept of an access control-based (AC) privacy preservation model for the mutual authentication of users and data owners in the proposed digital system. The proposed model offers a high-security guarantee and high efficiency. The proposed digital system consists of four different entities, user, data owner, cloud server, and key generation center (KGC). This approach makes…
Usability analysis of a novel biometric authentication approach for android-based mobile devices
2014
Mobile devices are widely replacing the standard personal computers thanks to their small size and user-friendly use. As a consequence, the amount of information, often confidential, exchanged through these devices is raising. This makes them potential targets of malicious network hackers. The use of simple passwords or PIN are not sufficient to provide a suitable security level for those applications requiring high protection levels on data and services. In this paper a biometric authentication system, as a running Android application, has been developed and implemented on a real mobile device. A system test on real users has been also carried out in order to evaluate the human-machine int…
Authentication of berries and berry-based food products.
2021
Abstract Berries represent one of the most important and high-valued group of modern-day health-beneficial “superfoods” whose dietary consumption has been recognized to be beneficial for human health for a long time. In addition to being delicious, berries are rich in nutrients, vitamins, and several bioactive compounds, including carotenoids, flavonoids, phenolic acids, and hydrolysable tannins. However, due to their high value, berries and berry-based products are often subject to fraudulent adulteration, commonly for economical gain, but also unintentionally due to misidentification of species. Deliberate adulteration often comprises the substitution of high-value berries with lower valu…
Chromatographic fingerprint of the volatile fraction of rare Hedera helix honey and biomarkers identification
2018
Hedera helix (Irish ivy) honey is a very rare food product used in Ireland. The composition of the volatile fraction of this unique honey was studied for the first time using three different extraction procedures (SPE, USE and HS–SPME) and analyzed with gas chromatography and mass spectrometry. As expected, the use of combined techniques resulted in the identification of the detailed composition of honey volatiles. Identified constitutes belongs to the different chemical classes. The presence of 4(1H)-quinolinone, myrtenal and phenylacetonitrile was proposed as biomarkers of the botanical origin of ivy honey. Moreover, they are not widely widespread among honeys of different botanical origi…
QoS Mechanisms for IEEE 802.11 Wireless LANs
2004
Currently the Internet provides users with access to information across the world using IP technology. Until now most access points to the Internet have been fixed stations at given locations, but with increasing sales of mobile devices, mobility has become a major trend. Therefore, the Internet is becoming more and more heterogeneous due to the recent explosion of wireless networks. The IEEE 802.11 wireless LAN (WLAN) is the most widely used WLAN standard nowadays. Currently the IEEE 802.11 standard specifies an over-the-air interface between wireless devices. However, QoS services over this technology are still being defined aiming to provide support to multiple applications. Thus, a larg…
Access Security and Personal Privacy in Public Cellular Communication Systems: The Past, the Present and Beyond 2020
2010
In order to predict the future one needs to understand the past and then interpolate as best as possible. We expect this to work reasonably well for a “2020 Scenario”, but we do not expect this approach to be valid for a “Beyond 2020” scenario.
Detection of archaeological forgeries of Iberian lead plates using nanoelectrochemical techniques. The lot of fake plates from Bugarra (Spain)
2014
Identification of forgeries is of considerable interest in studies of archaeological signariums and written Iberian artifacts, elements of capital importance for the knowledge of that culture, because there are many Iberian inscribed lead plate counterfeits circulating in the market and among many museum funds. A case study of identification of forgeries of archaeological lead using voltammetry of microparticles (VMP) and scanning electrochemical microscopy (SECM), aided by conventional optical microscopy and scanning electron microscopy (SEM/EDX) is described. The electrochemical methods are essentially non-invasive so can be applied to samples of nanoscopic size. Application to the authen…
A Novel Embedded Fingerprints Authentication System Based on Singularity Points
2008
In this paper a novel embedded fingerprints authentication system based on core and delta singularity points detection is proposed. Typical fingerprint recognition systems use core and delta singularity points for classification tasks. On the other hand, the available optical and photoelectric sensors give high quality fingerprint images with well defined core and delta points, if they are present. In the proposed system, fingerprint matching is based on singularity points position, orientation, and relative distance detection. As result, fingerprint matching involves the comparison between few features leading to a very fast system with recognition rates comparable to the standard minutiae…
Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther
2016
Scyther [1] is designed to check the security and vulnerabilities of security protocols. In this paper, we use Scyther to analyze two discrete logarithm problem (DLP) based group authentication protocols proposed in [2]. These two protocols are claimed to satisfy several security requirements, but only part of them have been checked because of the properties and limitations of Scyther. Some positive results have been gained and show that the protocols provide mutual authentication and implicit key authentication and are secure against impersonation attack. An important innovation in this paper is that we have extended the expressing ability of Scyther by giving some reasonable assumption du…
CORMORANT
2019
People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…