Search results for " authentication"

showing 10 items of 43 documents

Fingerprint and Iris based Authentication in Intercooperative Emerging e-Infrastructures

2013

E-infrastructures must support the development of heterogeneous applications for workstation network, for mobile and portable systems and devices. In this context and relating to all collaborative and pervasive computational technology a very important role is played by security and authentication systems, which represent the first step of the whole process. Biometric authentication systems represent a valid alternative to conventional authentication systems providing robust procedures for user authentication. On the other hand, Internet of Things involves a heterogeneous set of interacting devices to enable innovative global and local applications and services for users. In this chapter fi…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniUser authenticationAuthenticationBiometricsComputer sciencebusiness.industryFingerprint (computing)Context (language use)Biometric Authentication Systems Unimodal and Multimodal Systems Embedded SensorsSoftwareHuman–computer interactionAuthentication protocolEmbedded systemLightweight Extensible Authentication Protocolbusiness
researchProduct

Fuzzy techniques for access and data management in home automation environments

2012

Home Automation Environments are characterized by the integration of electronic devices as well as by the performance of communication and control systems. Environment infrastructure has to meet several requirements including Quality of Service (QoS), safety, security, and energy saving. However, Home Automation deals with complex environments, so that advanced data management systems are required to meet the above constraints. Fuzzy Logic based techniques can be successful used to improve system performance management. This work proposes and describes the use and application of fuzzy rules on a two-tiered architecture integrating a biometric authentication module and communication real-tim…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniWireless Sensor Networks Real-time scheduling Biometric Authentication Data Management Fuzzy Techniques
researchProduct

Biometric sensors rapid prototyping on field-programmable gate arrays

2015

AbstractBiometric user authentication in large-scale distributed systems involves passive scanners and networked workstations and databases for user data acquisition, processing, and encryption. Unfortunately, traditional biometric authentication systems are prone to several attacks, such as Replay Attacks, Communication Attacks, and Database Attacks. Embedded biometric sensors overcome security limits of conventional software recognition systems, hiding its common attack points. The availability of mature reconfigurable hardware technology, such as field-programmable gate arrays, allows the developers to design and prototype the whole embedded biometric sensors. In this work, two strong an…

WorkstationBiometricsComputer sciencebusiness.industryData_MISCELLANEOUSFingerprint (computing)EncryptionBiometric Authentication Systems FPGA.Reconfigurable computinglaw.inventionSoftwareArtificial IntelligencelawEmbedded systembusinessField-programmable gate arrayReplay attackSoftwareThe Knowledge Engineering Review
researchProduct

HPTLC fingerprinting—rapid method for the differentiation of honeys of different botanical origin based on the composition of the lipophilic fractions

2018

Bee honey possess various nutritional and medicinal functions, which are the result of its diverse chemical composition. The numerous bioactive compounds in honey come from flower nectar

animal structuresPharmaceutical ScienceDandelionfood quality01 natural sciencesArticlehoney fingerprintAnalytical Chemistrylcsh:QD241-441HPTLC0404 agricultural biotechnologylcsh:Organic chemistryDrug DiscoveryNectarSolid phase extractionPhysical and Theoretical ChemistryChemical compositionChromatography High Pressure LiquidChromatographyultrasound assisted extractionMilk ThistleChemistry010401 analytical chemistryOrganic ChemistryExtraction (chemistry)digestive oral and skin physiologyfungisolid phase extractionfood and beverages04 agricultural and veterinary sciencesHoney040401 food scienceThin-layer chromatography0104 chemical sciencesBlowing a raspberryhoney authenticationChemistry (miscellaneous)behavior and behavior mechanismsMolecular MedicineFood AnalysisMolecules
researchProduct

Application Development from Prototype to Beta : A Case Study of the Application SeafarerCV

2018

Master's thesis Multimedia and Educational Technology MM500 - University of Agder 2018 When the prototype of a software product is completed and approved, development of a betaready resource is often the natural step toward a future final release. This process contains many steps that may prove vital to the eventual success or downfall of a future product. Technologies must be chosen, design methodologies must be followed, and care must be given to provide the final product with a solid foundation to build upon. This thesis follows such a development process for the development of resources for beta-testing. This process, as well as the human centered design approaches, and the resulting re…

application success factorshuman-centered designsingle authentication serviceMM500Application developmentdevelopment processVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Biometric Features for Mobile Agents Ownership

2005

Multi-Agent System (MAS) architectures can be used for e-Business application due their flexibility, scalability and interoperability. Agent ownership implies that a specific person or organization (the owner) is responsible for the agent's actions. Agents, whose ownership was certainly fixed, could operate on behalf of their owner to make transactions, to buy or sell products. Security requirements in the agent ownership setting process are the identification of the owner and the protection of the identification information carried by an agent. In this paper, we investigate the possibility of using biometrics in mobile agent systems for owner authentication. Biometric features can be used …

biometric authentication systemsmulti-agent systems security.ComputingMilieux_LEGALASPECTSOFCOMPUTINGagent ownershipComputingMethodologies_ARTIFICIALINTELLIGENCE
researchProduct

A general framework for group authentication and key exchange protocols

2014

Published version of a chapter in the book: Foundations and Practice of Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-05302-8_3 In this paper, we propose a novel framework for group authentication and key exchange protocols. There are three main advantages of our framework. First, it is a general one, where different cryptographic primitives can be used for different applications. Second, it works in a one-to-multiple mode, where a party can authenticate several parties mutually. Last, it can provide several security features, such as protection against passive adversaries and impersonate attacks, implicit key authentication, forward and backward securi…

group authenticationAuthenticationPost-quantum cryptographyelliptic curve discrete logarithm problemCryptographic primitivediscrete logarithm problembusiness.industryVDP::Technology: 500::Information and communication technology: 550Computer securitycomputer.software_genreKey authenticationDiffie–Hellman key exchangePublic-key cryptographyDiffie-Hellman key exchangebusinesscomputerKey exchangeElGamal encryptionMathematics
researchProduct

Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education

2019

Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e-authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is to understand teaching staff' views regarding the use of e-authentication instruments and how they impact trust in e-assessment. This mixed-method study examines the concerns and practices of 108 teaching staff who used the TeSLA—Adaptive Trust-based e-Assessment System in six countries: the UK, Spain, the Netherlands, Bulgaria, Finland and Turkey.…

pedagogical approachessähköinen arviointiresponsible research and innovationeducación superiorhenkilöllisyysauthorship verificationverificación de autoríae-assessmentidentitytekijyysAuditor's reportAuthentication4. Education05 social scienceseducació superior050301 educationelectronic authenticationPublic relationsAuthentication (law)Autentificación de documentosverifiointitodentaminenhigher educatione-authenticationThe InternetPsychologyautenticación electrónica050101 languages & linguisticsplagiointiHigher educationBest practiceCheatingData securityautenticacióEducationautenticación0501 psychology and cognitive sciencestietoturvaauthorshipcheating detectionbusiness.industrytrustInformation securityautenticació electrònicae-arviointiAutenticació de documentsverificació de l'autoriabusiness0503 educationarviointi
researchProduct

Authorized authentication evaluation framework for constrained environments

2016

Internetin kasvu ei perustu tällä hetkellä vain uusien solmujen määrään, vaan Internet on levittäytymässä aivan uusille alueille. Viimeaikoina erilaiset tavat kerätä tietoa ja ohjata laitteita uusin tavoin ovat yleistyneet esimerkiksi teollisuudessa, kaupunkiympäristöjen melun ja saasteiden seurannassa. Lisäksi käsitteet älykoti tai -kaupunki alkavat olla yleisesti tunnettuja. Nykyinen kasvu näiden teknologioiden käytössä perustuu pitkälti laitteiden koon pienenemiseen ja hintojen laskuun. Jotta Esineiden Internet pystyy kasvamaan merkittävällä tavalla, laitteiden fyysisten kokojen ja hintojen tulisi pysyä matalalla tasolla tai laskea edelleen. Pieni koko ja hinta tarkoittaa kuitenkin usein…

todentaminenAuthorized AuthenticationInternet of Thingsrajoitetut ympäristötConstrained EnvironmentsAccess controlesineiden internet
researchProduct

Efficient remote authentication

2013

In 2003, Kennel and Jamieson described a method of remote machine authentication. By authentication, the authors meant that the remote machine is non-virtual, and the operating system on the remote machine is not malicious. The described method does not consider the variety of versions of each operating system. The description completely ignores the existence of modules that can be plugged into the operating system. The authors of this paper adapt the method described by Kennel and Jamieson to the real world so that itcan be applied without prior knowledge of theoperating system or the modules on the remote machine. peerReviewed

todentaminentietokoneetetäkäyttöremote authenticationtietoturvavirtuaaliympäristöVirtual machinedatabasedigital rights management
researchProduct