Search results for "AUTHENTICATION"
showing 10 items of 108 documents
Stealthy Attacks in Cloud-Connected Linear Impulsive Systems
2018
This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…
On the Influence of Affect in EEG-Based Subject Identification
2021
Biometric signals have been extensively used for user identification and authentication due to their inherent characteristics that are unique to each person. The variation exhibited between the brain signals (EEG) of different people makes such signals especially suitable for biometric user identification. However, the characteristics of these signals are also influenced by the user’s current condition, including his/her affective state. In this paper, we analyze the significance of the affect-related component of brain signals within the subject identification context. Consistent results are obtained across three different public datasets, suggesting that the dominant component of the sign…
Cybersecurity in Europe
2021
Information security is increasingly necessary between citizens and public services. In a nearby environment, such as cities, there are digital services and infrastructures that help improve our quality of life. Secure access to services must be regulated and offer trust to the user. Initiatives like the Regulation from European Union, (EU) N° 910/2014 of the European Parliament and the Council intend to favour solutions for problems like interoperability and cybersecurity. In this chapter, two European countries are considered so that implementations of the electronic identification, authentication, and trust services are presented and discussed. The main contribution is a description of r…
Acceptability of the e-authentication in higher education studies: views of students with special educational needs and disabilities
2021
AbstractTrust-based e-assessment systems are increasingly important in the digital age for both academic institutions and students, including students with special educational needs and disabilities (SEND). Recent literature indicates a growing number of studies about e-authentication and authorship verification for quality assurance with more flexible modes of assessment. Yet understanding the acceptability of e-authentication systems among SEND students is underexplored. This study examines SEND students’ views about the use of e-authentication systems, including perceived advantages and disadvantages of new technology-enhanced assessment. This study aims to shed light on this area by exa…
Developing E-Authentication for E-Assessment : Diversity of Students Testing the System in Higher Education
2020
Sähköinen tunnistautuminen on yksi keskeisistä teemoista verkko-opetuksessa, -opiskelussa ja - arvioinnissa. Tämän tutkimuksen tarkoituksena oli tutkia opiskeluunsa erityistä tukea tarvitsevien yliopisto-opiskelijoiden käyttökokemuksia kehitteillä olevasta sähköisestä tunnistautumisjärjestelmästä. Erityistä huomiota kehittämistyössä kiinnitettiin tunnistautumisen saavutettavuuteen. Kaikkiaan 15 opiskelijaa testasi TeSLA-projektin osana kehitettyä tunnistautumisjärjestelmää, johon kuului kasvojentunnistus, äänentunnistus, näppäilyntunnistus, tekstityylianalyysi ja plagioinnin tunnistus. Opiskelijat täyttivät esi- ja jälkikyselylomakkeet sekä osallistuivat henkilökohtaisiin haastatteluihin. T…
One confession, multiple chronotopes: The interdiscursive authentication of an apology in an international criminal trial
2020
A melanocortin 1 receptor (MC1R) gene polymorphism is useful for authentication of Massese sheep dairy products
2011
Massese is an Italian sheep breed, with black or grey coat colour, mainly reared in the Tuscany and Emilia Romagna regions. Recently, the emerging interests in this breed have resulted in the production of Pecorino cheese obtained with only Massese milk. In order to be profitable, this marketing link between Massese breed and its products should be defended against fraudsters who could include milk of other sheep breeds or cow milk in Massese labelled productions. To identify the genetic factors affecting coat colour in sheep, we have recently analysed the melanocortin 1 receptor (MC1R) gene and identified several single nucleotide polymorphisms (SNPs). In this work, as a first step to set …
Archaeometric Study of Two Tanagra Type Statuettes of Unknown Provenance to Support Forensic Study
2022
This paper is concerned with a morphological-stylistic and archaeometric study of two small pottery statues, confiscated by the Cosenza Carabinieri Unit for the Protection of Cultural Heritage and Anti-Counterfeiting (Calabria, Italy). The research aimed to establish the authenticity of the artworks and to verify a possible origin from the same workshop manufacturing, by providing indications about the textural features and raw materials used for their production. For these purposes, the analytical approach involved the use of minero-petrographic and physical analysis, as follows: petrographic analysis (OM), X-ray diffraction (XRD) and thermoluminescence tests (TL). The preliminary observat…
Authentication of phacelia honeys (Phacelia tanacetifolia) based on a combination of HPLC and HPTLC analyses as well as spectrophotometric measuremen…
2019
Abstract The growing interest in the quality of honey affects customer preferences and consumption trends. Generally, monofloral honeys are more expensive than multifloral honeys, and the price strictly depends on its botanical origin. The increasing popularity of a variety of monofloral brands has led to the increasing number of adulterations and therefore for the need to develop new analytical methods for assessing honey authenticity. The purpose of the present study was to develop a method for the authentication of phacelia honeys on the basis of HPLC and HPTLC analyses and spectrophotometry. The results obtained by spectrophotometric analysis indicated significant differences only betwe…
Fingerprint Quality Evaluation in a Novel Embedded Authentication System for Mobile Users
2015
The way people access resources, data and services, is radically changing using modern mobile technologies. In this scenario, biometry is a good solution for security issues even if its performance is influenced by the acquired data quality. In this paper, a novel embedded automatic fingerprint authentication system (AFAS) for mobile users is described. The goal of the proposed system is to improve the performance of a standard embedded AFAS in order to enable its employment in mobile devices architectures. The system is focused on the quality evaluation of the raw acquired fingerprint, identifying areas of poor quality. Using this approach, no image enhancement process is needed after the …