Search results for "AUTHENTICATION"

showing 10 items of 108 documents

Stealthy Attacks in Cloud-Connected Linear Impulsive Systems

2018

This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…

0209 industrial biotechnologyClass (computer programming)Authenticationbusiness.industryComputer scienceDistributed computingData_MISCELLANEOUS020208 electrical & electronic engineeringAutonomous agentCyber-physical systemCloud computing02 engineering and technologyFunction (mathematics)Security robotics distributed control and estimation020901 industrial engineering & automationControl theoryComputer Science::Multimedia0202 electrical engineering electronic engineering information engineeringbusinessComputer Science::Cryptography and Security
researchProduct

On the Influence of Affect in EEG-Based Subject Identification

2021

Biometric signals have been extensively used for user identification and authentication due to their inherent characteristics that are unique to each person. The variation exhibited between the brain signals (EEG) of different people makes such signals especially suitable for biometric user identification. However, the characteristics of these signals are also influenced by the user’s current condition, including his/her affective state. In this paper, we analyze the significance of the affect-related component of brain signals within the subject identification context. Consistent results are obtained across three different public datasets, suggesting that the dominant component of the sign…

021110 strategic defence & security studiesAuthenticationBiometricsmedicine.diagnostic_testbusiness.industryComputer science0211 other engineering and technologiesContext (language use)Pattern recognition02 engineering and technologyElectroencephalographyHuman-Computer InteractionIdentification (information)Component (UML)0202 electrical engineering electronic engineering information engineeringTask analysismedicine020201 artificial intelligence & image processingArtificial intelligencebusinessAffective computingSoftwareIEEE Transactions on Affective Computing
researchProduct

Cybersecurity in Europe

2021

Information security is increasingly necessary between citizens and public services. In a nearby environment, such as cities, there are digital services and infrastructures that help improve our quality of life. Secure access to services must be regulated and offer trust to the user. Initiatives like the Regulation from European Union, (EU) N° 910/2014 of the European Parliament and the Council intend to favour solutions for problems like interoperability and cybersecurity. In this chapter, two European countries are considered so that implementations of the electronic identification, authentication, and trust services are presented and discussed. The main contribution is a description of r…

021110 strategic defence & security studiesAuthenticationIdentification (information)Computer science020204 information systems0211 other engineering and technologies0202 electrical engineering electronic engineering information engineering02 engineering and technologyComputer securitycomputer.software_genrecomputer
researchProduct

Acceptability of the e-authentication in higher education studies: views of students with special educational needs and disabilities

2021

AbstractTrust-based e-assessment systems are increasingly important in the digital age for both academic institutions and students, including students with special educational needs and disabilities (SEND). Recent literature indicates a growing number of studies about e-authentication and authorship verification for quality assurance with more flexible modes of assessment. Yet understanding the acceptability of e-authentication systems among SEND students is underexplored. This study examines SEND students’ views about the use of e-authentication systems, including perceived advantages and disadvantages of new technology-enhanced assessment. This study aims to shed light on this area by exa…

030506 rehabilitationPersonal dataeducación superiorSpecial educationaccesibilidadAcceptabilitymedia_commonlcsh:LC8-6691lcsh:T58.5-58.64lcsh:Information technology4. Education05 social scienceseducació superiordades personals050301 educatione-AuthenticationAccessibilityAuthentication (law)acceptabilitatComputer Science ApplicationssaavutettavuusStudents with special educational needs and disabilitiesaccessibilitat0305 other medical sciencePsychologyResearch Articleautenticación electrónicaEducation HigherHigher educationmedia_common.quotation_subjectCheatingInternet privacyEducationerityisopiskelijat03 medical and health sciencesOriginalityaceptabilidadEnsenyament universitariHigher educationsähköinen tunnistaminendatos personaleslcsh:Special aspects of educationbusiness.industryEducational technologyestudiantes con necesidades educativas especiales y discapacidadesautenticació electrònicahenkilötiedotkorkeakouluopiskeluKey (cryptography)Enseñanza universitariaComputerized adaptive testingbusiness0503 educationestudiants amb necessitats educatives especials i discapacitats
researchProduct

Developing E-Authentication for E-Assessment : Diversity of Students Testing the System in Higher Education

2020

Sähköinen tunnistautuminen on yksi keskeisistä teemoista verkko-opetuksessa, -opiskelussa ja - arvioinnissa. Tämän tutkimuksen tarkoituksena oli tutkia opiskeluunsa erityistä tukea tarvitsevien yliopisto-opiskelijoiden käyttökokemuksia kehitteillä olevasta sähköisestä tunnistautumisjärjestelmästä. Erityistä huomiota kehittämistyössä kiinnitettiin tunnistautumisen saavutettavuuteen. Kaikkiaan 15 opiskelijaa testasi TeSLA-projektin osana kehitettyä tunnistautumisjärjestelmää, johon kuului kasvojentunnistus, äänentunnistus, näppäilyntunnistus, tekstityylianalyysi ja plagioinnin tunnistus. Opiskelijat täyttivät esi- ja jälkikyselylomakkeet sekä osallistuivat henkilökohtaisiin haastatteluihin. T…

030506 rehabilitationerilaiset oppijatHigher educationmedia_common.quotation_subjectInternet privacykorkeakouluopetus03 medical and health sciencesspecial educational needs and disabilities (SEND)ComputingMilieux_COMPUTERSANDEDUCATIONsähköinen tunnistaminenverkko-opetuse-assessmentmedia_commonbusiness.industry4. Education05 social sciences050301 educationTeSLA systemverkko-oppiminenAuthentication (law)accessibilityE-assessmentsaavutettavuuse-authenticationhigher educationkäyttäjäkokemus0305 other medical sciencePsychologybusiness0503 educationDiversity (politics)
researchProduct

One confession, multiple chronotopes: The interdiscursive authentication of an apology in an international criminal trial

2020

060201 languages & linguisticsLinguistics and Language060101 anthropologySociology and Political ScienceCriminal trial06 humanities and the artsConfessionLanguage and LinguisticsAuthentication (law)PhilosophyHistory and Philosophy of ScienceLaw0602 languages and literature0601 history and archaeologySociologyChronotopeJournal of Sociolinguistics
researchProduct

A melanocortin 1 receptor (MC1R) gene polymorphism is useful for authentication of Massese sheep dairy products

2011

Massese is an Italian sheep breed, with black or grey coat colour, mainly reared in the Tuscany and Emilia Romagna regions. Recently, the emerging interests in this breed have resulted in the production of Pecorino cheese obtained with only Massese milk. In order to be profitable, this marketing link between Massese breed and its products should be defended against fraudsters who could include milk of other sheep breeds or cow milk in Massese labelled productions. To identify the genetic factors affecting coat colour in sheep, we have recently analysed the melanocortin 1 receptor (MC1R) gene and identified several single nucleotide polymorphisms (SNPs). In this work, as a first step to set …

AUTHENTICATION OF FOOD PRODUCTSCoatVeterinary medicineSNPFood ContaminationSingle-nucleotide polymorphismBiologyPolymerase Chain ReactionPolymorphism Single NucleotideSensitivity and SpecificityMASSESECow milkSettore AGR/17 - Zootecnica Generale E Miglioramento GeneticoGene FrequencySpecies SpecificityCheesePolymorphism (computer science)MC1RAnimalsAlleleGeneticsSheepfood and beveragesDNAGeneral MedicineBreedMilkFemaleAnimal Science and ZoologyDairy Productsauthentication Massese MC1R mono-breed products sheep breeds SNPReceptor Melanocortin Type 1DAIRY SHEEPPolymorphism Restriction Fragment LengthMc1r geneFood ScienceMelanocortin 1 receptor
researchProduct

Archaeometric Study of Two Tanagra Type Statuettes of Unknown Provenance to Support Forensic Study

2022

This paper is concerned with a morphological-stylistic and archaeometric study of two small pottery statues, confiscated by the Cosenza Carabinieri Unit for the Protection of Cultural Heritage and Anti-Counterfeiting (Calabria, Italy). The research aimed to establish the authenticity of the artworks and to verify a possible origin from the same workshop manufacturing, by providing indications about the textural features and raw materials used for their production. For these purposes, the analytical approach involved the use of minero-petrographic and physical analysis, as follows: petrographic analysis (OM), X-ray diffraction (XRD) and thermoluminescence tests (TL). The preliminary observat…

Archeologyauthentication cultural heritage illicit traffic pottery Tanagra type votive coroplasticMaterials Science (miscellaneous)Conservationauthentication; cultural heritage; illicit traffic; pottery; votive coroplastic; Tanagra typeSettore GEO/09 -Georis. Miner.e Appl.Mineral.-Petrogr. per l'Ambi.ed i B.Cult.Heritage; Volume 5; Issue 2; Pages: 849-859
researchProduct

Authentication of phacelia honeys (Phacelia tanacetifolia) based on a combination of HPLC and HPTLC analyses as well as spectrophotometric measuremen…

2019

Abstract The growing interest in the quality of honey affects customer preferences and consumption trends. Generally, monofloral honeys are more expensive than multifloral honeys, and the price strictly depends on its botanical origin. The increasing popularity of a variety of monofloral brands has led to the increasing number of adulterations and therefore for the need to develop new analytical methods for assessing honey authenticity. The purpose of the present study was to develop a method for the authentication of phacelia honeys on the basis of HPLC and HPTLC analyses and spectrophotometry. The results obtained by spectrophotometric analysis indicated significant differences only betwe…

Authentication of monofloral honeysbiologyHigh-performance thin-layer chromatographyPhacelia honeyContext (language use)biology.organism_classificationmedicine.disease_causeHigh-performance liquid chromatographyHoney samplesPhenolic compoundsHigh-performance liquid chromatographyPhacelia tanacetifoliaPhaceliaPollenmedicineFood scienceFood ScienceMathematicsLWT
researchProduct

Fingerprint Quality Evaluation in a Novel Embedded Authentication System for Mobile Users

2015

The way people access resources, data and services, is radically changing using modern mobile technologies. In this scenario, biometry is a good solution for security issues even if its performance is influenced by the acquired data quality. In this paper, a novel embedded automatic fingerprint authentication system (AFAS) for mobile users is described. The goal of the proposed system is to improve the performance of a standard embedded AFAS in order to enable its employment in mobile devices architectures. The system is focused on the quality evaluation of the raw acquired fingerprint, identifying areas of poor quality. Using this approach, no image enhancement process is needed after the …

AuthenticationArticle SubjectComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subjectFingerprint (computing)Real-time computingFingerprint Verification CompetitionComputer Science Applications1707 Computer Vision and Pattern RecognitionTK5101-6720Fingerprint recognitionComputer Science ApplicationsComputer Networks and CommunicationEmbedded systemData qualityTelecommunicationMobile technologyQuality (business)businessMobile devicemedia_commonMobile Information Systems
researchProduct