Search results for "AUTHENTICATION"

showing 10 items of 108 documents

The Use of DNA Analysis in the Archaeology of Death and Burial

2013

chemistry.chemical_compound060101 anthropologyAncient DNA060102 archaeologychemistry0601 history and archaeology06 humanities and the artsBiologyArchaeologyDNA sequencingDNAAuthentication (law)
researchProduct

Wpływ rozporządzenia eIDAS i nowej definicji dokumentu na praktyczne aspekty elektronicznego poświadczenia kopii dokumentu w znaczeniu znowelizowaneg…

2016

Article addresses the impact of elDAS regulation and the new definition of a document on practical aspects of authentication electronic copies of the document in regard to amended article 97 of Polish Notary Act. Author summarizes functions of document and comparizes definition between document in Polish Civil Code as well as electronic document in elDAS Regulation. The merits of the thesis is the analysis of electronic document authentication. Author expresses important issues in the field of electronic document authentication describing trusted services which may be of use in authentication.

e-signaturepodpis elektronicznypoświadczenie dokumentuprawo notariatue-documenteIDASusługi zaufaniadokument elektronicznytrusted servicesdigital documentauthentication of documentnotary lawe-sealRejent
researchProduct

An Initial Security Analysis of the Personal Transaction Protocol

2003

Our society is becoming increasingly dependent on the rapid access and processing of information. The number of handheld mobile devices with access to the Internet and network-based software and services is exploding. Research indicates [1] that by the end of 2002 there will be over 1 billion mobile phone owners globally with Internet access, and that this number is going to grow exponentially in the nearest future. By 2006 the number of interconnected mobile device users is expected exceed the worldwide Internet subscriber population. It is estimated that in a few years there will be three times as many of these devices worldwide as personal computers.

education.field_of_studybusiness.product_categorybusiness.industryPopulationComputer securitycomputer.software_genreMobile phoneAuthentication protocolDistributed transactionInternet accessThe InternetBusinesseducationMobile deviceDatabase transactioncomputer
researchProduct

Old controversies and new data: assessing again the polychrome vases from Centuripe

2022

The necropolises of the hill town of Centuripe (EN) in Sicily have been looted since the nineteenth century for obtaining objects that were attractive for antiquities collectors, such as Hellenistic terracotta figurines and the brightly polychrome vases produced by local artisans (known as “Centuripe vases”) that today are scattered throughout a number of museums and private collections over the world. Until recent times, quite many vases have been considered doubtful and sometimes revealed as forgeries. Some “restorers” working in the dark circuit were able either to reproduce the shapes and decorations of ancient vases or to “refresh” their painted surfaces indeed: the interplay between g…

forgerierestorationCenturipe vaseauthenticationiconographySettore L-ANT/07 - Archeologia Classica
researchProduct

A general framework for group authentication and key exchange protocols

2014

Published version of a chapter in the book: Foundations and Practice of Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-05302-8_3 In this paper, we propose a novel framework for group authentication and key exchange protocols. There are three main advantages of our framework. First, it is a general one, where different cryptographic primitives can be used for different applications. Second, it works in a one-to-multiple mode, where a party can authenticate several parties mutually. Last, it can provide several security features, such as protection against passive adversaries and impersonate attacks, implicit key authentication, forward and backward securi…

group authenticationAuthenticationPost-quantum cryptographyelliptic curve discrete logarithm problemCryptographic primitivediscrete logarithm problembusiness.industryVDP::Technology: 500::Information and communication technology: 550Computer securitycomputer.software_genreKey authenticationDiffie–Hellman key exchangePublic-key cryptographyDiffie-Hellman key exchangebusinesscomputerKey exchangeElGamal encryptionMathematics
researchProduct

Quality Control for Medicinal Plants

2012

The scientific basis of evidence-based medicine is still poor in herbal medicine. For the integration of herbal medicine into western medicine, internationally accepted standards are necessitated, including quality control of herbal products as well as preclinical and clinical evidence of safety and efficacy. In recent years, thriving innovative technologies emerged in phytotherapy research, e.g. DNA-based technologies for the authentication of plant species, good practice guidelines for standardized experimentations. High-quality herbal materials should undergo rigorous examination by analytical techniques for chemoprofiling of medicinal herbs, as well as toxicological methods to detect co…

medicine.medical_specialtyTraditional medicinebusiness.industrymedia_common.quotation_subjectAlternative medicinecomplex mixturesAuthentication (law)law.inventionClinical triallawThrivingmedicineMedicinal herbsQuality (business)Medicinal plantsPhytotherapybusinessmedia_commonMedicinal & Aromatic Plants
researchProduct

The Light Side of Passwords : Turning Motivation from the Extrinsic to the Intrinsic

2019

There are many good and bad aspects to password authentication. They are mostly without cost, securing many accounts and systems, and allowing users access from anywhere in the world. However, passwords can elicit dark side phenomena, including security technostress; with many users feeling negatively towards them, as they struggle to cope with the sheer numbers required in their everyday lives. Much research has attempted to understand users’ interactions with passwords, examining the trade-off between security, memorability, user convenience, and suggesting techniques to manage them better. However, users continue to struggle. Many studies have shown that users are more concerned with goa…

memoryComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSmotivationtodentaminenmnemonicsauthenticationmemory trainingmuistaminentietoturvasalasanatmuistitekniikatpasswordsmuisti (kognitio)
researchProduct

Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education

2019

Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e-authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is to understand teaching staff' views regarding the use of e-authentication instruments and how they impact trust in e-assessment. This mixed-method study examines the concerns and practices of 108 teaching staff who used the TeSLA—Adaptive Trust-based e-Assessment System in six countries: the UK, Spain, the Netherlands, Bulgaria, Finland and Turkey.…

pedagogical approachessähköinen arviointiresponsible research and innovationeducación superiorhenkilöllisyysauthorship verificationverificación de autoríae-assessmentidentitytekijyysAuditor's reportAuthentication4. Education05 social scienceseducació superior050301 educationelectronic authenticationPublic relationsAuthentication (law)Autentificación de documentosverifiointitodentaminenhigher educatione-authenticationThe InternetPsychologyautenticación electrónica050101 languages & linguisticsplagiointiHigher educationBest practiceCheatingData securityautenticacióEducationautenticación0501 psychology and cognitive sciencestietoturvaauthorshipcheating detectionbusiness.industrytrustInformation securityautenticació electrònicae-arviointiAutenticació de documentsverificació de l'autoriabusiness0503 educationarviointi
researchProduct

Enhancing the user authentication process with colour memory cues

2022

The authentication process is the first line of defence against potential impostors, and therefore is an important concern when protecting personal and organisational data. Although there are many options to authenticate digital users, passwords remain the most common authentication mechanism. However, with password numbers increasing, many users struggle with remembering multiple passwords, which affects their security behaviour. Previous researchers and practitioners have attempted to suggest ways to improve password memorability and security simultaneously. We introduce novel approach that utilises colour as a memory cue to increase password memorability and security. A longitudinal stud…

security behaviourcolourpassword memorabilityväri (ominaisuudet)General Social Sciencessalasanatcolour preferenceHuman-Computer InteractiontodentaminenArts and Humanities (miscellaneous)Developmental and Educational Psychologyauthenticationmuistaminentietoturvamuistitekniikatmemory cuesBehaviour & Information Technology
researchProduct

Remote Attestation of Software and Execution-Environment in Modern Machines

2015

The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…

ta113AuthenticationMulti-core processorNetwork securitybusiness.industryComputer sciencesoftwaremedia_common.quotation_subjectDistributed computingTrusted ComputingCertaintyComputer securitycomputer.software_genreVirtualizationVariety (cybernetics)remote attestationSoftwarenetwork securitybusinesscomputermedia_commonexecution-environment
researchProduct