Search results for "AUTHENTICATION"
showing 10 items of 108 documents
The Use of DNA Analysis in the Archaeology of Death and Burial
2013
Wpływ rozporządzenia eIDAS i nowej definicji dokumentu na praktyczne aspekty elektronicznego poświadczenia kopii dokumentu w znaczeniu znowelizowaneg…
2016
Article addresses the impact of elDAS regulation and the new definition of a document on practical aspects of authentication electronic copies of the document in regard to amended article 97 of Polish Notary Act. Author summarizes functions of document and comparizes definition between document in Polish Civil Code as well as electronic document in elDAS Regulation. The merits of the thesis is the analysis of electronic document authentication. Author expresses important issues in the field of electronic document authentication describing trusted services which may be of use in authentication.
An Initial Security Analysis of the Personal Transaction Protocol
2003
Our society is becoming increasingly dependent on the rapid access and processing of information. The number of handheld mobile devices with access to the Internet and network-based software and services is exploding. Research indicates [1] that by the end of 2002 there will be over 1 billion mobile phone owners globally with Internet access, and that this number is going to grow exponentially in the nearest future. By 2006 the number of interconnected mobile device users is expected exceed the worldwide Internet subscriber population. It is estimated that in a few years there will be three times as many of these devices worldwide as personal computers.
Old controversies and new data: assessing again the polychrome vases from Centuripe
2022
The necropolises of the hill town of Centuripe (EN) in Sicily have been looted since the nineteenth century for obtaining objects that were attractive for antiquities collectors, such as Hellenistic terracotta figurines and the brightly polychrome vases produced by local artisans (known as “Centuripe vases”) that today are scattered throughout a number of museums and private collections over the world. Until recent times, quite many vases have been considered doubtful and sometimes revealed as forgeries. Some “restorers” working in the dark circuit were able either to reproduce the shapes and decorations of ancient vases or to “refresh” their painted surfaces indeed: the interplay between g…
A general framework for group authentication and key exchange protocols
2014
Published version of a chapter in the book: Foundations and Practice of Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-05302-8_3 In this paper, we propose a novel framework for group authentication and key exchange protocols. There are three main advantages of our framework. First, it is a general one, where different cryptographic primitives can be used for different applications. Second, it works in a one-to-multiple mode, where a party can authenticate several parties mutually. Last, it can provide several security features, such as protection against passive adversaries and impersonate attacks, implicit key authentication, forward and backward securi…
Quality Control for Medicinal Plants
2012
The scientific basis of evidence-based medicine is still poor in herbal medicine. For the integration of herbal medicine into western medicine, internationally accepted standards are necessitated, including quality control of herbal products as well as preclinical and clinical evidence of safety and efficacy. In recent years, thriving innovative technologies emerged in phytotherapy research, e.g. DNA-based technologies for the authentication of plant species, good practice guidelines for standardized experimentations. High-quality herbal materials should undergo rigorous examination by analytical techniques for chemoprofiling of medicinal herbs, as well as toxicological methods to detect co…
The Light Side of Passwords : Turning Motivation from the Extrinsic to the Intrinsic
2019
There are many good and bad aspects to password authentication. They are mostly without cost, securing many accounts and systems, and allowing users access from anywhere in the world. However, passwords can elicit dark side phenomena, including security technostress; with many users feeling negatively towards them, as they struggle to cope with the sheer numbers required in their everyday lives. Much research has attempted to understand users’ interactions with passwords, examining the trade-off between security, memorability, user convenience, and suggesting techniques to manage them better. However, users continue to struggle. Many studies have shown that users are more concerned with goa…
Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education
2019
Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e-authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is to understand teaching staff' views regarding the use of e-authentication instruments and how they impact trust in e-assessment. This mixed-method study examines the concerns and practices of 108 teaching staff who used the TeSLA—Adaptive Trust-based e-Assessment System in six countries: the UK, Spain, the Netherlands, Bulgaria, Finland and Turkey.…
Enhancing the user authentication process with colour memory cues
2022
The authentication process is the first line of defence against potential impostors, and therefore is an important concern when protecting personal and organisational data. Although there are many options to authenticate digital users, passwords remain the most common authentication mechanism. However, with password numbers increasing, many users struggle with remembering multiple passwords, which affects their security behaviour. Previous researchers and practitioners have attempted to suggest ways to improve password memorability and security simultaneously. We introduce novel approach that utilises colour as a memory cue to increase password memorability and security. A longitudinal stud…
Remote Attestation of Software and Execution-Environment in Modern Machines
2015
The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…