Search results for "AUTHENTICATION"

showing 10 items of 108 documents

A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

2017

International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer scienceWireless ad hoc networklocation privacy02 engineering and technologysecurityPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineeringpseudonym changing0202 electrical engineering electronic engineering information engineeringVANETsElectrical and Electronic EngineeringAuthenticationVehicular ad hoc networksAuthenticationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineeringRoadsSoftware deploymentPrivacyInitial phaseComputingMilieux_COMPUTERSANDSOCIETYSafetycomputerCryptography and Security (cs.CR)
researchProduct

A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud

2020

Healthcare data in cloud computing facilitates the treatment of patients efficiently by sharing information about personal health data between the healthcare providers for medical consultation. Furthermore, retaining the confidentiality of data and patients' identity is a another challenging task. This paper presents the concept of an access control-based (AC) privacy preservation model for the mutual authentication of users and data owners in the proposed digital system. The proposed model offers a high-security guarantee and high efficiency. The proposed digital system consists of four different entities, user, data owner, cloud server, and key generation center (KGC). This approach makes…

FOS: Computer and information sciencesKey generationComputer Science - Cryptography and Security020205 medical informaticsbusiness.industryComputer science020206 networking & telecommunicationsAccess controlCloud computing02 engineering and technologyMutual authenticationEncryptionPublic-key cryptographyData sharingComputer Science - Computers and SocietyComputers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringSession keybusinessCryptography and Security (cs.CR)Computer network2020 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

Usability analysis of a novel biometric authentication approach for android-based mobile devices

2014

Mobile devices are widely replacing the standard personal computers thanks to their small size and user-friendly use. As a consequence, the amount of information, often confidential, exchanged through these devices is raising. This makes them potential targets of malicious network hackers. The use of simple passwords or PIN are not sufficient to provide a suitable security level for those applications requiring high protection levels on data and services. In this paper a biometric authentication system, as a running Android application, has been developed and implemented on a real mobile device. A system test on real users has been also carried out in order to evaluate the human-machine int…

Fingerprints authenticationOperating systemComputer Networks and CommunicationMobile device securityUsabilityElectrical and Electronic Engineering
researchProduct

Authentication of berries and berry-based food products.

2021

Abstract Berries represent one of the most important and high-valued group of modern-day health-beneficial “superfoods” whose dietary consumption has been recognized to be beneficial for human health for a long time. In addition to being delicious, berries are rich in nutrients, vitamins, and several bioactive compounds, including carotenoids, flavonoids, phenolic acids, and hydrolysable tannins. However, due to their high value, berries and berry-based products are often subject to fraudulent adulteration, commonly for economical gain, but also unintentionally due to misidentification of species. Deliberate adulteration often comprises the substitution of high-value berries with lower valu…

FlavonoidsberriesspectroscopyBerryfood authenticationAuthentication (law)DietHuman healthFood productsFruitchromatographyHumansDNA barcodingBusinessFood scienceFood ScienceComprehensive reviews in food science and food safetyREFERENCES
researchProduct

Chromatographic fingerprint of the volatile fraction of rare Hedera helix honey and biomarkers identification

2018

Hedera helix (Irish ivy) honey is a very rare food product used in Ireland. The composition of the volatile fraction of this unique honey was studied for the first time using three different extraction procedures (SPE, USE and HS–SPME) and analyzed with gas chromatography and mass spectrometry. As expected, the use of combined techniques resulted in the identification of the detailed composition of honey volatiles. Identified constitutes belongs to the different chemical classes. The presence of 4(1H)-quinolinone, myrtenal and phenylacetonitrile was proposed as biomarkers of the botanical origin of ivy honey. Moreover, they are not widely widespread among honeys of different botanical origi…

Fraction (chemistry)Mass spectrometry01 natural sciencesBiochemistryIndustrial and Manufacturing EngineeringHPTLC0404 agricultural biotechnologyHedera helixhoney volatilesBiochemical markersChromatographyHS–SPMEbiologyChemistry010401 analytical chemistry04 agricultural and veterinary sciencesGeneral Chemistrybiology.organism_classification040401 food science0104 chemical scienceshoney authenticationivy honeyFood productsChromatographic fingerprintGas chromatographyFood ScienceBiotechnologyEuropean Food Research and Technology
researchProduct

GPRS Security for Smart Meters

2013

Part 1: Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Information Systems (CD-ARES 2013); International audience; Many Smart Grid installations rely on General Packet Radio Service (GPRS) for wireless communication in Advanced Metering Infrastructures (AMI). In this paper we describe security functions available in GPRS, explaining authentication and encryption options, and evaluate how suitable it is for use in a Smart Grid environment. We conclude that suitability of GPRS depends on the chosen authentication and encryption functions, and on selecting a reliable and trustworthy mobile network operator.

GPRSComputer science[SHS.INFO]Humanities and Social Sciences/Library and information sciences02 engineering and technology[INFO] Computer Science [cs]Encryption[SHS.INFO] Humanities and Social Sciences/Library and information sciencesGPRS core networkAMI0202 electrical engineering electronic engineering information engineeringWirelessMetering mode[INFO]Computer Science [cs]General Packet Radio ServiceSmartgridMobile network operatorAuthenticationbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineering020206 networking & telecommunicationsSmart gridSecuritybusinessSmart MeteringComputer network
researchProduct

QoS Mechanisms for IEEE 802.11 Wireless LANs

2004

Currently the Internet provides users with access to information across the world using IP technology. Until now most access points to the Internet have been fixed stations at given locations, but with increasing sales of mobile devices, mobility has become a major trend. Therefore, the Internet is becoming more and more heterogeneous due to the recent explosion of wireless networks. The IEEE 802.11 wireless LAN (WLAN) is the most widely used WLAN standard nowadays. Currently the IEEE 802.11 standard specifies an over-the-air interface between wireless devices. However, QoS services over this technology are still being defined aiming to provide support to multiple applications. Thus, a larg…

IEEE 802.11uWi-Fi arrayComputer scienceInter-Access Point ProtocolMobile computinglaw.inventionIEEE 802.11lawWireless lanInternet ProtocolWirelessFixed wirelessIEEE 802.11sbusiness.industryWireless networkQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWireless Multimedia ExtensionsTelecommunications networkWLAN Authentication and Privacy InfrastructureWireless site surveyThe InternetIEEE 802.11e-2005businessTelecommunicationsMobile deviceNeuRFonComputer network
researchProduct

Basic Chemometric Tools

2013

Abstract The authentication of protected designation of origin and other protected geographical indications for foods involves the need for a deep knowledge of these kinds of samples and the correct identification of appropriate markers that are suitable to be used for authentication purposes. For this, significance tests must be developed and applied to provide evidence in a fast and accurate way; from this, it seems clear that advances in analytical tools, to obtain data regarding food chemical composition, and chemometric data treatments must be continued to provide to the users powerful identification methodologies. In this sense, the objective must be to differentiate between foods pro…

Identification (information)business.industryComputer sciencePrincipal component analysisDeep knowledgeArtificial intelligencebusinessMachine learningcomputer.software_genrecomputerAuthentication (law)Hierarchical clustering
researchProduct

Constraints validation in privacy-preserving attribute-based access control

2015

Attribute-Based Access Control (ABAC) has been found to be extremely useful and flexible and has drawn a lot of research in recent years. It was observed that in the context of new emerging applications, attributes play an increasingly important role both in defining and enforcing more elaborated and flexible security policies. Recently, NIST has proposed more formal definition of ABAC. In this paper we discuss a general privacy-preserving ABAC model (which combines both authentication and authorization) and propose an approach to handle constraints in such privacy preserving setting.

Information privacyAuthenticationComputer access controlComputer sciencebusiness.industryContext (language use)Access controlSecurity policyComputer securitycomputer.software_genrePrivacy preservingNISTbusinesscomputer2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

Access Security and Personal Privacy in Public Cellular Communication Systems: The Past, the Present and Beyond 2020

2010

In order to predict the future one needs to understand the past and then interpolate as best as possible. We expect this to work reasonably well for a “2020 Scenario”, but we do not expect this approach to be valid for a “Beyond 2020” scenario.

Information privacyWork (electrical)Security serviceOrder (exchange)business.industryPolitical scienceInternet privacyMessage authentication codeCellular communication systemsComputer securitycomputer.software_genrebusinesscomputer
researchProduct