Search results for "AUTHENTICATION"

showing 10 items of 108 documents

An Embedded Biometric Sensor for Ubiquitous Authentication

2013

Communication networks and distributed technologies move people towards the era of ubiquitous computing. An ubiquitous environment needs many authentication sensors for users recognition, in order to provide a secure infrastructure for both user access to resources and services and information management. Today the security requirements must ensure secure and trusted user information to protect sensitive data resource access and they could be used for user traceability inside the platform. Conventional authentication systems, based on username and password, are in crisis since they are not able to guarantee a suitable security level for several applications. Biometric authentication systems…

PasswordInformation managementUser informationSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationEngineeringUbiquitous computingBiometricsTraceabilitybusiness.industry FPGA rapid prototypingBiometric identity managementFingerprintSelf-contained sensorUbiquitous authenticationIdentity managementEmbedded systembusinessEmbedded system
researchProduct

Development of a high performance thin layer chromatography method for the rapid qualification and quantification of phenolic compounds and abscisic …

2019

Honey is a natural product with a complex chemical composition consisting of sugars and other bioactive compounds. It is important in many traditional systems of medicine, exhibiting interesting bioactivities, in particular antimicrobial, anti-inflammatory and antioxidant effects. Authentication of botanical origin of honeys is particularly important in this context. Therefore, methods for quality control of honey and detection of its adulteration are very important. A HPTLC method for the quantitative determination of phenolic compounds in honey was developed for the first time. Seven phenolic compounds were detected and determined quantitatively in lime and acacia honey samples. The obtai…

Quality ControlAuthentication of monofloral honeysanimal structuresAcaciaContext (language use)engineering.material010402 general chemistry01 natural sciencesBiochemistryAntioxidantsAnalytical Chemistrychemistry.chemical_compoundPhenolsHigh performance thin layer chromatographyAbscisic acidLimeNatural productChromatographybiologyChromatographic fingerprintsOptimization of chromatographic conditionsHigh-performance thin-layer chromatographydigestive oral and skin physiologyfungi010401 analytical chemistryOrganic Chemistryfood and beveragesHoneyGeneral MedicineAntimicrobialbiology.organism_classificationPhenolic compoundsThin-layer chromatography0104 chemical scienceschemistrybehavior and behavior mechanismsengineeringChromatography Thin LayerFood AnalysisAbscisic AcidJournal of Chromatography A
researchProduct

A Dynamic Attribute-Based Authentication Scheme

2015

Attribute-based authentication (ABA) is an approach to authenticate users by their attributes, so that users can get authenticated anonymously and their privacy can be protected. In ABA schemes, required attributes are represented by attribute trees, which can be combined with signature schemes to construct ABA schemes. Most attribute trees are built from top to down and can not change with attribute requirement changes. In this paper, we propose an ABA scheme based on down-to-top built attribute trees or dynamic attribute trees, which can change when attribute requirements change. Therefore, the proposed dynamic ABA scheme is more efficient in a dynamic environment by avoiding regenerating…

Scheme (programming language)AuthenticationComputer scienceComputerApplications_COMPUTERSINOTHERSYSTEMSConstruct (python library)computer.software_genreSignature (logic)Authentication protocolLightweight Extensible Authentication ProtocolData miningChallenge–response authenticationcomputerData Authentication Algorithmcomputer.programming_language
researchProduct

An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees

2015

Attribute-based authentication (ABA) is a way to authenticate signers by means of attributes and it requests proof of possessing required attributes from the one to be authenticated. To achieve the property of traceability, required attributes should be combined with the signer’s attribute private keys in order to generate a signature. In some schemes, signers’ attribute keys are related to attribute trees, so changing attribute trees will cause the regeneration of all related attribute keys. In this paper, we propose an efficient traceable ABA scheme, where the generation of signers’ attribute keys is independent from attribute trees. Thus the same set of attribute keys can be used with a …

Scheme (programming language)AuthenticationProperty (philosophy)Theoretical computer scienceTraceabilityDatabaseComputer scienceAuthentication schemecomputer.software_genreSignature (logic)Set (abstract data type)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSAttribute treecomputercomputer.programming_language
researchProduct

Privacy Enhanced Device Access

2012

In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a pseudo-random temporary identity scheme to provide user privacy.

Service (business)AuthenticationIntegrated access deviceComputer scienceAuthentication protocolNetwork Access DeviceNetwork block deviceCryptographic protocolComputer securitycomputer.software_genreProtocol (object-oriented programming)computer
researchProduct

A privacy enhanced device access protocol for an IoT context

2013

In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.

Service (business)Challenge-Handshake Authentication ProtocolAuthenticationComputer Networks and CommunicationsComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer securitycomputer.software_genreAuthentication protocol0202 electrical engineering electronic engineering information engineeringIdentity (object-oriented programming)020201 artificial intelligence & image processingKey derivation functionProtocol (object-oriented programming)computerInformation SystemsSecurity and Communication Networks
researchProduct

Trust management in tactical coalition software defined networks

2018

This paper reports from ongoing efforts related to trust management in tactical Software Defined Networks (SDN) when used with mobile nodes in a coalition operation. We analyze the problem space and suggests a set of security and contructional requirements, as well as an analysis on how existing technology may contribute to a solution. The proposed architecture serves as a guide for current and future experimentation on trust management and protection in SDN. The paper also reports from experimental investigations into the utility of these technology elements for the present purpose.

Set (abstract data type)AuthenticationComputer scienceTrust management (information system)ArchitectureSoftware-defined networkingComputer securitycomputer.software_genrecomputerProblem space2018 International Conference on Military Communications and Information Systems (ICMCIS)
researchProduct

Analysis of Illumina BovineSNP50 BeadChip data in different Italian cattle breeds to identify useful markers for breed authentication of dairy and be…

2013

The identification of the breed of origin of cattle derived products has recently assumed particular relevance since the increasing interest in marketing mono-breed labelled cheese and beef. These products are usually sold at a higher price creating financial incentives to substituting them with lower value products coming from undifferentiated or common breeds or crossbred animals. Frauds can damage these valuable niche markets that, indirectly, may help to preserve genetic diversity through the economic incentive on raising local breeds, derived by the high value products, that are usually less productive. DNA analysis can help to identify fraudulent behaviour as we already demonstrated f…

Settore AGR/17 - Zootecnica Generale E Miglioramento GeneticobreedcattleSNP genotyping Italian cattle breeds authentication dairy and beef productsSNP
researchProduct

Fingerprint Traits and RSA Algorithm Fusion Technique

2012

The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smart card to overcome the security problems of centralized databases. Biometric information is then used f…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationBiometricsbusiness.industryComputer scienceData_MISCELLANEOUSPublic key infrastructureFingerprint recognitionComputer securitycomputer.software_genreEncryptionPublic-key cryptographyIdentifierFingerprint biometric and encryption algorithm fusion asymetric encryption tecniqueSmart cardbusinessAlgorithmcomputer
researchProduct

A Novel Recruitment Policy to Defend against Sybils in Vehicular Crowdsourcing

2021

Vehicular Social Networks (VSNs) is an emerging communication paradigm, derived by merging the concepts of Online Social Networks (OSNs) and Vehicular Ad-hoc Networks (VANETs). Due to the lack of robust authentication mechanisms, social-based vehicular applications are vulnerable to numerous attacks including the generation of sybil entities in the networks. We address this important issue in vehicular crowdsourcing campaigns where sybils are usually employed to increase their influence and worsen the functioning of the system. In particular, we propose a novel User Recruitment Policy (URP) that, after extracting the participants within the event radius of a crowdsourcing campaign, detects …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationEvent (computing)business.industryComputer sciencecomputer.internet_protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCrowdsourcingComputer securitycomputer.software_genreDomain (software engineering)Random forestCrowdsourcing; Proximity Graph; Sybil detection; Trust and Truthfulness; Vehicular Social NetworkCrowdsourcing Proximity Graph Sybil detection Trust and Truthfulness Vehicular Social NetworkGraph (abstract data type)RADIUSbusinesscomputer
researchProduct