Search results for "AUTHENTICATION"
showing 10 items of 108 documents
An Embedded Biometric Sensor for Ubiquitous Authentication
2013
Communication networks and distributed technologies move people towards the era of ubiquitous computing. An ubiquitous environment needs many authentication sensors for users recognition, in order to provide a secure infrastructure for both user access to resources and services and information management. Today the security requirements must ensure secure and trusted user information to protect sensitive data resource access and they could be used for user traceability inside the platform. Conventional authentication systems, based on username and password, are in crisis since they are not able to guarantee a suitable security level for several applications. Biometric authentication systems…
Development of a high performance thin layer chromatography method for the rapid qualification and quantification of phenolic compounds and abscisic …
2019
Honey is a natural product with a complex chemical composition consisting of sugars and other bioactive compounds. It is important in many traditional systems of medicine, exhibiting interesting bioactivities, in particular antimicrobial, anti-inflammatory and antioxidant effects. Authentication of botanical origin of honeys is particularly important in this context. Therefore, methods for quality control of honey and detection of its adulteration are very important. A HPTLC method for the quantitative determination of phenolic compounds in honey was developed for the first time. Seven phenolic compounds were detected and determined quantitatively in lime and acacia honey samples. The obtai…
A Dynamic Attribute-Based Authentication Scheme
2015
Attribute-based authentication (ABA) is an approach to authenticate users by their attributes, so that users can get authenticated anonymously and their privacy can be protected. In ABA schemes, required attributes are represented by attribute trees, which can be combined with signature schemes to construct ABA schemes. Most attribute trees are built from top to down and can not change with attribute requirement changes. In this paper, we propose an ABA scheme based on down-to-top built attribute trees or dynamic attribute trees, which can change when attribute requirements change. Therefore, the proposed dynamic ABA scheme is more efficient in a dynamic environment by avoiding regenerating…
An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees
2015
Attribute-based authentication (ABA) is a way to authenticate signers by means of attributes and it requests proof of possessing required attributes from the one to be authenticated. To achieve the property of traceability, required attributes should be combined with the signer’s attribute private keys in order to generate a signature. In some schemes, signers’ attribute keys are related to attribute trees, so changing attribute trees will cause the regeneration of all related attribute keys. In this paper, we propose an efficient traceable ABA scheme, where the generation of signers’ attribute keys is independent from attribute trees. Thus the same set of attribute keys can be used with a …
Privacy Enhanced Device Access
2012
In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a pseudo-random temporary identity scheme to provide user privacy.
A privacy enhanced device access protocol for an IoT context
2013
In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.
Trust management in tactical coalition software defined networks
2018
This paper reports from ongoing efforts related to trust management in tactical Software Defined Networks (SDN) when used with mobile nodes in a coalition operation. We analyze the problem space and suggests a set of security and contructional requirements, as well as an analysis on how existing technology may contribute to a solution. The proposed architecture serves as a guide for current and future experimentation on trust management and protection in SDN. The paper also reports from experimental investigations into the utility of these technology elements for the present purpose.
Analysis of Illumina BovineSNP50 BeadChip data in different Italian cattle breeds to identify useful markers for breed authentication of dairy and be…
2013
The identification of the breed of origin of cattle derived products has recently assumed particular relevance since the increasing interest in marketing mono-breed labelled cheese and beef. These products are usually sold at a higher price creating financial incentives to substituting them with lower value products coming from undifferentiated or common breeds or crossbred animals. Frauds can damage these valuable niche markets that, indirectly, may help to preserve genetic diversity through the economic incentive on raising local breeds, derived by the high value products, that are usually less productive. DNA analysis can help to identify fraudulent behaviour as we already demonstrated f…
Fingerprint Traits and RSA Algorithm Fusion Technique
2012
The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smart card to overcome the security problems of centralized databases. Biometric information is then used f…
A Novel Recruitment Policy to Defend against Sybils in Vehicular Crowdsourcing
2021
Vehicular Social Networks (VSNs) is an emerging communication paradigm, derived by merging the concepts of Online Social Networks (OSNs) and Vehicular Ad-hoc Networks (VANETs). Due to the lack of robust authentication mechanisms, social-based vehicular applications are vulnerable to numerous attacks including the generation of sybil entities in the networks. We address this important issue in vehicular crowdsourcing campaigns where sybils are usually employed to increase their influence and worsen the functioning of the system. In particular, we propose a novel User Recruitment Policy (URP) that, after extracting the participants within the event radius of a crowdsourcing campaign, detects …