Search results for "Authentic"

showing 10 items of 203 documents

Privacy Enhanced Device Access

2012

In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a pseudo-random temporary identity scheme to provide user privacy.

Service (business)AuthenticationIntegrated access deviceComputer scienceAuthentication protocolNetwork Access DeviceNetwork block deviceCryptographic protocolComputer securitycomputer.software_genreProtocol (object-oriented programming)computer
researchProduct

A privacy enhanced device access protocol for an IoT context

2013

In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.

Service (business)Challenge-Handshake Authentication ProtocolAuthenticationComputer Networks and CommunicationsComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer securitycomputer.software_genreAuthentication protocol0202 electrical engineering electronic engineering information engineeringIdentity (object-oriented programming)020201 artificial intelligence & image processingKey derivation functionProtocol (object-oriented programming)computerInformation SystemsSecurity and Communication Networks
researchProduct

Trust management in tactical coalition software defined networks

2018

This paper reports from ongoing efforts related to trust management in tactical Software Defined Networks (SDN) when used with mobile nodes in a coalition operation. We analyze the problem space and suggests a set of security and contructional requirements, as well as an analysis on how existing technology may contribute to a solution. The proposed architecture serves as a guide for current and future experimentation on trust management and protection in SDN. The paper also reports from experimental investigations into the utility of these technology elements for the present purpose.

Set (abstract data type)AuthenticationComputer scienceTrust management (information system)ArchitectureSoftware-defined networkingComputer securitycomputer.software_genrecomputerProblem space2018 International Conference on Military Communications and Information Systems (ICMCIS)
researchProduct

Analysis of Illumina BovineSNP50 BeadChip data in different Italian cattle breeds to identify useful markers for breed authentication of dairy and be…

2013

The identification of the breed of origin of cattle derived products has recently assumed particular relevance since the increasing interest in marketing mono-breed labelled cheese and beef. These products are usually sold at a higher price creating financial incentives to substituting them with lower value products coming from undifferentiated or common breeds or crossbred animals. Frauds can damage these valuable niche markets that, indirectly, may help to preserve genetic diversity through the economic incentive on raising local breeds, derived by the high value products, that are usually less productive. DNA analysis can help to identify fraudulent behaviour as we already demonstrated f…

Settore AGR/17 - Zootecnica Generale E Miglioramento GeneticobreedcattleSNP genotyping Italian cattle breeds authentication dairy and beef productsSNP
researchProduct

Fingerprint Traits and RSA Algorithm Fusion Technique

2012

The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smart card to overcome the security problems of centralized databases. Biometric information is then used f…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationBiometricsbusiness.industryComputer scienceData_MISCELLANEOUSPublic key infrastructureFingerprint recognitionComputer securitycomputer.software_genreEncryptionPublic-key cryptographyIdentifierFingerprint biometric and encryption algorithm fusion asymetric encryption tecniqueSmart cardbusinessAlgorithmcomputer
researchProduct

A Novel Recruitment Policy to Defend against Sybils in Vehicular Crowdsourcing

2021

Vehicular Social Networks (VSNs) is an emerging communication paradigm, derived by merging the concepts of Online Social Networks (OSNs) and Vehicular Ad-hoc Networks (VANETs). Due to the lack of robust authentication mechanisms, social-based vehicular applications are vulnerable to numerous attacks including the generation of sybil entities in the networks. We address this important issue in vehicular crowdsourcing campaigns where sybils are usually employed to increase their influence and worsen the functioning of the system. In particular, we propose a novel User Recruitment Policy (URP) that, after extracting the participants within the event radius of a crowdsourcing campaign, detects …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationEvent (computing)business.industryComputer sciencecomputer.internet_protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCrowdsourcingComputer securitycomputer.software_genreDomain (software engineering)Random forestCrowdsourcing; Proximity Graph; Sybil detection; Trust and Truthfulness; Vehicular Social NetworkCrowdsourcing Proximity Graph Sybil detection Trust and Truthfulness Vehicular Social NetworkGraph (abstract data type)RADIUSbusinesscomputer
researchProduct

An embedded iris recognizer for portable and mobile devices

2010

Software-intensive systems play an increasingly dominant role in our lives and daily activities. Several applications, in which a timely response to user and environment stimulus is essential, require real-time software intensive systems. Computation-intensive applications, such as video compression, control systems, security systems, result in significant growth for processor workload. To address the above issues, one possible solution is to design embedded specialized components. At the same time, the integration of new features in portable and mobile devices is rapidly increasing. Several services and applications require robust user authentication for access to services, data, and resou…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniEmbedded Software Intensive Systems Real-Time Embedded Systems Iris-based Authentication Systems FPGA Technologies
researchProduct

A Multimodal Technique for an Embedded Fingerprint Recognizer in Mobile Payment Systems

2009

The development and the diffusion of distributed systems, directly connected to recent communication technologies, move people towards the era of mobile and ubiquitous systems. Distributed systems make merchant-customer relationships closer and more flexible, using reliable e-commerce technologies. These systems and environments need many distributed access points, for the creation and management of secure identities and for the secure recognition of users. Traditionally, these access points can be made possible by a software system with a main central server. This work proposes the study and implementation of a multimodal technique, based on biometric information, for identity management a…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMinutiaeAuthenticationUbiquitous authentication multimodal systems mobile payment systems biometric techniques and embedded systemsBiometricsComputer Networks and Communicationsbusiness.industryComputer scienceFingerprint (computing)Process (computing)TK5101-6720Identity managementComputer Science ApplicationsEmbedded systemTelecommunicationMobile paymentSoftware systembusinessComputer networkMobile Information Systems
researchProduct

Multi-modal biometric authentication systems

2010

The main goal of a biometric system is to discriminate automatically subjects in a reliable and dependable way, accordingly to a specific target application. The discrimination is based on one or more types of information derived from physical or behavioural traits, such as fingerprint, face, iris, voice, hand, or signature. Applications of biometrics range from homeland security and border control to e-commerce and e-banking, including secure networking and authentication. Traditionally, biometric systems working on a single biometric feature, have many limitations, such as, trouble with data sensors, where captured sensor data are often affected by noise, distinctiveness ability, because …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMulti-modal systems biometric authentication user recognition
researchProduct

An extended JADE-S based framework for developing secure Multi-Agent Systems

2009

Agent communities are self-organized virtual spaces consisting of a large number of agents and their dynamic environments. Within a community, agents group together offering special e-services for effective, reliable, and mutual benefits. Usually, an agent community is composed of specialized agents performing one or more tasks in a single domain/sub-domain, or in highly intersecting domains. However, secure Multi- Agent Systems require severe mechanisms in order to prevent malicious attacks. Several limits affect exiting secure agents platform, such as the lack of a strong authentication system, the lack of a flexible distributed mechanism for access control and the lack of a system for st…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniService (systems architecture)AuthenticationPublic key certificateComputer sciencebusiness.industryMulti-agent systemmedia_common.quotation_subjectJADE (programming language)Access controlMulti-Agent Systems Security Biometric Authentication SystemsComputer securitycomputer.software_genreHardware and ArchitectureStrong authenticationbusinessLawcomputerSoftwareComputer networkReputationmedia_commoncomputer.programming_languageComputer Standards & Interfaces
researchProduct