Search results for "Authentic"
showing 10 items of 203 documents
A User-Friendly Interface for Fingerprint Recognition Systems Based on Natural Language Processing
2009
Biometric recognition systems represent a valid solution to the safety problem of internet accessibility, even if they do not always provide an environment easily comprehensible by users and operators with a mid-level of competence. This gap can be partially filled if, instead of using the conventional access routines to the authentication system, the user could simply write to the system through the interface and using high level sentences and requests be able to use its own natural language to reach the intended goal. On the other hand, biometrics features are widely used for recognition and identification all over the world, generating large databases. In this paper a user-friendly inter…
Fingerprint and Iris based Authentication in Intercooperative Emerging e-Infrastructures
2013
E-infrastructures must support the development of heterogeneous applications for workstation network, for mobile and portable systems and devices. In this context and relating to all collaborative and pervasive computational technology a very important role is played by security and authentication systems, which represent the first step of the whole process. Biometric authentication systems represent a valid alternative to conventional authentication systems providing robust procedures for user authentication. On the other hand, Internet of Things involves a heterogeneous set of interacting devices to enable innovative global and local applications and services for users. In this chapter fi…
Fuzzy techniques for access and data management in home automation environments
2012
Home Automation Environments are characterized by the integration of electronic devices as well as by the performance of communication and control systems. Environment infrastructure has to meet several requirements including Quality of Service (QoS), safety, security, and energy saving. However, Home Automation deals with complex environments, so that advanced data management systems are required to meet the above constraints. Fuzzy Logic based techniques can be successful used to improve system performance management. This work proposes and describes the use and application of fuzzy rules on a two-tiered architecture integrating a biometric authentication module and communication real-tim…
Autenticità digitale. L’esperienza turistica aumentata di un sito UNESCO
2022
The article proposes a reflection on the topic of authenticity with reference to digital solutions developed for cultural heritage. After a brief theoretical review on digital authenticity, the article analyzes as a case study an application for mobile devices, which offers augmented reality content and digital reconstructions of spaces, monuments and activities of the Roman city of Tarraco (Tarragona), included by UNESCO in the World Heritage List. The research conducted according to a qualitative methodology returns evidence of the centrality of authenticity in the tourist experience and in the strategies aimed at fostering the attractiveness of places.
Progressive transmission of secured images with authentication using decompositions into monovariate functions
2014
International audience; We propose a progressive transmission approach of an image authenticated using an overlapping subimage that can be removed to restore the original image. Our approach is different from most visible water- marking approaches that allow one to later remove the watermark, because the mark is not directly introduced in the two-dimensional image space. Instead, it is rather applied to an equivalent monovariate representation of the image. Precisely, the approach is based on our progressive transmission approach that relies on a modified Kolmogorov spline network, and therefore inherits its advantages: resilience to packet losses during transmis- sion and support of hetero…
Data Communication Security of Advanced Metering Infrastructure in Smart Grid
2013
Advanced Metering Infrastructure (AMI) is very critical part for wired/wireless communication in Smart Grid. It involves communication of vital smart metering data to central control center for smooth functioning of smart grid. Security and reliability of data is of paramount importance for operational reliability of smart grid. AMI network is susceptible to many cyber security threats and attacks. Therefore it is desirable to prevent the data from such vulnerabilities. The paper proposes two-phase method to provide security of data using dedicated authentication server which inhibits malicious and unauthorized nodes to gain access to AMI communication network. Secure environment is created…
Too many passwords? How understanding our memory can increase password memorability
2018
Abstract Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related …
Improving Password Memorability, While Not Inconveniencing the User
2019
Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…
Traceable hierarchical attribute-based authentication for the cloud
2015
When data owners store their data on cloud servers, they may want to define the access requirements themselves, where attribute-based authentication (ABA) can be a good choice for the solution. In this paper, we propose a traceable hierarchical ABA (HABA) solution which fits two situations in the cloud. The first situation is when cloud users are organized in groups of a hierarchical structure and the access allowance can only be granted to users in a specific group. The second situation is that attributes are organized in a hierarchical structure with different priorities, such that only users who own the required attributes of a specific priority can be authenticated and access the data. …
Understanding the fluctuations of perceived authenticity in cultural tourism : an investigation of Bali and Alsace contexts
2022
The marketing of cultural tourism faces a dilemma between maximizing the economic return and nurturing the culture’s social functions. It needs to attract segments driven by cultural motifs, through a differentiation based on authenticity. Perceived authenticity changes over a time, but how it does remains elusive to researchers. This research investigated fluctuations of existential authenticity in cultural tourists in Bali. Participants were purposively and conveniently-sampled among visitors of cultural attractions. It comprised two stages: qualitative for building the model, and quantitative fortesting the variables. The first employed Grounded Theory interviewing 24 visitors, found the…