Search results for "Authentic"
showing 10 items of 203 documents
A new system for animal products traceability and authentication: Use of DNA analysis of natural tracers and example of application to dry cured hams
2010
A few DNA based approaches have been developed to trace animal products from the farm to the consumer “fork”. These approaches make use of the animal DNA that can be recovered during all steps of t...
A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users
2003
Currently used in mobile devices PIN-based user authentication cannot provide a sufficient security level. Methods based on multi-modal user authentication involving biometrics (i.e. physical and behavioral characteristics of a person) may be employed to cope with this problem. However, dealing with physical characteristics only, these methods are either unable to provide continuous and user-friendly identity verification, or are resource consuming.
Using continuous user authentication to detect masqueraders
2003
Nowadays computer and network intrusions have become more common and more complicated, challenging the intrusion detection systems. Also, network traffic has been constantly increasing. As a consequence, the amount of data to be processed by an intrusion detection system has been growing, making it difficult to efficiently detect intrusions online. Proposes an approach for continuous user authentication based on the user’s behaviour, aiming at development of an efficient and portable anomaly intrusion detection system. A prototype of a host‐based intrusion detection system was built. It detects masqueraders by comparing the current user behaviour with his/her stored behavioural model. The m…
A distributed detection and prevention scheme from malicious nodes in vehicular networks
2016
Summary Vehicular environments still remain vulnerable to various potential attacks because of continuous interactions and information exchange between vehicles despite the deployment of authentication techniques by communication standards. Therefore, an authenticated node with a certificate could initiate an attack while complying with implemented protocols. Some mechanisms were proposed to enhance communication technologies, but none of them was able to anticipate nodes' behavior. They also mismanage oscillating vehicles, because they evict them automatically after misbehaving. In this paper, we propose a preventive mechanism, namely, Intrusion Prevention and Detection System (IPDS), able…
Attacks Against the WAP WTLS Protocol
1999
The WAP WTLS protocol was designed to provide privacy, data integrity, and authentication for wireless terminals. The protocol is currently being fielded, and it is expected that the protocol will be contained in millions of devices in a few years.
An improvement of the batch-authentication and key agreement framework for P2P-based online social networks
2014
Batch authentication is the way to authenticate multiple users simultaneously to provide better efficiency. In [1], three batch authentication protocols are proposed based on different primitives, to provide simultaneous authentication of multiple users in online social networks (OSNs). In this paper, we briefly introduce the original protocols, describe their security vulnerabilities and related attacks, and propose modifications to make them secure again.
Fuzzy Fusion in Multimodal Biometric Systems
2007
Multimodal authentication systems represent an emerging trend for information security. These systems could replace conventional mono-modal biometric methods using two or more features for robust biometric authentication tasks. They employ unique combinations of measurable physical characteristics: fingerprint, facial features, iris of the eye, voice print, hand geometry, vein patterns, and so on. Since these traits are hardly imitable by other persons, the aim of these multibiometric systems is to achieve a high reliability to determine or verify person's identity. In this paper a multimodal biometric system using two different fingerprints is proposed. The matching module integrates fuzzy…
Publilian Authenticity of the Petronian Fragment (Sat. 55) and metre used by Publilius Syrus
2013
What Cordelia lacks of. The ethical dilemma of authenticity in the planning practices of reasoning in public.
2014
Given the significance of planning public argumentation, that is ‘reasoning in public’, in ways in which it is possible to recognize the diversity of perspectives and the complexity of many issues faced, this paper faces the question of how to deal with this issue in political and social contexts where the notion of (substantial) democracy faces several obstacles in its way. Due to our context-based research work field (and place where we live), we experienced significant difficulties in applying normative principles which are nurtured by promises on behalf of deliberative democracy. Consequently the paper raises the following questions: 1. how to practice this normative ideal in those cont…
Authenticity as a mental state: A primer
2014
Highlights Philosophy of mind offers a new philosophical foundation for authenticity. Philosophy of mind studies mental states, whose defining property is intentionality. Intentionality is an essential trait in any characterization of authenticity. Experiencing authenticity is a mental state. Authenticity’s role as a theoretical construct is strengthened and amplified.