Search results for "Authentic"

showing 10 items of 203 documents

A new system for animal products traceability and authentication: Use of DNA analysis of natural tracers and example of application to dry cured hams

2010

A few DNA based approaches have been developed to trace animal products from the farm to the consumer “fork”. These approaches make use of the animal DNA that can be recovered during all steps of t...

AuthenticationTraceabilitybusiness.industryDRY CURED HAMSfungiMICROSATELLITESfood and beveragesBiologyBiotechnologychemistry.chemical_compoundchemistryDNA ANALYSISTRACEABILITYAnimal Science and ZoologyBiochemical engineeringlcsh:Animal culturebusinessDry curedDNAlcsh:SF1-1100AUTHENTICATION
researchProduct

A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users

2003

Currently used in mobile devices PIN-based user authentication cannot provide a sufficient security level. Methods based on multi-modal user authentication involving biometrics (i.e. physical and behavioral characteristics of a person) may be employed to cope with this problem. However, dealing with physical characteristics only, these methods are either unable to provide continuous and user-friendly identity verification, or are resource consuming.

AuthenticationUser authenticationResource (project management)BiometricsHuman–computer interactionComputer scienceIdentity (object-oriented programming)Security levelComputer securitycomputer.software_genreMobile devicecomputer
researchProduct

Using continuous user authentication to detect masqueraders

2003

Nowadays computer and network intrusions have become more common and more complicated, challenging the intrusion detection systems. Also, network traffic has been constantly increasing. As a consequence, the amount of data to be processed by an intrusion detection system has been growing, making it difficult to efficiently detect intrusions online. Proposes an approach for continuous user authentication based on the user’s behaviour, aiming at development of an efficient and portable anomaly intrusion detection system. A prototype of a host‐based intrusion detection system was built. It detects masqueraders by comparing the current user behaviour with his/her stored behavioural model. The m…

AuthenticationUser profileComputer scienceAnomaly-based intrusion detection systemReal-time computingIntrusion detection systemLibrary and Information SciencesManagement Science and Operations ResearchComputer securitycomputer.software_genreManagement Information SystemsInformation protection policyHost-based intrusion detection systemSystems architectureBusiness and International ManagementHost (network)computerInformation Management & Computer Security
researchProduct

A distributed detection and prevention scheme from malicious nodes in vehicular networks

2016

Summary Vehicular environments still remain vulnerable to various potential attacks because of continuous interactions and information exchange between vehicles despite the deployment of authentication techniques by communication standards. Therefore, an authenticated node with a certificate could initiate an attack while complying with implemented protocols. Some mechanisms were proposed to enhance communication technologies, but none of them was able to anticipate nodes' behavior. They also mismanage oscillating vehicles, because they evict them automatically after misbehaving. In this paper, we propose a preventive mechanism, namely, Intrusion Prevention and Detection System (IPDS), able…

AuthenticationVehicular ad hoc networkComputer Networks and CommunicationsComputer sciencebusiness.industryNode (networking)020206 networking & telecommunications02 engineering and technologyKalman filterCertificateComputer securitycomputer.software_genreSoftware deployment0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingElectrical and Electronic EngineeringRouting (electronic design automation)businesscomputerInformation exchangeComputer networkInternational Journal of Communication Systems
researchProduct

Attacks Against the WAP WTLS Protocol

1999

The WAP WTLS protocol was designed to provide privacy, data integrity, and authentication for wireless terminals. The protocol is currently being fielded, and it is expected that the protocol will be contained in millions of devices in a few years.

AuthenticationWireless Transport Layer SecurityTransport Layer Securitybusiness.industryComputer scienceData integrityComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWirelessbusinessProtocol (object-oriented programming)Stream cipherBlock cipherComputer network
researchProduct

An improvement of the batch-authentication and key agreement framework for P2P-based online social networks

2014

Batch authentication is the way to authenticate multiple users simultaneously to provide better efficiency. In [1], three batch authentication protocols are proposed based on different primitives, to provide simultaneous authentication of multiple users in online social networks (OSNs). In this paper, we briefly introduce the original protocols, describe their security vulnerabilities and related attacks, and propose modifications to make them secure again.

Authenticationbusiness.industryComputer scienceAuthentication protocolNetwork Access ControlData_MISCELLANEOUSChallenge–response authenticationEncryptionbusinessAKAComputer network2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
researchProduct

Fuzzy Fusion in Multimodal Biometric Systems

2007

Multimodal authentication systems represent an emerging trend for information security. These systems could replace conventional mono-modal biometric methods using two or more features for robust biometric authentication tasks. They employ unique combinations of measurable physical characteristics: fingerprint, facial features, iris of the eye, voice print, hand geometry, vein patterns, and so on. Since these traits are hardly imitable by other persons, the aim of these multibiometric systems is to achieve a high reliability to determine or verify person's identity. In this paper a multimodal biometric system using two different fingerprints is proposed. The matching module integrates fuzzy…

AuthenticationBiometricsComputational geometryData fusionFeature extractionSecurity of dataSettore ING-INF/05 - Sistemi Di Elaborazione Delle Informazioni
researchProduct

Publilian Authenticity of the Petronian Fragment (Sat. 55) and metre used by Publilius Syrus

2013

Authenticity Publilius Syrus Petronius ancient metre
researchProduct

What Cordelia lacks of. The ethical dilemma of authenticity in the planning practices of reasoning in public.

2014

Given the significance of planning public argumentation, that is ‘reasoning in public’, in ways in which it is possible to recognize the diversity of perspectives and the complexity of many issues faced, this paper faces the question of how to deal with this issue in political and social contexts where the notion of (substantial) democracy faces several obstacles in its way. Due to our context-based research work field (and place where we live), we experienced significant difficulties in applying normative principles which are nurtured by promises on behalf of deliberative democracy. Consequently the paper raises the following questions: 1. how to practice this normative ideal in those cont…

Authenticity ethical dilemma public reasonongAuthenticity ethical dilemma public reasoningSettore ICAR/21 - Urbanistica
researchProduct

Authenticity as a mental state: A primer

2014

Highlights Philosophy of mind offers a new philosophical foundation for authenticity. Philosophy of mind studies mental states, whose defining property is intentionality. Intentionality is an essential trait in any characterization of authenticity. Experiencing authenticity is a mental state. Authenticity’s role as a theoretical construct is strengthened and amplified.

Authenticity tourismTourism Leisure and Hospitality ManagementMental stateSociologyDevelopmentSocial scienceSettore SECS-P/08 - Economia E Gestione Delle ImpresePrimer (cosmetics)TourismAnnals of Tourism Research
researchProduct