Search results for "Authentication"

showing 10 items of 108 documents

A multimodal retina-iris biometric system using the Levenshtein distance for spatial feature comparison

2020

Abstract The recent developments of information technologies, and the consequent need for access to distributed services and resources, require robust and reliable authentication systems. Biometric systems can guarantee high levels of security and multimodal techniques, which combine two or more biometric traits, warranting constraints that are more stringent during the access phases. This work proposes a novel multimodal biometric system based on iris and retina combination in the spatial domain. The proposed solution follows the alignment and recognition approach commonly adopted in computational linguistics and bioinformatics; in particular, features are extracted separately for iris and…

Biometric systemComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONspatial domain biometric featuresbiometric authentication system4603 Computer Vision and Multimedia Computation46 Information and Computing SciencesmedicineIris (anatomy)multimodal systemRetinabusiness.industrymultimodal retina-iris biometric systemLevenshtein distancePattern recognitionbiometric recognition systemQA75.5-76.95Levenshtein distanceretina and iris featuresmedicine.anatomical_structureFeature (computer vision)Electronic computers. Computer scienceSignal ProcessingComputer Vision and Pattern RecognitionArtificial intelligencebusinessSoftware
researchProduct

I ‘vasi di Centuripe’: per un approccio integrato

2017

Il contributo intende evidenziare le prospettive di un approccio interdisciplinare integrato allo studio della ceramica policroma “di Centuripe”. Dagli inizi del XX secolo, tale classe ha riscosso ampio apprezzamento per le sue delicate pitture e la ricchezza di ornamenti a rilievo applicati (dipinti e dorati) che abbelliscono i vasi, rendendoli pressoché inutilizzabili nella pratica per scopi funzionali, ma altamente efficaci come doni funerari in antico, e oggi come pezzi di grande impatto per commercianti di antichità e collezionisti moderni. Data la piaga, diffusa fino a tempi recenti, degli scavi clandestini, dei “restauri” arbitrari e delle falsificazioni, i vasi di Centuripe necessit…

Centuripe pitture ellenistiche a tempera colori antichi autenticità e falsificazioni tecniche analitiche XRF FTIRSettore L-ANT/10 - Metodologie Della Ricerca ArcheologicaCenturipe Hellenistic Tempera Painting Ancient Colours Authentication Forgeries XRF FTIR AnalysesSettore L-ANT/07 - Archeologia ClassicaSettore CHIM/02 - Chimica Fisica
researchProduct

Mutual entity authentication for LTE

2011

In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses. In this paper we propose an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol. We also analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.

Challenge-Handshake Authentication ProtocolKey-agreement protocolAuthenticationbusiness.industryComputer scienceAuthorizationMutual authenticationEnterprise information security architectureCryptographic protocolComputer securitycomputer.software_genreDistributed System Security ArchitectureGSMAuthentication protocolLightweight Extensible Authentication ProtocolbusinesscomputerAKAComputer network2011 7th International Wireless Communications and Mobile Computing Conference
researchProduct

An improvement of NFC-SEC with signed exchanges for an e-prescription-based application

2013

International audience; In the context of an aging population, drug intake can be a potential source of errors leading to death in some cases. Almost all of these errors are unintentional and come from incorrect prescriptions, unsuitable dosages for the patient or incompatibility with other treatments. To limit these risks which are especially important in the elderly or pre-dependency, we propose a secure system for drug treatment through the NFC (Near Field Communication) contact-less communication technology. The proposed system provides security mechanisms such as integrity, authentication, encryption and non-repudiation. To ensure this security, an extension of the international standa…

Computer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]NFC0211 other engineering and technologiesSystème d'exploitationE-signatureRéseaux et télécommunicationsContext (language use)02 engineering and technologyEncryptionComputer securitycomputer.software_genreNear field communication[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Architectures Matérielles0202 electrical engineering electronic engineering information engineeringMedical prescription021110 strategic defence & security studiesAuthentication[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryInternational standard020207 software engineeringPublic key infrastructureSystèmes embarquésElectronic signatureSSTA3. Good healthERISISHealthcare applicationSecurityE-prescriptionISO/IEC 13157businesscomputer
researchProduct

An Enhanced Authentication System for the JADE-S Platform

2004

Multi-agent systems require a set of security mechanism threats such as confidentiality, privacy, authentication, data integrity, access control. Authentication is the process of deducing which user has made a specific request in a multi-agent system. The goal of authentication is to allow legitimate system entities to process while denying illegitimate ones. The JADE-S platform requires that users must be authenticated, providing a username and password, in order to be able to perform actions on the platform. In this paper an enhanced user authentication system for the JADE-S platform, requiring user fingerprint in addition to the standard items, is outlined. Due to their uniqueness and im…

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSData_MISCELLANEOUSFingerprintsJADE-SSecurityAuthentication SystemsMulti-Agent Systems
researchProduct

Transactions in Mobile Electronic Commerce

2000

With the development of global networking, invention of WWW, and proliferation of Internet-enabled computer hardware and software into homes and pockets, a huge customer base has been created for electronic commerce. It is rapidly expanding in USA and Europe and Japan are following the trend. So far, the development of E-commerce has happened in a rather unregulated way especially in USA, whereas in Europe the European Commission has been developing a regulatory basis mainly in form of directives. Currently (12/1999) they have not yet all been accepted and a major restructuring of the regulatory framework has also been planned. Another technological development is the rapid growth of mobile…

Credit cardAtomicityCustomer baseTransactional leadershipTransaction processingMobile computingInformation systemBusinessComputer securitycomputer.software_genrecomputerAuthentication (law)
researchProduct

Dog blogs as ventriloquism: Authentication of the human voice

2015

This paper looks at personal blogging by dog owners in an international, English language blogsite in which dog owners from around the world report and reflect upon their dogs and their lives with dogs, and do so by using the dog׳s voice. It approaches dog blogs as an example of the strategic use of pervasive but contentious anthropomorphic western discourses about animals and discusses how dog bloggers use anthropomorphism as a discursive means for crafting and collectively ratifying authenticity in a translocal, interest-driven and informal social media context in which traditional territorial and demographic parameters of authenticity are not easily available or relevant. More specifical…

Cultural StudiesAuthenticationAuthenticationStylizationBloggingCommunicationmedia_common.quotation_subjectMedia studiesta6121Context (language use)AnthropomorphismEnglish languageantropomorfismiDogstodentaminenSocial mediaDiary writingta518PsychologyFunction (engineering)Social psychologyDog ownersIndexicalityHuman voicemedia_common
researchProduct

Presenting “pissis girls”: Categorisation in a social media video

2015

In Finland, a social category called “pissis girls” has evolved into a cultural concept, used widely in various discourses concerning young women. In the paper, the empirical focus is on how, in the context of a viral video disseminated in social media, a group of young girls are presented as representatives of this category. The video, called ÄM IRK, is a short edited clip of an emergent interaction between young men and girls meeting by chance in a park. Drawing on the notions of membership categorisation, cluster of indexes and indexical field, “enoughness” and authentication, the paper investigates how the edited video, through the means of de- and recontextualisation of the emergent in…

Cultural StudiesCommunicationmedia_common.quotation_subjectField (Bourdieu)de- and recontextualisationta6121Context (language use)RecontextualisationAuthentication (law)pissis girlsindexescategorisationenoughnessSemioticsSocial mediaGirlta518PsychologyIndexicalitySocial psychologymedia_commonDiscourse, Context & Media
researchProduct

Design and Implementation of Deep Learning Based Contactless Authentication System Using Hand Gestures

2021

Hand gestures based sign language digits have several contactless applications. Applications include communication for impaired people, such as elderly and disabled people, health-care applications, automotive user interfaces, and security and surveillance. This work presents the design and implementation of a complete end-to-end deep learning based edge computing system that can verify a user contactlessly using &lsquo

Edge deviceComputer Networks and CommunicationsComputer scienceSpeech recognitionlcsh:TK7800-8360securitySign languageVDP::Teknologi: 500::Elektrotekniske fag: 540edge computingCode (cryptography)ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSElectrical and Electronic EngineeringEdge computingAuthenticationhand gestures recognitionArtificial neural networkbusiness.industryDeep learninglcsh:Electronicsdeep learningneural networkscontactless authenticationHardware and ArchitectureControl and Systems Engineeringcamera based authenticationSignal ProcessingArtificial intelligencebusinessGesture
researchProduct

Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study

2022

In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solutio…

Electrical and Electronic EngineeringAPI; REST; spring-boot; Keycloak; authentication; authorization; encryption; external attacksVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550BiochemistryInstrumentationComputer SecuritySoftwareAtomic and Molecular Physics and OpticsAnalytical ChemistrySensors
researchProduct