Search results for "Authentication"

showing 10 items of 108 documents

An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid

2021

International audience; The secure multidimensional data aggregation (MDA) has been widely investigated in smart grid for smart cities. However, previous proposals use heavy computation operations either to encrypt or to decrypt the multidimensional data. Moreover, previous fault-tolerant mechanisms lead to an important computation cost, and also a high communication cost when considering a separate identification phase. In this article, we propose an efficient and secure MDA scheme, named ESMA. Unlike existing schemes, the multidimensional data in ESMA are structured and encrypted into a single Paillier ciphertext and thereafter, the data are efficiently decrypted. For privacy preserving, …

Information privacysmart citiesComputer Networks and CommunicationsComputer scienceDistributed computingCryptography02 engineering and technologyEncryptionPaillier cryptosystem[SPI]Engineering Sciences [physics]Ciphertext0202 electrical engineering electronic engineering information engineeringAuthenticationbusiness.industry020208 electrical & electronic engineering020206 networking & telecommunicationssecurity and privacyComputer Science ApplicationsData aggregationsmart grid (SG)Smart gridHardware and ArchitectureSignal ProcessingScalabilityfog computingbusinessInformation Systems
researchProduct

Detection of archaeological forgeries of Iberian lead plates using nanoelectrochemical techniques. The lot of fake plates from Bugarra (Spain)

2014

Identification of forgeries is of considerable interest in studies of archaeological signariums and written Iberian artifacts, elements of capital importance for the knowledge of that culture, because there are many Iberian inscribed lead plate counterfeits circulating in the market and among many museum funds. A case study of identification of forgeries of archaeological lead using voltammetry of microparticles (VMP) and scanning electrochemical microscopy (SECM), aided by conventional optical microscopy and scanning electron microscopy (SEM/EDX) is described. The electrochemical methods are essentially non-invasive so can be applied to samples of nanoscopic size. Application to the authen…

Lead inscriptions IberianScanning electrochemical microscopyVoltammetry of microparticlesArchaeologyPalaeographyPathology and Forensic MedicineScanning electrochemical microscopyLead plateArchaeologyPINTURALawGeologyHeritage authentication
researchProduct

Fuzzy Fusion in Multimodal Biometric Systems

2007

Multimodal authentication systems represent an emerging trend for information security. These systems could replace conventional mono-modal biometric methods using two or more features for robust biometric authentication tasks. They employ unique combinations of measurable physical characteristics: fingerprint, facial features, iris of the eye, voice print, hand geometry, vein patterns, and so on. Since these traits are hardly imitable by other persons, the aim of these multibiometric systems is to achieve a high reliability to determine or verify person's identity. In this paper a multimodal biometric system using two different fingerprints is proposed. The matching module integrates fuzzy…

Matching (statistics)AuthenticationBiometricsMultimodal biometricsbusiness.industryComputer scienceFingerprintPattern recognitionArtificial intelligenceInformation securitybusinessSpeaker recognitionHand geometry
researchProduct

A Novel Artificial Neural Network (ANN) Using The Mayfly Algorithm for Classification

2021

Training of Artificial Neural Networks (ANNs) have been improved over the years using meta heuristic algorithms that introduce randomness into the training method but they might be prone to falling into a local minima in a high-dimensional space and have low convergence rate with the iterative process. To cater for the inefficiencies of training such an ANN, a novel neural network is presented in this paper using the bio-inspired algorithm of the movement and mating of the mayflies. The proposed Mayfly algorithm is explored as a means to update weights and biases of the neural network. As compared to previous meta heuristic algorithms, the proposed approach finds the global minima cost at f…

Maxima and minimaIterative and incremental developmentAuthenticationArtificial neural networkRate of convergenceComputer scienceVDP::Technology: 500Benchmark (computing)Particle swarm optimizationAlgorithmRandomness
researchProduct

Mass spectrometry analysis of volatile compounds in raw meat for the authentication of the feeding background of farm animals.

2007

The authentication of the conditions of animal production, based on the analysis of meat commercial cuts, is a major challenge on both societal and analytical grounds. The aim of the present work was to propose a method for the extraction of the volatile compounds from ruminant raw muscles trimmed of fat and to assess by mass spectrometry-based techniques the relevance of these compounds for the authentication of the type of feeding offered to the animals. The first step of the study consisted of validating conditions of dynamic headspace (DH) extraction of volatile compounds that enabled us to minimize the appearance of heat-induced artifacts and to maximize the richness of the DH-gas chro…

MeatMass spectrometryGas Chromatography-Mass Spectrometryfeed tracerOils VolatileDynamic headspaceAnimalsFood scienceRaw meatvolatile compoundMuscle SkeletalAuthenticationChromatographySheepChemistryAnimal productionGeneral ChemistryAnimal FeedAnimals Domesticraw meatvirtual MS fingerprintauthenticationGas chromatography–mass spectrometryGC-MSVolatilizationGeneral Agricultural and Biological SciencesJournal of agricultural and food chemistry
researchProduct

A Novel Embedded Fingerprints Authentication System Based on Singularity Points

2008

In this paper a novel embedded fingerprints authentication system based on core and delta singularity points detection is proposed. Typical fingerprint recognition systems use core and delta singularity points for classification tasks. On the other hand, the available optical and photoelectric sensors give high quality fingerprint images with well defined core and delta points, if they are present. In the proposed system, fingerprint matching is based on singularity points position, orientation, and relative distance detection. As result, fingerprint matching involves the comparison between few features leading to a very fast system with recognition rates comparable to the standard minutiae…

MinutiaeAuthenticationPixelOrientation (computer vision)business.industryComputer scienceFingerprint recognitionfingerprints authenticationSingularityFingerprintComputer visionArtificial intelligenceField-programmable gate arraybusiness2008 International Conference on Complex, Intelligent and Software Intensive Systems
researchProduct

Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther

2016

Scyther [1] is designed to check the security and vulnerabilities of security protocols. In this paper, we use Scyther to analyze two discrete logarithm problem (DLP) based group authentication protocols proposed in [2]. These two protocols are claimed to satisfy several security requirements, but only part of them have been checked because of the properties and limitations of Scyther. Some positive results have been gained and show that the protocols provide mutual authentication and implicit key authentication and are secure against impersonation attack. An important innovation in this paper is that we have extended the expressing ability of Scyther by giving some reasonable assumption du…

Model checkingAuthenticationTheoretical computer scienceComputer sciencebusiness.industry020206 networking & telecommunicationsCryptography02 engineering and technologyMutual authenticationCryptographic protocolComputer securitycomputer.software_genreKey authenticationDiscrete logarithmAuthentication protocol0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputer2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP)
researchProduct

CORMORANT

2019

People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…

PasswordAuthenticationBiometricsComputer Networks and CommunicationsEvent (computing)Computer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreHuman-Computer InteractionInformation sensitivityKeystroke dynamicsHardware and Architecture0202 electrical engineering electronic engineering information engineeringStrong authentication020201 artificial intelligence & image processingcomputerMobile deviceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
researchProduct

Embedded access points for trusted data and resources access in HPC systems

2010

Biometric authentication systems represent a valid alternative to the conventional username-password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or matching results overriding (replay attacks, confidentiality and integrity threats related to the stored information of the networked workstation). In this paper, a full hardware access poi…

PasswordAuthenticationBiometricsbusiness.industryComputer scienceAccess controlInformation SystemFingerprint recognitionTrusted authenticationTheoretical Computer ScienceSoftwareHardware and ArchitectureEmbedded systemEmbedded biometric authentication systemSmart cardSecurity solutions for user authenticationbusinessReplay attackSoftwareInformation SystemsThe Journal of Supercomputing
researchProduct

Can individuals’ neutralization techniques be overcome? A field experiment on password policy

2020

Individuals’ lack of adherence to password security policy is a persistent problem for organizations. This problem is especially worrisome because passwords remain the primary authentication mechanism for information systems, and the number of passwords has been increasing. For these reasons, determining methods to improve individuals’ adherence to password-security policies constitutes an important issue for organizations. Extant research has shown that individuals use neutralization techniques, i.e., types of rationalizations, to disregard organizational information-security policies. What has not been determined from extant information security research is whether these neutralizations c…

PasswordAuthenticationPassword policyGeneral Computer Scienceinformation securitybusiness.industryComputer scienceInternet privacytietoturvapolitiikka020206 networking & telecommunicationsContext (language use)02 engineering and technologyInformation securityneutralizationsalasanatpasswordsAuthentication (law)Password strengthinformation security policy0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingtietoturvabusinesshenkilöstökoulutusLawComputers & Security
researchProduct