Search results for "Authentication"
showing 10 items of 108 documents
An embedded iris recognizer for portable and mobile devices
2010
Software-intensive systems play an increasingly dominant role in our lives and daily activities. Several applications, in which a timely response to user and environment stimulus is essential, require real-time software intensive systems. Computation-intensive applications, such as video compression, control systems, security systems, result in significant growth for processor workload. To address the above issues, one possible solution is to design embedded specialized components. At the same time, the integration of new features in portable and mobile devices is rapidly increasing. Several services and applications require robust user authentication for access to services, data, and resou…
A Multimodal Technique for an Embedded Fingerprint Recognizer in Mobile Payment Systems
2009
The development and the diffusion of distributed systems, directly connected to recent communication technologies, move people towards the era of mobile and ubiquitous systems. Distributed systems make merchant-customer relationships closer and more flexible, using reliable e-commerce technologies. These systems and environments need many distributed access points, for the creation and management of secure identities and for the secure recognition of users. Traditionally, these access points can be made possible by a software system with a main central server. This work proposes the study and implementation of a multimodal technique, based on biometric information, for identity management a…
Multi-modal biometric authentication systems
2010
The main goal of a biometric system is to discriminate automatically subjects in a reliable and dependable way, accordingly to a specific target application. The discrimination is based on one or more types of information derived from physical or behavioural traits, such as fingerprint, face, iris, voice, hand, or signature. Applications of biometrics range from homeland security and border control to e-commerce and e-banking, including secure networking and authentication. Traditionally, biometric systems working on a single biometric feature, have many limitations, such as, trouble with data sensors, where captured sensor data are often affected by noise, distinctiveness ability, because …
An extended JADE-S based framework for developing secure Multi-Agent Systems
2009
Agent communities are self-organized virtual spaces consisting of a large number of agents and their dynamic environments. Within a community, agents group together offering special e-services for effective, reliable, and mutual benefits. Usually, an agent community is composed of specialized agents performing one or more tasks in a single domain/sub-domain, or in highly intersecting domains. However, secure Multi- Agent Systems require severe mechanisms in order to prevent malicious attacks. Several limits affect exiting secure agents platform, such as the lack of a strong authentication system, the lack of a flexible distributed mechanism for access control and the lack of a system for st…
A User-Friendly Interface for Fingerprint Recognition Systems Based on Natural Language Processing
2009
Biometric recognition systems represent a valid solution to the safety problem of internet accessibility, even if they do not always provide an environment easily comprehensible by users and operators with a mid-level of competence. This gap can be partially filled if, instead of using the conventional access routines to the authentication system, the user could simply write to the system through the interface and using high level sentences and requests be able to use its own natural language to reach the intended goal. On the other hand, biometrics features are widely used for recognition and identification all over the world, generating large databases. In this paper a user-friendly inter…
Fingerprint and Iris based Authentication in Intercooperative Emerging e-Infrastructures
2013
E-infrastructures must support the development of heterogeneous applications for workstation network, for mobile and portable systems and devices. In this context and relating to all collaborative and pervasive computational technology a very important role is played by security and authentication systems, which represent the first step of the whole process. Biometric authentication systems represent a valid alternative to conventional authentication systems providing robust procedures for user authentication. On the other hand, Internet of Things involves a heterogeneous set of interacting devices to enable innovative global and local applications and services for users. In this chapter fi…
Fuzzy techniques for access and data management in home automation environments
2012
Home Automation Environments are characterized by the integration of electronic devices as well as by the performance of communication and control systems. Environment infrastructure has to meet several requirements including Quality of Service (QoS), safety, security, and energy saving. However, Home Automation deals with complex environments, so that advanced data management systems are required to meet the above constraints. Fuzzy Logic based techniques can be successful used to improve system performance management. This work proposes and describes the use and application of fuzzy rules on a two-tiered architecture integrating a biometric authentication module and communication real-tim…
Progressive transmission of secured images with authentication using decompositions into monovariate functions
2014
International audience; We propose a progressive transmission approach of an image authenticated using an overlapping subimage that can be removed to restore the original image. Our approach is different from most visible water- marking approaches that allow one to later remove the watermark, because the mark is not directly introduced in the two-dimensional image space. Instead, it is rather applied to an equivalent monovariate representation of the image. Precisely, the approach is based on our progressive transmission approach that relies on a modified Kolmogorov spline network, and therefore inherits its advantages: resilience to packet losses during transmis- sion and support of hetero…
Data Communication Security of Advanced Metering Infrastructure in Smart Grid
2013
Advanced Metering Infrastructure (AMI) is very critical part for wired/wireless communication in Smart Grid. It involves communication of vital smart metering data to central control center for smooth functioning of smart grid. Security and reliability of data is of paramount importance for operational reliability of smart grid. AMI network is susceptible to many cyber security threats and attacks. Therefore it is desirable to prevent the data from such vulnerabilities. The paper proposes two-phase method to provide security of data using dedicated authentication server which inhibits malicious and unauthorized nodes to gain access to AMI communication network. Secure environment is created…
Too many passwords? How understanding our memory can increase password memorability
2018
Abstract Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related …