Search results for "Strong authentication"

showing 2 items of 2 documents

CORMORANT

2019

People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…

PasswordAuthenticationBiometricsComputer Networks and CommunicationsEvent (computing)Computer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreHuman-Computer InteractionInformation sensitivityKeystroke dynamicsHardware and Architecture0202 electrical engineering electronic engineering information engineeringStrong authentication020201 artificial intelligence & image processingcomputerMobile deviceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
researchProduct

An extended JADE-S based framework for developing secure Multi-Agent Systems

2009

Agent communities are self-organized virtual spaces consisting of a large number of agents and their dynamic environments. Within a community, agents group together offering special e-services for effective, reliable, and mutual benefits. Usually, an agent community is composed of specialized agents performing one or more tasks in a single domain/sub-domain, or in highly intersecting domains. However, secure Multi- Agent Systems require severe mechanisms in order to prevent malicious attacks. Several limits affect exiting secure agents platform, such as the lack of a strong authentication system, the lack of a flexible distributed mechanism for access control and the lack of a system for st…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniService (systems architecture)AuthenticationPublic key certificateComputer sciencebusiness.industryMulti-agent systemmedia_common.quotation_subjectJADE (programming language)Access controlMulti-Agent Systems Security Biometric Authentication SystemsComputer securitycomputer.software_genreHardware and ArchitectureStrong authenticationbusinessLawcomputerSoftwareComputer networkReputationmedia_commoncomputer.programming_languageComputer Standards & Interfaces
researchProduct