Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "authentication" wg kryterium: Temat


Tytuł:
A study of various authentication mechanisms towards the secure Internet of Things networks
Autorzy:
Vairagade, Rupali Sachin
Brahmananda, S. H.
Powiązania:
https://bibliotekanauki.pl/articles/2050106.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
Internet of Things
secure authentication
mutual authentication
cryptography-based authentication
lightweight approach
identity approach
Opis:
Internet of Things (IoT) plays a major function in the public infrastructure, including power grids, control systems, smart cards, smart cities, intelligent transportation, education, and so on. The IoT networks provide ample benefits arising from transmission of the data between the IoT nodes and the servers. However, security constitutes a major concern in the IoT applications, as secret information may get disclosed to the unauthorized third-party in the network. Thus, secure authentication is a major requirement for managing and communicating with respect to the devices in the IoT environment. In this survey, 50 research papers are reviewed, referring to various authentication protocols used for ensuring adequate security in the network. The authentication methods are categorized on the basis of the security mechanisms, namely, the lightweight approach, the identity approach, the mutual authentication approach, and the cryptography-based authentication approaches, with the challenges faced by these existing methods being reported. Moreover, a simple overview is provided based on authentication protocols, toolsets, and evaluation metrics. Conform to this survey, most of the research articles concentrated on the lightweightbased approaches, and the most commonly applied evaluation metrics include packet loss, throughput, and efficiency.
Źródło:
Control and Cybernetics; 2020, 49, 4; 393-418
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Survey a secured privacy authentication with recovery
Autorzy:
Rajkumar, M. Newlin
Dhurka, V.
Kayathri, P.
Powiązania:
https://bibliotekanauki.pl/articles/1192095.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Password
Authentication
OTP
Opis:
Every person has his own data and needs it to be secure, so authentication and acceptance were found to be essential. Most web based applications are based on password level authentication only. Since passwords are easily prone to be attacked, a better authentication is needed. The biometrics and the biometric way of authentication came to existence but this also suffered from the drawback of excess hardware and complex mechanisms. This paper presents a simple and efficient user authentication approach based on OTP with four digit pin number. When the user logins into the system, the login password is matches with database and if they match, the user is identified as a legitimate user. Further, an OTP is generated and sent to the user. The user enter the OTP along with four digit pin. If this combined OTP and four digit pin is matched with database, user is authenticated. Otherwise user is not allowed to access. This achieves better authentication and efficiency. If user forget their password, recovery phase is available. In this phase user have to answer the query which is based on the image that is displayed by server. If the answer is matches, then password reset link will send to user’s mail id. This recovery method is not vulnerable to password resetting attack. This paper provides different types of password, types of authentication and types of attack.
Źródło:
World Scientific News; 2016, 37; 265-278
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Authentication Mechanism Based on Adaptable Context Management Framework for Secure Network Services
Autorzy:
Sepczuk, M.
Powiązania:
https://bibliotekanauki.pl/articles/106295.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
secure authentication mechanism
user-friendly authentication mechanism
contextual data
cloud computing
Opis:
A system, which uses context information is a new trend in IT. A lot of researchers create frameworks, which collect some data and perform actions based on them. Recently, there have been observed more and more different security solutions, in which we can use context. But not each works dynamically and ensures a high level of user's quality of experience (QoE). This paper outlines what the context information is and shows a secure and user-friendly authentication mechanism for a mail box in cloud computing, based on using contextual data.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2014, 14, 2; 31-45
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Two-factor authentication (2FA) comparison of methods and applications
Autorzy:
Florczak, Sebastian
Jasiak, Adrian
Szczygieł, Izabela
Powiązania:
https://bibliotekanauki.pl/articles/31233162.pdf
Data publikacji:
2023
Wydawca:
Patryk Organiściak
Tematy:
cybersecurity
authentication
two-factor authentication
2FA
bezpieczeństwo cybernetyczne
uwierzytelnianie
uwierzytelnianie dwuskładnikowe
Opis:
In this document, the investigation delves into the realm of two-factor authentication (2FA), exploring its applications and comparing various methods of implementation. Two-factor authentication, often referred to colloquially as two-step verification, serves to enhance credential security during login processes across platforms such as Facebook and online banking, among others. While 2FA has significantly improved the security of the login and registration processes, it is noteworthy that its adoption tends to be more prevalent among younger individuals. Unfortunately, an increasing number of financial scams target older individuals who may be disinclined to engage with what they perceive as the complexity of multi-step authentication and password confirmation. Subsequent chapters provide a discussion of the various types of two-factor authentication, furnish detailed descriptions, and offer a summary of the benefits and gains achievable through the deployment of 2FA.
Źródło:
Advances in Web Development Journal; 2023, 1; 26-45
2956-8463
Pojawia się w:
Advances in Web Development Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Homomorphic linear authentication schemes from ε-ASU2 functions for proofs of retrievability
Autorzy:
Liu, S.
Chem, K.
Powiązania:
https://bibliotekanauki.pl/articles/206226.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
authentication code
proof of retrievability
Opis:
Proof of Retrievability (POR) refers to interactive auditing protocols executed between a storage server and clients, so that clients can be convinced that their data is available at the storage server, ready to be retrieved when needed. In an interactive POR protocol, clients initiate challenges to the server, and the server feedbacks responses to clients with the help of the stored data. Retrievability means that it should be possible for a client to extract his/her data from the server's valid responses. An essential step leading to retrievability is the server's unforgeability of valid responses, i.e, any server coming up with valid responses to a client's challenges is actually storing the client's data with overwhelming probability. Unforgeability can be achieved with authentication schemes like MAC, Digital Signature, etc. With Homomorphic Linear Authentication (HLA) schemes, the server�' several responses can be aggregated into one, hence reducing the communication complexity. In this paper, we explore some new constructions of ε-almost strong universal hashing functions (ε-ASU2), which are used to build homomorphic linear authenticator schemes in POR to provide unforgeability. We show the HLA scheme involved in Shacham and Waters' POR scheme (see Shacham and Waters, 2008) is just an employment of a class ε-ASU2 functions. Using another class of ε-ASU2 for authentication in POR results in a new HLA scheme, which enjoys unforgability, the same shortest responses as the SW scheme, but reduces the local storage from O(n+s) to O(n) for information soundness, and from O(s) to O(1) for knowledge-soundness.
Źródło:
Control and Cybernetics; 2012, 41, 2; 335-351
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Awavelet based watermarking approach in concatenated square block image for high security
Autorzy:
Sridhar, B.
Powiązania:
https://bibliotekanauki.pl/articles/384976.pdf
Data publikacji:
2018
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Automatyki i Pomiarów
Tematy:
authentication
concatenation
copyright
watermarking
wavelet
Opis:
Watermarking in digital contents has gained the more attraction in research community. In this approach copyright information is concealed in to the concatenated square region of an image under wavelet domain, initially original image is undergoing an alternative pixel sharing approach and one of the shares undergo the circular column shift further, concatenates those shares. Next, square region is obtained by capturing the half of the row value in the last part of first share and the first part of second share which forms a square image. To enrich the robustness of the technique, watermarking is under consideration only in the folded square under wavelet. Further, the reverse process is carried out to generate the watermarked image. To show ownership, original and watermarked image have undergone the same operation and acquire the copyright information. Experimental results indicate that the proposed approach is robust against image processing attacks.
Źródło:
Journal of Automation Mobile Robotics and Intelligent Systems; 2018, 12, 3; 68-72
1897-8649
2080-2145
Pojawia się w:
Journal of Automation Mobile Robotics and Intelligent Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zagadnienia bezpieczeństwa informacyjnego w standardzie TETRA V+D
Information security issues in TETRA V+D standard
Autorzy:
Niski, R.
Radziwanowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/317666.pdf
Data publikacji:
2005
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
TETRA
information security
authentication
encryption
Opis:
Omówiono podstawowe zagadnienia dotyczące przeciwdziałania zagrożeniom bezpieczeństwa informacyjnego, uwzględnione w standardzie TETRA V+D, takie jak: procedury uwierzytelniania między infrastrukturą sieciową i stacją ruchomą, kryptograficzne zabezpieczenie informacji przekazywanych przez interfejs radiowy w trybie łączności trankingowej i bezpośredniej, bezpieczne zarządzanie kluczami szyfrującymi, zdalne blokowanie i uaktywnianie terminali oraz mechanizm synchronizacji do szyfrowania informacji w relacji "end-to-end". Ponadto przedstawiono aspekty normalizacji interfejsu LI do legalnego podsłuchu.
The paper discusses the main threats to information security in TETRA system and describes the standard countermeasures, which include: authentication between the network infrastructure and mobile equipment, encryption of information transferred over the air interface both in trunked mode and in direct mode, secure management of cipher keys, remote disabling and enabling of terminals, a mechanism to support the synchronization of ,,end-to-end'' encryptions. Additionally, the issues of lawful interception have been presented.
Źródło:
Telekomunikacja i Techniki Informacyjne; 2005, 3-4; 79-93
1640-1549
1899-8933
Pojawia się w:
Telekomunikacja i Techniki Informacyjne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hardware Implementation of an Enhanced Security- and Authentication-Related Automotive CAN Bus Prototype
Autorzy:
Zniti, Asmae
Ouazzani, Nabih
Powiązania:
https://bibliotekanauki.pl/articles/2200704.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
CAN
automotive security
attack
authentication
Opis:
In this paper a new security technique aiming to ensure safe and reliable communications between different nodes on an automotive Controller Area Network (CAN) is presented. The proposed method relies on a robust authentication code using Blake-3 as a hash algorithm within an adapted structure that includes a monitor node. A prototype is implemented and run effectively to perform hardware simulations of real case-based security problems of automotive embedded CAN systems. As a result, data transfer can take place on a newly enhanced CAN bus according to the standard protocol without being intercepted nor tampered with by unauthorized parties thereby highlighting the effectiveness of the proposed technique.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 1; 83--88
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Logos & Techne - About New Possibilities of Creating Art with Artificial Intelligence
Autorzy:
Marcinkowski, Arkadiusz Mieczysław
Powiązania:
https://bibliotekanauki.pl/articles/23952446.pdf
Data publikacji:
2022
Wydawca:
Politechnika Gdańska
Tematy:
artificial intelligence
art authentication
art restoration
Opis:
The integration of artificial intelligence (AI) in the art world has been transforming various industries, including the creation of new artwork, interpretation of existing pieces of art, curation of exhibitions, authentication of artworks, creation of interactive art, and restoration of damaged artwork. AI algorithms can analyze and generate new pieces of art based on collected data, classify elements in a painting, curate exhibitions and collections tailored to specific audiences, authenticate artworks, create interactive art, and restore damaged artwork. This article explores the various possibilities and applications of AI in the art world, highlighting its potential to innovate and revolutionize the industry even further as the technology continues to evolve.
Źródło:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk; 2022, 26, 4
1428-6394
Pojawia się w:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Robust distributed privacy-preserving secure aggregation in vehicular communication
Autorzy:
Qin, B.
Wu, Q.
Domingo-Ferrer, J.
Susilo, W.
Powiązania:
https://bibliotekanauki.pl/articles/206240.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
authentication
vehicle privacy
data aggregation
VANETs
Opis:
Vehicular ad hoc networks (VANETs), formed by computers embedded in vehicles and the traffic infrastructure, are expected to develop in the near future to improve traffic safety and efficiency. To this end, VANETs should be designed to be resistant against various abuses and attacks. In this paper, we first review the existing proposals to provide security, privacy, and data aggregation in vehicle-to-vehicle communication. We then address the fundamental issue of achieving these conflicting properties in a unified solution, having observed that separate efforts cannot fulfill the VANET design objectives. A set of new mechanisms are suggested for efficiently managing identities and securely compressing cryptographic witnesses, which are among the major obstacles to the deployment of strong security mechanisms in VANETs. Finally, we employ the standard threshold cryptographic technology to improve the basic protocol with robustness.
Źródło:
Control and Cybernetics; 2012, 41, 2; 277-296
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Privacy Preserving and Secure Iris-Based Biometric Authentication for Computer Networks
Autorzy:
Strzelczyk, P.
Powiązania:
https://bibliotekanauki.pl/articles/308388.pdf
Data publikacji:
2011
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
authentication
biometrics
iris recognition
privacy preserving
Opis:
The iris biometrics is considered one of the most accurate and robust methods of the identity verification. The unique iris features of an individual can be presented in a compact binary form which can be easily compared with the reference template to confirm identity. However in contrast to passwords and PINs biometric authentication factors cannot be revoked and changed as they are inherently connected to our characteristics. Once the biometric information is compromised or disclosed it became useless for the purpose of authentication. Therefore there is a need to perform iris features matching without revealing the features itself and the reference template. We propose an extension of the standard irisbased verification protocol which introduces a features and template locking mechanism, which guarantee that no sensitive information is exposed. Presented solutions can be easily integrated into authentication mechanisms used in modern computer networks.
Źródło:
Journal of Telecommunications and Information Technology; 2011, 4; 115-118
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Authentication architecture using threshold cryptography in Kerberos for mobile ad hoc networks
Autorzy:
Gharib, H
Belloulata, K
Powiązania:
https://bibliotekanauki.pl/articles/103196.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
authentication
attacks
Kerberos
MANET
threshold cryptography
Opis:
The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET) is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.
Źródło:
Advances in Science and Technology. Research Journal; 2014, 8, 22; 12-18
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Gender recogniotion methods useful in mobile authentication applications
Autorzy:
Stawska, Z.
Milczarski, P.
Powiązania:
https://bibliotekanauki.pl/articles/94859.pdf
Data publikacji:
2016
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
face identification
gender recognition
face authentication
biometrics
Opis:
Soft biometrics methods that involve gender, age and ethnicity are still developed. Face recognition methods often rely on gender recognition. The same applies to the methods reconstructing the faces or building 2D or 3D models of the faces. In the paper, we conduct study on different set of gender recognition methods and their mobile applications. We show the advantages and disadvantages of that methods and future challenges to the researches. In the previous papers, we examined a range variety of skin detection methods that help to spot the face in the images or video stream. On acquiring faces, we focus on gender recognition that will allow us to create pattern to build 2D and 3D automatic faces models from the images. That will result also in face recognition and authentication, also.
Źródło:
Information Systems in Management; 2016, 5, 2; 248-259
2084-5537
2544-1728
Pojawia się w:
Information Systems in Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
New Threats and Innovative Protection Methods in Wireless Transmission Systems
Autorzy:
Bilski, T.
Powiązania:
https://bibliotekanauki.pl/articles/309265.pdf
Data publikacji:
2014
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
authentication
confidentiality
cryptography
threats
vulnerabilities
wireless transmission
Opis:
Many improvements in the field of wireless communication can be observed nowadays. Some developments are gradual, others are revolutionary. It is obvious that each innovation in the area may lead to new security threats and vulnerabilities. Such technologies and transmission methods as: Near Field Communication (NFC), Visible Light Communication (VLC), handover, mesh networks, 5G cellular network, mobile IPv6, beamforming, cooperative beamforming, Multiple Input Multiple Output (MIMO), Orthogonal Frequency Division Multiple Access (OFDMA), transmission in Extra High Frequency (EHF) band are very important from the security point of view. In order to preserve high level of security one needs to identify, analyse and classify distinctive sets of threats and vulnerabilities as well as some emerging data protection opportunities related to innovative wireless transmission methods and technologies. This identification, analysis and classification is a main purpose of the paper. It will focus on cryptography in wireless systems, security vs. energy tradeoffs, physical layer security. For example, common problems related to cryptography may be solved with a use of physical layer security. Data confidentiality may be fulfilled with a use of beamforming and jamming, authentication may be performed with a use of out-of-band authentication model.
Źródło:
Journal of Telecommunications and Information Technology; 2014, 3; 26-33
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
BSBI - a Simple Protocol for Remote Verification of Identity
Autorzy:
Kozakiewicz, A.
Pałka, P.
Powiązania:
https://bibliotekanauki.pl/articles/309333.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
access control
authentication
biometric verification
network protocols
Opis:
The paper presents the design and the rationale behind a simple verification protocol for autonomous verification modules, and the architecture enabling use of such modules. The architecture assumes strict separation of all personal metadata and the actual verification data. The paper also describes a prototype implementation of the protocol and its extension enabling the state of the module to be monitored from the main system. The proposed design solves the problem of using advanced verification methods, especially biometric ones, in systems where direct implementation is not possible due to hardware incompatibilities, insufficient resources or other limitations.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 3; 50-57
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies