Science topic

Authentication - Science topic

Explore the latest questions and answers in Authentication, and find Authentication experts.
Questions related to Authentication
  • asked a question related to Authentication
Question
1 answer
Dear friends:
I have identified several topics for collaboration, which can result in possible intellectual property products. Interested people can reach me by email: kaushandi@gmail.com. Please state the collaboration title in the subject line of your email. We can discuss the logistics once you reach out to me with your interest.
Please join my whatsapp group
I will keep adding more topics and open to explore more ideas
1. SOLAR POWERED JUICE CART
2. IOT BASED BLOOD OXYGEN SATURATION METER
3. Apparatus for Testing and Studying the Transport of Contaminant through Soil
4. Portable Torch with air quality tracking
5. IOT BASED SMART ROBOT FOR AIR CONDITIONER DUCT CLEANING
6. IOT BASED AUTONOMOUS STAIR CLIMBING MATERIAL HANDLING ROBOT
7. CONFIDENCE TRACKING DEVICE OF THE EMPLOYEE (MACHINE LEARNING BASED)
8. MILK QUALITY ANALYSING AND PURIFICATION SYSTEM
9. PORTABLE MOUNT STAND FOR SUN TRACKING SOLAR PANEL
10. GAS STOVE WITH PORTABLE STORAGE CABIN
11. Biometric fingerprint reader/Iris/ Face/ Voice Authentication Device
12. Water Distillation /Solar Powered Water Distillation System
13. Walking Stick for Visually Impaired People / Elderly People
14. Wearable Electronic Device for Blinds/ IOT Based Wearable Medical Monitoring Device
15. Obstacle Avoidance Shoe with Motion Sensors
16. IoT Enabled Signal/ Driver/ Temperature/Health Monitoring System
17. Ultrasonic Pulse/Velocity Monitoring Device
18. Food/Milk/Oil/Honey/Fuel Adulteration Monitoring Device
19. Safety Helmet for Construction Workers
20. Solar Inverter/Portable Solar Tree/ Solar Power Tent/ Sun Tracking Solar Panel
21. IoT Enabled Audio Player Integrated Printer
22. IoT Based Solar Powered Agriculture Robot
23. Animal Tracking Strap Using RFID and IoT
24. IoT Based Face Mask Detecting and Body Temperature Measuring Device
25. IoT Based Automated Rail Track Inspection Trolley
26. Biosensor Based Biotech Device to Detect Lung Cancer
27. Portable IoT Based Plant Health Monitoring System
28. IOT Enabled Streetlight Controller/ Water Level device
29. Wind/ Solar Power Charging Station for Vehicles/Mobile
30. Agriculture Drone for Monitoring and Spraying Pesticides
31. Fire extinguishing equipped life-saving drone
32. Exam Invigilation Drone/ Pollution Identifying Device/Drone/Underwater Drone
33. Portable Solar Vegetables and Fish Dryer
34. Portable Solar Grass Cutting Machine
35. IoT Based/Solar based Irrigation System
36. Microwave Sensor based Soil Analyzer
37. Soil Moisture Indicator/Smoke and Heat Detector Indicator
38. Helmet with Integrated Camera/ Safety Helmet for Construction Workers
39. IoT based Camera for Healthcare Management
40. IoT Weather/ Air/ Environmental/ Antenna Signal Quality Monitoring Device
41. Pen/ A pen for converting text into speech/ Pen With USB Pen Drive and LED Light
42. Portable Touch Free Sanitizer/Water Dispenser
43. Wrist Band/ Belt for School Children’s /Woman/ Elderly People Security
44. Cell Phone Jammer/ Integrated Indoor Jammer
45. Construction Material/Digital Compression Testing Machine
46. IoT Panel for Door Security System
3l47. Multiple Die Manufacturing Unit
48. Wireless Laptop Charger Cum Cooling Pad
49. Sensor for Breast/Lung Cancer Detection
50. Agriculture Seed & Fertilizer Feeder with Linear Plough Digger
51. Network Device/Network Functions Platform/ Network Computing
52. Defect Display Device for Ad Hoc Network/ Optical Network Terminal
53. Wireless Networking Device For Controlling Home Appliances
54. Detection of Diabetic Analyser/ Apparatus for Healing Diabetic Foot Ulcer
55. Seed/Vegetable Quality Analyser Device/ Colour Image Detection Device/Fruit Processing Machine
56. Device for detecting diseased leaves in plant by image processing
57. Room Heater/ Water heater/ Solar Water Heater
58. LED Light/ Solar Step Light/ Emergency Light/ Photographic Flashlight/ Lighter for Gas Stove
59. Headphone/ Wireless Headphone
60. Border/ Marine Boundary Alert System for Fishermen
61. Food/Metal/Stone/ Image/Data Processing Unit
62. PLASTIC WASTE MANAGEMENT SYSTEM
63. FINANCIAL DATA MANAGING DEVICE IN BANK.
64. Portable Device for Queue Management
65. ATTENDENCE MANAGEMENT SYSTEM
66. Dissolution Testing Apparatus
67. BIO-TELE MONITORING BELT FOR PREGNANT WOMEN
68. Medical Device for Measuring Bodily Fluid in Neonates
69. Drug dissolution Analyzing apparatus
70. Mobile Agitator Vessel for pharmaceutical and chemical industries
71.Pneumatic Stirrer Agitator for pharmaceutical laboratory
72. PHARMACEUTICAL SOXHLET APPARATUS
73. INFRARED TRACKING LIGHT FOR JOINT AND MUSCLE THERAPY
74. Blister Machine for Pharmaceutical Purpose
75. Cartoning Machine for Pharmaceutical Purpose
76. Medical Waste Treatment Device
77. A DEVICE FOR MEASURING HEART RATE AND RESPIRATORY RATE OF FOETUS DURING PREGNANCY
78. CARDIOVASCULAR STENT FOR THE PREVENTION AND MANAGEMENT OF CARDIOVASCULAR DISORDER
79. AI based smart glasses for determining retinal stress
80. BELT FOR SCHOOL CHILDREN SAFETY
81. wireless Medical appliance controlling device
82. ML based robot for determining Crop Yield
83. Facemask banding machine with online payment facility
84. MACHINE LEARNING BASED HEALTH MONITORING WEARABLE DEVICE
85. PLANT MONITORING DEVICE USING IOT
86. SMART TROLLEY WITH PRODUCT TRACKING USING IOT
87. ELECTRONIC VAPORIZATION DEVICE
88. AI based collapsible metal detector
88. IoT BASED BLOOD OXYGEN SATURATION METER
89. IoT BASED WEATHER FORCASTING DEVICE
90. MICROREACTOR FOR NANOPARTICLES SYNTHESIS
91. Artificial Electronic Hand with Electromyographic (EMG) Signals
92.. Machine learning based stress detection device
93. 5G based Remotely control IOT street lamp
94. AI based smart glasses for determining retinal stress
95. BELT FOR SCHOOL CHILDREN SAFETY
96. wireless Medical appliance controlling device
97. ML based robot for determining Crop Yield
98. Facemask banding machine with online payment facility
99. MACHINE LEARNING BASED HEALTH MONITORING WEARABLE DEVICE
100. PLANT MONITORING DEVICE USING IOT
101. SMART TROLLEY WITH PRODUCT TRACKING USING IOT
102. ELECTRONIC VAPORIZATION DEVICE
103. AI based collapsible metal detector
104. TELESCOPIC WALKING AID FOR HANDICAP
105. VESSEL CLEANING ROBOT
106. IOT BASED BIOGAS LEAKAGE DETECTING DEVICE
107. LEAD TOXICITY DETECTOR AND WATER CLEANING MACHINE
108. MICROREACTOR FOR NANOPARTICLES SYNTHESIS
109.Weather and Natural Disasters Prevention and Monitoring Using IOT, AI and ML
110. IoT based Solar Powered Robot for Agriculture
Relevant answer
Answer
Dear Prof., is there any possible PhD position with you? Please guide, Thank you
  • asked a question related to Authentication
Question
5 answers
We are setting up PingFederate in GCP env using devops. The vanilla Ping authentication works without issues.
However, helm charts of Pingfederate does not have annotations / variables to configure x509 on same end-point as regular authentication.
Relevant answer
Answer
The annotation I provided earlier might not directly apply to GCP's global load balancer for your scenario. GCP's load balancer, especially the HTTP(S) load balancer, typically routes traffic based on URL paths, hostnames, and sometimes query parameters, but it doesn’t natively allow different ports on the same endpoint (e.g., sso.company.com:443 and sso.company.com:4444) to route to different backend services.
Why the GCP Load Balancer might not support two different ports for the same endpoint:
  1. Global Load Balancer Architecture: GCP's HTTP(S) load balancer works on a global scale and doesn’t allow multiple services on the same host with different ports. The global load balancer works by sending traffic to backend services based on hostnames, paths, and other routing rules, but it doesn't provide native support for differentiating based on ports like 443 and 4444 under the same domain (sso.company.com).
  2. Port-based Routing Limitation: In GCP's HTTP(S) load balancer, there isn't direct support for routing traffic based on ports, like some other load balancers might support (for example, Nginx). So, you cannot just have two separate listeners on ports 443 and 4444 under the same URL.
  3. HTTPS Port Limitation: For SSL-based traffic (i.e., port 443), it would typically require a separate handling of SSL certificates, but for port 4444, you'd likely need to set up an entirely different listener to handle that traffic.
Possible Workarounds:
  1. Multiple Load Balancers: You could set up two separate HTTP(S) load balancers—one listening on port 443 and the other on port 4444—each routing to different backend services for regular authentication and X.509 authentication. This would allow you to use sso.company.com for both ports but would involve managing two separate load balancers.
  2. Port-based Handling on Backend: Another option would be to have both authentication services (for regular and X.509) on the same backend service but differentiate the traffic by using different paths instead of ports (for example, sso.company.com/auth for regular authentication and sso.company.com/x509 for X.509). This would require modifying the URL structure rather than relying on ports.
  3. Using HTTP(S) with Path Routing: If using a different path for each type of authentication is an option, you can stick with a single load balancer and define path-based routing rules, directing traffic to different backends based on the URL path (/auth vs. /x509).
Bottom Line:
If you want to use two ports (443 and 4444) for the same endpoint on GCP's load balancer, you'd face a challenge since the GCP HTTP(S) load balancer does not support port-based routing natively. Instead, you would need either multiple load balancers or a workaround like path-based routing.
  • asked a question related to Authentication
Question
2 answers
Provide a trustworthy reference also, please. How can we calculate this?
Relevant answer
Answer
The carbon emissions mitigated per megawatt (MW) of solar photovoltaic (PV) installation in a grid-connected system can be estimated by considering the following factors:
  1. Emissions from the conventional power grid mix: The carbon intensity of the electricity generated from the grid depends on the energy sources in the local grid mix (e.g., coal, natural gas, oil, renewable energy, nuclear). The more fossil-fuel-intensive the grid, the higher the carbon emissions.
  2. Solar PV's impact: Solar PV systems produce zero direct carbon emissions during electricity generation. Therefore, the mitigation comes from displacing the electricity that would have otherwise been produced by fossil fuels in the grid.
Estimating the Carbon Emissions Mitigated
To calculate the carbon emissions mitigated per MW of solar PV installation, we need the following:
  1. Carbon intensity of the grid (in grams of CO2 per kilowatt-hour or gCO2/kWh): This is typically specific to the region and depends on the energy mix of the grid.
  2. Energy generation capacity of 1 MW of solar PV: This is influenced by factors such as the number of sunlight hours per day (solar irradiation), the efficiency of the panels, and the capacity factor (the ratio of actual energy output to maximum possible output).
General Steps for Calculation
  • Annual Energy Production from 1 MW of Solar PV:Annual Energy Production=Capacity (MW)×Capacity Factor×Hours in a Year (8760)\text{Annual Energy Production} = \text{Capacity (MW)} \times \text{Capacity Factor} \times \text{Hours in a Year (8760)}For example, assuming a capacity factor of 20% (this can vary depending on location), the annual energy production from 1 MW of solar PV would be:1 MW×0.20×8760 hours=1,752 MWh/year1 \, \text{MW} \times 0.20 \times 8760 \, \text{hours} = 1,752 \, \text{MWh/year}This means 1 MW of solar PV could generate approximately 1,752 MWh per year, assuming a 20% capacity factor.
  • Carbon Emissions Mitigated (tons/year)=Annual Energy Production (MWh/year)×Carbon Intensity of Grid (gCO2/kWh)1000\text{Carbon Emissions Mitigated (tons/year)} = \frac{\text{Annual Energy Production (MWh/year)} \times \text{Carbon Intensity of Grid (gCO2/kWh)}}{1000}Carbon Emissions Mitigated: If the carbon intensity of the grid electricity is X gCO2/kWhX \, \text{gCO2/kWh}, then the total carbon emissions mitigated annually by the solar PV system would be:Carbon Emissions Mitigated=Annual Energy Production×Carbon Intensity of Grid\text{Carbon Emissions Mitigated} = \text{Annual Energy Production} \times \text{Carbon Intensity of Grid}In terms of metric tons of CO2:
Example Calculation
Let's assume the following:
  • The grid's carbon intensity is 500 gCO2/kWh (a typical value for a grid mix with significant fossil fuel contribution).
  • 1 MW of solar PV generates approximately 1,752 MWh annually (with a 20% capacity factor).
The carbon emissions mitigated would be:
Carbon Emissions Mitigated=1,752 MWh/year×500 gCO2/kWh1000\text{Carbon Emissions Mitigated} = \frac{1,752 \, \text{MWh/year} \times 500 \, \text{gCO2/kWh}}{1000} Carbon Emissions Mitigated=876,000 kg CO2/year=876 tons CO2/year\text{Carbon Emissions Mitigated} = 876,000 \, \text{kg CO2/year} = 876 \, \text{tons CO2/year}
So, 1 MW of solar PV installation in a grid-connected system with a 500 gCO2/kWh carbon intensity grid could mitigate approximately 876 tons of CO2 per year.
Important Considerations:
  • Grid Carbon Intensity: This value can vary widely based on the local energy mix. In regions heavily reliant on coal, the carbon intensity could be higher (e.g., 900–1000 gCO2/kWh), whereas grids with a higher share of renewable energy will have lower carbon intensities (e.g., 100–300 gCO2/kWh).
  • Capacity Factor: The actual energy produced by solar depends on geographic location, local weather patterns, and the technology used. The capacity factor for solar typically ranges between 15% and 25%, but it can vary.
Conclusion:
For a grid with a carbon intensity of 500 gCO2/kWh, 1 MW of solar PV can mitigate approximately 876 tons of CO2 per year. This number will vary depending on the region's grid mix and solar generation conditions.
  • asked a question related to Authentication
Question
3 answers
What are the critical security considerations prompt engineers must address when crafting prompts for sensitive data interactions, and how can they mitigate risks related to data privacy, injection attacks, model exploitation, ethical bias, and the secure handling of user authentication and access control? Additionally, how can prompt engineers implement auditing mechanisms and ensure ethical safeguards while maintaining system performance and preventing misuse of AI-generated content?
Relevant answer
Answer
use one-way hashing to verify the integrity of sensitive data at the secure socket layer (SSL) which uses transport layer security (TLS) it works between the application layer and the transport layer
  • asked a question related to Authentication
Question
5 answers
I am looking for simulating a VANET environment where I can use Elliptical curve Cryptography also. Is there any suitable tool or any suggested approach to carry out this?
looking in terms to carry out secure authentication.
Thanks and Regards
Relevant answer
  • asked a question related to Authentication
Question
6 answers
I want to test user authentication through simulation tool in cloud computing because its part of thesis. Can anyone please guide or provide me simulation tools for user authentication in cloud computing and also what are the simulation tools free available on internet regarding user authentication in cloud computing?.
Thanks for your valuable guidance
Relevant answer
  • asked a question related to Authentication
Question
3 answers
Which is the best simulation tool I can use to implement location based authentication?
Relevant answer
Answer
Tool Avispa can be useful and reading these two articles will help you
  • asked a question related to Authentication
Question
5 answers
what is the scope of research in location based authentication in IOT?
Relevant answer
Answer
Dear Prof. Vimal Rathod,
IoT Researchers have explored how user location can serve as an additional factor for authentication, especially in scenarios where physical presence matters—such as making in-person purchases or unlocking a vehicle. The idea is to leverage the vast network of IoT devices to estimate user location more robustly than relying solely on smartphones. Here are the key points from this research:
  1. The Problem: Traditional authentication methods often rely on something you know (like a password) or something you have (like a physical token). However, these methods don’t always account for the physical context. For instance, if someone steals your credentials and tries to access your account from a different location, it’s challenging to detect.
  2. The Solution: The proposed approach involves estimating user location using IoT devices. These devices are carried by users or placed in smart environments. By observing these devices, the system can build a more accurate picture of where the user is physically located. This approach aims to prevent adversaries from using compromised credentials when they are not actually present at the expected location.
  3. Icelus System: The researchers built a system called Icelus to demonstrate this concept. Icelus combines data from various IoT devices to estimate user location. Importantly, it exhibits a smaller false-rejection rate compared to smartphone-based location-based authentication (LBA), meaning it’s better at distinguishing legitimate users from attackers. Fewer errors (false acceptances) occur with Icelus.
  4. Benefits: By incorporating IoT-based location estimation, this approach enhances security while maintaining usability. It’s particularly useful for scenarios where physical presence matters, such as accessing secure facilities or authorizing transactions.
  5. Challenges: Of course, there are challenges, including privacy concerns related to tracking user location. Researchers need to strike a balance between security and privacy.
research-article
Location-enhanced authentication using the IoT: because you cannot be in two places at once
Authors: Ioannis Agadakos, Per Hallgren, Dimitrios Damopoulos, Andrei Sabelfeld, Georgios Portokalidis Authors Info & Claims
ACSAC '16: Proceedings of the 32nd Annual Conference on Computer Security Applications
Pages 251 - 264
  • asked a question related to Authentication
Question
4 answers
In quantum cryptographic protocols, participants typically share both a quantum channel and a classical authenticated channel. Authenticated channels ensure that messages come from legitimate senders and have not been tampered with. However, these channels do not inherently protect against the interception or blocking of messages by an adversary. Blocking or delaying messages in the classical channel is considered an active attack.
Many sources, including the first article in quantum key distribution by Bennett and Brassard, mention that the public channel between participants is only susceptible to passive attacks, not active attacks.
My question is: In quantum cryptographic protocols (such as QKD, QSS, and QPC), can an attacker block or delay messages in the public channel without being detected? If so, wouldn't that compromise the security of many well-established protocols such as the BB84?
  • asked a question related to Authentication
Question
1 answer
I am doing research in the field of IoT.I need guidance for identifying research topic in location based authentication.
Relevant answer
Answer
Location-based authentication is an interesting area of research in the Internet of Things (IoT) that offers a wide array of exciting research possibilities. Below are a few potential research topics that could be explored in the future:
  • Privacy-Preserving Location-based authentication
  • Context-Aware Authentication
  • Blockchain-Based Location-based authentication
  • Energy-Efficient Location-based authentication
  • Multi-Factor Authentication
  • asked a question related to Authentication
Question
1 answer
could i please get an example Use case diagram for fingerprint authentication in a mobile banking app?
Relevant answer
Answer
Certainly! Below is an example of a use case diagram for fingerprint authentication in a mobile banking app:
+---------------------------------------------+ | Mobile Banking App | +---------------------------------------------+ | Fingerprint | +---------------------------------------------+ | Authenticate | +---------------------------------------------+ | Verify Identity | +---------------------------------------------+ | Access Account | +---------------------------------------------+
In this use case diagram:
  • "Mobile Banking App" is the main actor interacting with the system.
  • "Fingerprint" is a use case representing the fingerprint authentication feature.
  • "Authenticate" is a use case where the user is prompted to authenticate using their fingerprint.
  • "Verify Identity" is a use case where the system verifies the user's identity using the fingerprint data.
  • "Access Account" is a use case where the user gains access to their banking account after successful fingerprint authentication.
This diagram illustrates the flow of actions and interactions between the user, the fingerprint authentication feature, and the mobile banking app in the context of accessing the banking account securely using fingerprint authentication.
  • asked a question related to Authentication
Question
3 answers
I have isolated granulosa cells from mice ovary using puncture method. Cells are healthy and growing in DMEM. Their morphology is same as granulosa cells. However I would like to use a molecular markers or Immunohistochemistry method to authenticate them further, before downstream use. Can anyone suggest the best methods and markers for the same ?
Relevant answer
Answer
Dear Dr. Khare,
I had flow in mind too. When it is between ICC vs flow cytometry, you should opt for flow cytometry as per your requirement.
Best.
  • asked a question related to Authentication
Question
1 answer
I am doing my phd in parapsychology, I would like to know any authenticated questioners regarding this.
Relevant answer
Answer
  • asked a question related to Authentication
Question
5 answers
The recognition process of all types of biometrics relies on the probabilistic judgment of variable physical and / or behavioral features of human beings. However, an authentication system requires the recognition result from authenticating the right person deterministically. But, biometrics recognition is inherently probabilistic and hence unreliable. Biometrics recognition can not yield a deterministic "yes/no" result as text passwords/PINs. Thus, biometrics can lower security.
Relevant answer
Answer
I appreciate the valuable time you spent writing your thoughtful answers.
Rachid Ait Maalem Lahcen, You mentioned it correctly: "and convenient."
Yashar Salami, You mentioned correctly: "false positives or false negatives."
Indeed, biometrics is not a fallacy; biometrics bear recognizable features of human beings.
Biometrics has so many security-lowering features!
A probabilistic recognition process can NOT be used to yield a deterministic "yes/no" result like a text password/PIN.
Moreover, biometrics spoofs are so easy to make.
How can biometrics improve security?
With more than a decade of hands-on research with different biometrics modalities, I realized biometrics is convenient, but biometrics can lower security. Biometrics has inherent security-lowering problems!
Please read my brief review article, "Biometrics is Not a Fallacy, But Can Lower Security." https://www.linkedin.com/pulse/biometrics-fallacy-can-lower-security-debesh-choudhury-phd/
Thank you so much.
  • asked a question related to Authentication
Question
3 answers
Also, I would like to know how can I proceed with learning the usage of Proverif2.0, RoM and BAN Logic for a particular proposed authentication scheme.
Relevant answer
Answer
Implementing an authentication scheme involves several steps to ensure that the system is secure, user-friendly, and effective. Here are some general steps to consider when implementing an authentication scheme:
  1. Define the requirements: Clearly outline the goals and objectives of the authentication scheme, including the level of security needed, the user experience requirements, and any regulatory or compliance considerations.
  2. Choose the right authentication method: Select an authentication method that aligns with the security requirements of the system and the needs of the users. This could include password-based authentication, biometric authentication, two-factor authentication, or multi-factor authentication.
  3. Develop the authentication system: Design and develop the authentication system, including the user interface, backend processes, and integration with existing systems. Consider factors such as scalability, performance, and compatibility with different devices and platforms.
  4. Implement security measures: Implement security measures to protect the authentication system from unauthorized access, such as encryption, secure communication protocols, and monitoring tools to detect and respond to security threats.
  5. Test the authentication system: Conduct thorough testing of the authentication system to ensure that it functions as intended, is user-friendly, and meets the security requirements. This may include usability testing, security testing, and performance testing.
  6. Deploy the authentication system: Deploy the authentication system in a controlled environment, such as a test environment or a limited user group, to identify and address any issues before full deployment.
  7. Monitor and maintain the authentication system: Continuously monitor the authentication system for security vulnerabilities, performance issues, and user feedback. Regularly update and maintain the system to address any issues and ensure that it remains secure and effective.
By following these steps and incorporating best practices in authentication and security, organizations can successfully implement an authentication scheme that meets their security needs and provides a positive user experience.
  • asked a question related to Authentication
Question
3 answers
I'm interested in understanding the practical implementation of authentication and authorization using .NET Identity, specifically in the context of accommodating individual user schedules. If you've worked on such scenarios or have insights into the integration of .NET Identity with personalized schedules, I'd love to hear your experiences and recommendations
Relevant answer
Answer
.NET Identity is a powerful framework for implementing authentication and authorization in a system. To incorporate individual user schedules into the authentication and authorization process, you can follow these steps:
1. Set up .NET Identity: Start by configuring and setting up .NET Identity in your system. This involves creating a user store, defining user roles, and configuring authentication options such as cookie settings and password complexity requirements.
2. Extend the User Model: In your user model, you can add fields or properties to store individual user schedules, such as availability, working hours, or specific time slots.
3. Custom Authentication Logic: Implement custom authentication logic to validate a user's schedule during the authentication process. For example, you can check if the user is within their scheduled working hours or if they have any specific restrictions in accessing certain resources during specific times.
4. Custom Authorization Logic: Extend the default authorization process to incorporate the user's schedule. When authorizing a user's access to specific resources or actions, consider their schedule as a factor. You can implement custom authorization attributes or policy-based authorization rules that take into account the user's schedule. This can be done by checking against the user's schedule properties stored in the user model.
5. Handle Schedule Updates: If user schedules can change dynamically, ensure that you appropriately handle schedule updates. This may involve updating the user model or revalidating the user's schedule during sessions to reflect any changes.
6. Testing and Validation: Thoroughly test the authentication and authorization process, including the handling of individual user schedules. Test different scenarios, such as accessing resources within and outside scheduled hours, to ensure the system behaves as expected.
Remember to always follow best practices in secure coding and protect sensitive user schedule information by properly handling data encryption, access controls, and data privacy measures.
By integrating individual user schedules into the authentication and authorization process, you can ensure that access to resources is granted or restricted based on the specific schedule requirements of each user.@
  • asked a question related to Authentication
Question
2 answers
Where can i find pesudo implementation for cloud auditing mechanism proposed in "Enabling Parity Authenticator based public auditing with protection of a valid user revocation in cloud". I am attaching the paper to help people help me, I hope i am not breaking any rules here.
PS: I tried contacting the authors of the paper through on their official emails but didnt get any responce.
Relevant answer
Answer
Yes, research papers and academic literature often propose and describe theoretical or pseudo-implementations for cloud auditing mechanisms. These pseudo-implementations are not actual production-ready software systems but rather conceptual or abstract representations of how a particular cloud auditing mechanism could work. These pseudo-implementations serve several purposes in the research and academic context:
  1. Proof of Concept: Pseudo-implementations can demonstrate the feasibility of a proposed cloud auditing mechanism. Researchers use them to show that their ideas and algorithms can work in practice, even if not at the scale and robustness required for production use.
  2. Evaluation and Comparison: Researchers often use pseudo-implementations to evaluate and compare the performance, efficiency, and security of different cloud auditing mechanisms. These implementations provide a common basis for evaluating different approaches.
  3. Education and Understanding: Pseudo-implementations can help researchers and readers of research papers better understand the inner workings of a proposed mechanism. They provide a concrete representation of the theoretical concepts described in the paper.
  4. Prototyping: Pseudo-implementations can serve as a starting point for the development of actual software systems. Once the theoretical concepts are validated through pseudo-implementations, researchers or developers may proceed to create practical implementations.
  5. Open-Source Contributions: Some researchers choose to release their pseudo-implementations as open-source projects. This can encourage collaboration, further research, and real-world adoption of the proposed mechanisms.
It's important to note that while pseudo-implementations are valuable for research and development, they may lack the robustness, scalability, and security required for real-world cloud auditing in production environments. Building a production-ready auditing system involves addressing numerous challenges related to scalability, security, compliance, and integration with existing cloud platforms, and it often requires extensive testing and validation.
Researchers and organizations interested in implementing cloud auditing mechanisms in production environments typically use the insights gained from research papers and pseudo-implementations as a starting point and then invest additional resources to create reliable and secure systems that meet industry standards and requirements.
Several general steps can be suggested to help you find relevant research papers and pseudo-implementations on cloud auditing mechanisms:
  1. Academic Search Engines: You can use academic search engines like Google Scholar, Microsoft Academic, or specialized databases like IEEE Xplore or ACM Digital Library. Use keywords like "cloud auditing mechanism pseudo-implementation" or specific terms related to the type of auditing mechanism you're interested in (e.g., "cloud security audit," "cloud compliance auditing").
  2. University Libraries: University libraries often provide access to a wide range of research papers and academic journals. If you have access to a university library, you can use their resources to search for relevant papers.
  3. Research Conferences and Journals: Look for research papers presented at conferences and published in reputable journals related to cloud computing, cybersecurity, and information security. Examples of conferences include ACM CCS, USENIX Security, and IEEE Security & Privacy.
  4. Citation Chains: Once you find a relevant research paper, check its references and citations. This can lead you to other papers that discuss or cite pseudo-implementations or related work.
  5. Researcher Websites: Sometimes, researchers publish their papers, projects, and pseudo-implementations on their personal websites or institutional pages. If you know the names of specific researchers in the field, you can explore their online profiles.
  6. Open-Source Repositories: For pseudo-implementations released as open-source projects, platforms like GitHub can be a valuable resource. You can search GitHub for relevant repositories and projects related to cloud auditing mechanisms.
Remember to critically evaluate the sources you find, considering factors like the reputation of the journal or conference, the credibility of the authors, and the relevance of the content to your research or interests. Additionally, if you have access to academic databases through a university or institution, you may have better access to academic papers and resources.
  • asked a question related to Authentication
Question
1 answer
provide any suggestions from studies to support this question
Relevant answer
SQL Injections:
Apply parameterized queries or prepared statements to ensure proper input sanitization and prevent SQL injection attacks.
Implement input validation and filtering to detect and reject malicious SQL queries or suspicious characters.
Utilize an ORM (Object-Relational Mapping) framework or query builder that handles SQL injection prevention automatically.
Long Method:
Break down the long method into smaller, more manageable and cohesive functions or methods.
Identify logical sections within the long method and extract them into separate functions with meaningful names.
Apply the Single Responsibility Principle (SRP) to distribute the functionality among multiple methods.
Consider using helper functions or utility classes to encapsulate repetitive or common code fragments.
Feature Envy:
Identify and analyze the code that exhibits feature envy by closely examining dependencies on external classes or excessive method calls.
Apply the Extract Method refactoring to move the code that envies another class's features into the class it belongs to.
Utilize appropriate encapsulation techniques, such as moving related data and behavior into the same class, to minimize feature envy.
Consider applying the Move Method refactoring to relocate methods to the class that possesses the required data.
Insecure Authentication:
Implement a secure authentication mechanism that utilizes strong password hashing algorithms, such as bcrypt or Argon2.
Enforce password complexity requirements and encourage users to choose strong passwords.
Implement mechanisms for account lockouts, password reset procedures, and multi-factor authentication (MFA) if necessary.
Apply secure session management techniques, including secure token handling, session expiration, and secure cookie settings.
Insecure Authorization:
Implement a robust role-based access control (RBAC) system to enforce proper authorization.
Conduct a thorough review of the authorization logic to ensure that sensitive operations and data are properly protected.
Apply the Principle of Least Privilege (PoLP) by granting only the necessary permissions to each user or role.
Regularly conduct security audits and penetration testing to identify and address any vulnerabilities in the authorization mechanism.
Remember, these refactorings should be applied in conjunction with other security best practices and measures to ensure a comprehensive approach to security. It is essential to continually assess and update security measures as new vulnerabilities emerge.
  • asked a question related to Authentication
Question
11 answers
If yes, would you please provide examples from literature.
Relevant answer
Answer
"untargeted analysis" is fine, if the data are valid, but they are not in this case and using them as you suggest is invalid. In any case, now Mohamed Mahmoud has been provided with professional advice that he should not use the raw area % units from his analysis data outside of the one analysis method. To write any more would be repetitive and a waste of Mohamed Mahmoud's time as his question has been answered.
I wish you luck with your classes at school Jokin and thank Mohamed Mahmoud for his patience.
  • asked a question related to Authentication
Question
4 answers
Which authentication schemes would perform better than improved Feige–Fiat–Shamir (IFFS) for modeling a secure IoT-integrated WBAN framework for e-healthcare?
Relevant answer
Answer
Dear Opeyemi A. Ajibola,
You may want to look over the following data:
An improved parallel interactive Feige-Fiat-Shamir identification scheme with almost zero soundness error and complete zero-knowledge
_____
_____
Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption
_____
_____
Feige-Fiat-Shamir and Zero Knowledge Proof
_____
_____
  • asked a question related to Authentication
Question
4 answers
Note: We will devote a set of questions to Functional Requirements
We will have another set of questions related to non-functional requirements later.
[1]
The functional requirements (First) describe the functionalities required from the system, such as business rules, transaction corrections, adjustments and cancellations, administrative functions, Authentication, and Authorization levels (Second).
First:
The functional and non-functional requirements present the Problem Space, and no one knows how to define and understand the Problem Space.
Why?
Because if we know how to understand the Problem Space, we will be able to:
1. Stop the nightmare of Maintenance, and we can implement preventive Maintenance.
2. Stop reinventing the wheels.
3. Develop self-manageable, self-adaptable, self, extendable, and self-configurable systems with unlimited applicability, reuse, and other quality properties of the system development.
Second:
(1) The functionalities described above do not tell the software and system requirements and only represent the business properties, which is very easy to do. It has been business as usual. Where are we now?
(2) Limited to business software and has nothing to do with critical life & time software systems, Aerospace, defense, and others,
(3) Limited to developing an instance-oriented software system which would lead to within and out reinventing the wheels.
(4) How to guarantee the business rules, transaction corrections, and others
Relevant answer
Answer
Hello Fatemeh Sarpourian,
You said: Any system has functional and nonfunctional needs.
My Reply: Yes, I agree.
You said: Nonfunctional needs such as safety, efficiency, speed, and ...
My reply:
(1) Nonfunctional requirements are enduring. Therefore speed is not a nonfunctional requirement.
(2) Generic nonfunctional requirements, and it is not executable.
(3) Some generic nonfunctional requirements are impossible in current software developments.
(4) We must tie nonfunctional requirements to the system we build because we develop the system's requirements, not the software.
You said: Functional needs depend on the type of system. Such as Telerehabilitation systems, Virtual reality exergame, and ...
My Reply:
Excellent. Functional and nonfunctional needs (represent the problem space) depend on the type of system.
The reality is shown in my answer to Mr. Dennis Hamilton
And let me repeat them here.
Several reasons why we don't know how to work on the problem space:
1) Humans are trained and educated as solution-oriented, including yourself.
2) Most existing publications and books ignore talking about the problem space.
3) Software developers and system manufacturers ignore the problem space because of wealth by reinventing the wheel and creating new versions of the same product every year. Look at the iPhone, for example:
Of massive systems: a few upgrades to the iPhone version, the consumer pays the same amount or more yearly. If you are a fan of the iPhone and you buy an iPhone every year, you have spent more than 20K to 25K on the iPhone alone in the last 14 years.
  • asked a question related to Authentication
Question
5 answers
The first 5G radio networks are now live. This generation of telecommunication system aims to deliver
  • Enhanced mobile broadband,
  • Massive machine-type communications,
  • Ultra-reliable and low latency communications.
The purpose is to be faster, more reliable and manage the scale of devices predicted for the Mobile Internet of Things (MIoT). Enabling the digital transformation of our society, business processes and manufacturing. To enable this, 5G will deliver multi-network slicing, multi-level of services and multi-connectivity network capabilities. To allow the required flexibility, agility and economies of scale these technologies will be delivered via virtual and containerised environments. This is a revolutionary way of working for the industry. 5G has designed in security controls to address many of the threats faced in today’s 4G/3G/2G networks. These controls include new mutual authentication capabilities, enhanced subscriber identity protection, and additional security mechanisms. 5G offers the mobile industry an unprecedented opportunity to uplift network and service security levels. 5G provides preventative measures to limit the impact to known threats, but the adoption of new network technologies introduces potential new threats for the industry to manage.
Relevant answer
Answer
The security of data transmitted via the ubiquitous 5G communication network infrastructure is a paramount concern. While 5G offers incredible speed, low latency, and increased capacity, it also presents new security challenges. The sheer volume of data flowing through the network increases the attack surface and makes it more attractive to cybercriminals. However, efforts have been made to enhance security in 5G, including stronger encryption, improved authentication protocols, and network slicing to isolate different types of traffic. Additionally, advanced technologies like artificial intelligence and machine learning can be employed to detect and mitigate potential threats. Nonetheless, as with any communication network, achieving absolute security is a complex task that requires ongoing collaboration between industry, government, and cybersecurity experts to ensure the protection of user and cloud data in the era of ubiquitous 5G.
  • asked a question related to Authentication
Question
1 answer
what are the different measures we can consider for calculating the trust score of web application whose authentication is based on oauth2.0
Relevant answer
Answer
Calculating the trust score for a web application with OAuth 2.0 authentication involves considering several measures to assess its reliability. First, the reputation of the OAuth provider and the security of their infrastructure can be evaluated. Second, the authentication flow can be analyzed for vulnerabilities, such as improper handling of tokens or insufficient validation. Third, the implementation of secure communication protocols, like HTTPS, can be assessed. Fourth, the application's authorization mechanisms should be scrutinized to ensure that access controls are properly enforced. Additionally, monitoring and logging mechanisms can contribute to the trust score, allowing for proactive identification of suspicious activities. Lastly, the overall maturity of the application's security practices, including regular audits, vulnerability patching, and adherence to best practices, should be considered. By combining these measures, a comprehensive trust score can be established to assess the reliability of a web application utilizing OAuth 2.0 authentication.
  • asked a question related to Authentication
Question
5 answers
How Can We use Artificial Intelligence technology in user authentication in Wireless Communication?
Every user needs to get authenticated before connecting to network. Here we want to do this process using Artificial Intelligence technology.
Here how AI can be used for this authentication process?
Relevant answer
Answer
Security provisioning has become a key issue in wireless multimedia networks due to their vital roles in supporting various services. Conventional security solutions have deficiencies in computing efficiency and addressing emerging security challenges. In addition, traditional upper-layer authentication ignores the protection of the physical layer, leading to severe privacy data leakage.
Regards,
Shafagat
  • asked a question related to Authentication
Question
1 answer
Is there any alternative approach to show the performance evaluation in designing and analysis of authentication key agreement protocols?
is the ROC curve good? instead of conventional Bar charts?
Are there any other alternatives ??
Relevant answer
Answer
Muralidhar Patruni Muralidhar, From the US National Institute of Health (NIH) is this article explaining and comparing Precision-Recall Plots (PRC) to a very specific type of ROC. It may however offer a way to think about its usefulness. Also, on the right side of the web page is a small box that says, "similar articles". Try the first one listed..........
  • asked a question related to Authentication
Question
1 answer
DNA marker
Relevant answer
Answer
Dear Satish Kumar Khadia,
Molecular markers are stretches of DNA that are located within the entire genome of a plant you can use the markers for medicinal plant authentication. DNA markers are not tissue-specific and thus can be detected at any stage of plant development. You can use molecular markers such as SCAR (Sequence Characterized Amplified Regions), LAMP (Loop Mediated Isothermal Amplification), SSRs (Simple Sequence Repeats), and SNPs (Single Nucleotide Polymorphisms) for the identification of medicinal plants.
  • asked a question related to Authentication
Question
3 answers
Assuming this publication about multi-factor self-sovereign identity authentication:
The question arises of how to manage a library for a challenge set that needs to be responded to by either a device, a system, an organization, or a human.
Relevant answer
Answer
  1. Determine the types of challenges to include in the library: Depending on the desired level of security and the resources available, you might include knowledge-based challenges (e.g., "What is your mother's maiden name?"), possession-based challenges (e.g., "What is the last four digits of your phone number?"), or inherence-based challenges (e.g., biometric authentication). You might also consider using one-time password (OTP) systems, which use a shared secret and a time-based or counter-based algorithm to generate a unique password for each login attempt.
  2. Create the challenge sets: For each type of challenge, you will need to create a set of challenges that can be used to verify a user's identity. These challenges should be selected based on their effectiveness in identifying the user, as well as their difficulty for attackers to guess or otherwise bypass.
  3. Store the challenge sets: The challenge sets should be securely stored in a database or other secure location. To further secure the challenge sets, you might consider encrypting them using a strong, cryptographically secure cipher such as AES or ChaCha20.
  4. Use the challenge sets in MFA processes: When a user attempts to log in or perform some other action that requires MFA, select a set of challenges from the library and present them to the user. They will need to successfully complete these challenges in order to gain access.
  5. Update the challenge sets regularly: It is important to regularly review and update the challenge sets in your library to ensure that they remain effective at verifying user identities. This might involve adding new challenges or retiring old ones that are no longer effective. You should also consider rotating the challenge sets on a regular basis to reduce the risk of attackers being able to guess the challenges through repetition.
  • asked a question related to Authentication
Question
5 answers
..
Relevant answer
Answer
Dear Achyut
The difference is related to frequency range you consider. Ellipsometry and refractive index most often relates to optics, obviously, and thus optical frequencies in the 100-1000 THz range generally expressed in wavelength 200-2000 nm for UV-Visible-NIR. Dielectric function, the word constant is confusing, neglecting magnetic properties, is the square of index and ellipsometry is a good technique to find it in the instrument range.
Most often, people mention static dielectic constant, valid in much lower frequency range, typically for microwaves and below. Molecules, atoms, ions and electrons respond specifically and differently in each specific frequency (or energy or wavelength) range.
  • asked a question related to Authentication
Question
341 answers
I received a mail few days ago ''Congratulations! Your nominated profile has been selected for the "International Research Award on New Science Inventions" under the category of "Young Scientist Award". Kindly complete your registration process as earlier as possible and use your submission ID for the further registration process''
Is this real or just a scam?
Relevant answer
Answer
Yesterday, I received an email from ScienceFather after my recent publication. The message I received.
"Congratulation! Your nominated profile has been selected for the "International Research Awards on New Science Inventions" under the category of "Best Researcher Award".
Once you registered, they will ask for payment at the end, so don’t respond. It's a forgery.
  • asked a question related to Authentication
Question
2 answers
we are going to carry out some epigenetic experimentations. definitely we need to count the cells. however some samples are dried-freeze cell pellet and had reserved in -80 freezer. the question is can we use them for cell counting after that long-term freezing? are they intact? is it authenticated??
Relevant answer
Answer
The probability is less that the cells may be intact.
Usually, freeze drying which removes moisture through sublimation, has been used for long-term storage of food and drugs.
Freeze-drying of cells, is done less frequently due to difficulties to load cells with lyoprotectants. Bacteria and yeast are inherently more resistant towards drying stress and by washing the cells with cryoprotectant before lyophilization helps. Moreover, these cells synthesize lyoprotectants upon exposure to stress and can be freeze-dried, while resuming metabolism upon rehydration.
However, mammalian cells typically do not survive freeze drying. I suppose these cumulus cells won’t be intact for cell counting.
Best.
  • asked a question related to Authentication
Question
2 answers
Hi everyone, i am in desperate need on the STR authentication of some of the Pancreatic Cancer cell line for my publication. We purchased the cell lines including PANC-1, ASPC1, BxPC3 and HPDE6 from ATCC long ago but now we need its STR authentication , Can someone help us out by providing the required authentication. Your cooperation in this regard will be highly appreciated.
Relevant answer
Answer
Hi
You can find STR profiles of cell lines in the Cellosaurus.
For example, for the PANC-1 cell line, go to:
and go to the STR profile section.
However I am a bit worried when you say ""We purchased the cell lines including PANC-1, ASPC1, BxPC3 and HPDE6 from ATCC long ago but now we need its STR authentication": what you need to do is not to look up the STR profile of a cell line and include it in your publication. You need to perform a STR profile analysis of the batches of cell lines you are using in your lab to check if they have not become contaminated. There are many labs that can do that in China, so you need to send your samples to one of these labs.
Furthermore another thing worry me: HPDE6 was never distributed by ATCC. I am not sure if you are referring to HPDE-6/E6E7 or derived cell lines called HPDE6c7 and HPDE6c11, see:
but none of these cell lines are or were in the ATCC catalog. So if you are using it, it comes from another source. Unfortunatly there is no public STR profile for these cell lines and so you will not be able to authenticate it except if the lab that gave you this cell line has a STR profile from the originating lab (at McGill).
Best regards
Amos
  • asked a question related to Authentication
Question
9 answers
I am review security requirements frameworks for UAV security. I want to cover UAV security with CIA principles with authentication and non-repudation. Can I add these into the CIA triad?
Relevant answer
Answer
Hi,
Integrity means your data/content remains intact and no unauthorized modification hasn't done on it. With authentication, you can filter out the attacker. However, you cannot make sure that any unauthorized person has accessed it or not. Anyone has modified it or not. To cover CIA traid, You can merge with blockchain which you assist you to meet your goal. I have some papers which might give you hints.
Thanks.
  • asked a question related to Authentication
Question
4 answers
Hi friends i want to know the basic authentication for Elliptic curve cryptography for IOT devices in Verilog code also with SDk
Relevant answer
Answer
  • GitHub - pansygrass/ecc: Verilog for a SECDED Hsaio ECC ... https://github.com/pansygrass/ecc📷Apr 28, 2015 · Verilog for a SECDED Hsaio ECC and a DEC ECC. Power, delay, and area are compared for Berkeley MASIC EEW241B - Advanced Digital Integrated Circuits. - GitHub - pansygrass/ecc: Verilog for a SECDED Hsaio ECC and a DEC ECC. Power, …
  • [PDF]DESIGN AND VERIFICATION OF IMPROVED HAMMING CODE … www.digitalxplore.org/up_proc/pdf/278-148949329114-18.pdf Design and Verification of Improved Hamming Code (ECC) using Verilog Proceedings of ISETE International Conference, 04th February 2017, Bengaluru, India, ISBN: 978-93-86291-63-9 16 This code word shown is transmitted or stored in the memory. At the receiving end, the parity bits are uprooted. A parity check is performed between the
  • Where can I get a Verilog code for quad? The QuAd library contains MATLAB codes for generating verilog codes of any configuration of QuAd. It also contains functional MATLAB model of QuAd that can be used for simulations at higher abstraction levels. The library also includes PMF and Error Estimation code for QuAd configurations.verilog code free download - SourceForgesourceforge.net/directory/?q=verilog%20code How to write Verilog code for counter with testbench?Verilog code for Full Adder 20. Verilog code for counter with testbench 21. Verilog code for 16-bit RISC Processor 22. Verilog code for button debouncing on FPGA 23. How to write Verilog Testbench for bidirectional/ inout ports 24. Tic Tac Toe Game in Verilog and LogiSim 28. Verilog code for Decoder 29. Verilog code for Multiplexers 30.Verilog code for counter with testbench - FPGA4student.comwww.fpga4student.com/2017/03/verilog-code-for-counte… What is the Verilog code for a microcontroller?Verilog code for basic logic components in digital circuits 6. Verilog code for 32-bit Unsigned Divider 7. Verilog code for Fixed-Point Matrix Multiplication 8. Plate License Recognition in Verilog HDL 9. Verilog code for Carry-Look-Ahead Multiplier 10. Verilog code for a Microcontroller 11. Verilog code for 4x4 Multiplier 12.Verilog code for counter with testbench - FPGA4student.comwww.fpga4student.com/2017/03/verilog-code-for-counte… Which is the Verilog based BCH encoder / decoder?Add CONFIG_PIPELINE_LFSR for bch_encode. Limit $clog2 usage, Xilinx can't handle it it many situations. Verilog BCH encoder/decoder. This is a Verilog based BCH encoder and decoder for single bit, dual bit, and 3 or more bit error correction.GitHub - russdill/bch_verilog: Verilog based BCH encoder ...github.com/russdill/bch_verilog
  • asked a question related to Authentication
Question
4 answers
As to deal with micro scale problem we have to constricted by some political or administrative boundary , which may conflict with regional aspect or may not be accurately authenticated with overall geological, geomorphological and geographical perspective. Again natural scale regional focus may dilute the specific spatial issues . That's why the question arises.
Relevant answer
Answer
Dear just try to use uncle google, you will find lots of article regarding to your request!
Regards
  • asked a question related to Authentication
Question
3 answers
Hello everyone
I want simulate authentication in IoT with blockchain in a simplest way. I work with Ganache and Solidity in remix.ethereum.org. I have a academic project. Please help me... Thanks
Relevant answer
  • asked a question related to Authentication
Question
10 answers
What are the criteria publishers use to check authenticity of submitted papers?
What are some software they use for authentication of manuscripts?
Relevant answer
Dear Honorable Researchers,
From my point of view, I don't recommend you to use any free software checkers of plagiarism.
I haven't used them before because I am afraid that the original content of my manuscript may be copied and sold to others before I can publish it.
I know that the problem is not easy for us, especially that we haven't enough money to buy enough food and, in turn, to buy such software. Unfortunately, you have to pay for the sake of getting good results. So, I always write using my own words.
In any way, it is not well for your reputation if there were accusations of plagiarism. This is because plagiarism is a sin! If it is, severe action may be taken and/or legal notice may be given.
Kindly, could you please see the following warning that is related to this valuable question of Prof. Milind Daftari?
  • asked a question related to Authentication
Question
14 answers
Is it possible that different species of particular plant encountered in a specific forest area is totally different from the previous report when surveyed after about a decade? If yes, what can be the tentative reason?
I feel that it is probably due to lack of proper identification and authentication.
Please help to find a reason.
Relevant answer
Answer
Which is why journals should demand that voucher specimens be deposited in a given herbarium before accepting a paper for publication, so that identifications can be verified. As it is, journals, even of supposedly high standing, pullulate with irreproducible results.
  • asked a question related to Authentication
Question
5 answers
Hi,
I am working on project where I am able to show V2V communication on in simulation. However, I need to implement Hash algorithm for vehicle authentication.
I could get md5 algorithm which uses SHA256 method for authetication but I am not sure how the message ID vehicle ID, TA id, formats to be fed to this algorithm
Can someone please help me to understand how can i do it , by providing some detailed example using real life IDs of vehicles , truust authority tower ID, etc ?
BR
Sameer
Relevant answer
Answer
Thanks Yashar ! WIll take a look !
  • asked a question related to Authentication
Question
4 answers
Hi
What are the best simulators/emulators that provides a wide support to simulate attacks on iot devices and protocols (BLE, MQTT, authentication, MITM, ddos, sybil ...) and that offers by the same time to implement security mechanisms (crypto, authentication, TLS,...).
Relevant answer
Answer
Avispa tool is suitable for security analysis.
You can use websploit tool for testing.
Best regards
  • asked a question related to Authentication
Question
2 answers
I have to generate unique authentication code , can eigen values are helpful for the same. please help me for the same
Relevant answer
Answer
Dear Kapre bs
I suggest using random functions and HMAC.
If you explain the question more clearly, I can do more help.
  • asked a question related to Authentication
Question
10 answers
I would like to programming my project for securing coap protocol with symmetric key and biometric by HLPSL in span of AVISPA and would like to learn about your experience with this tool.
Thanks
Relevant answer
Answer
Thank you for sharing this question
  • asked a question related to Authentication
Question
3 answers
I read papers about PLA.It often says:'Note that a PLA scheme is not designed to replace an
upper-layer authentication scheme. On the contrary, a PLA scheme is designed to compensate for an upper-layer authentication scheme, which provides a higher security level.'
Why?
Relevant answer
Answer
Physical layer security is limited to securing access to the device. Applications could be shared by several users. Each would have to be able to physically authenticate and separately authenticate at a higher layer.
  • asked a question related to Authentication
Question
4 answers
Increasingly, more articles are being retracted because of duplicate or otherwise dubious Western blots. Consequently, journals are asking for original Western blots and authentication of antibodies. Many labs rely upon data from companies. However, many antibodies continue to circulate that simply do not work as advertised. Thus, the scientific community must be vigilant and organized to maintain high quality Western blots. But how best to do this? Many labs, including my own, no longer use film. Instead, we scan blots directly and save them as digital files. Further, many labs, including my own, will physically cut blots to probe with different antibodies. I for one will only allow this once the antibody is rigorously vetted for authenticity using overexpression in cells, knockdown in cells or knockout in mice, preabsorption of antibody with peptides (when available) prior to probing, as well as cell/tissue positive/negative controls. In the case of authenticating an antibody, we use the entire blot to serve as the "authentication blot" in case a journal or reader wishes to know how we know the antibody works, as advertised. Once such a blot is filed away, we cut blots so as to streamline experiments in the most parsimonious way without compromising results. The problem with this and thus the question before the community is: will journals accept this approach or must EVERY experiment be saved as a full length (uncut) blot for purposes of submission to a journal which require original blots?
In our model, we would publish the original authentication experiment in a full length blot but then subsequent experiments would be cut down blots showing, for example, the protein of interest and then the attending loading control.
I welcome all feedback on this important issue.
Relevant answer
Answer
Hi Agnieszka
Agreed! The field I am in (smooth muscle biology) was duped into thinking a certain protein (Myocardin) of predicted MW = 100 kDa indeed migrated at that size. However, as detailed in one of my research posts, this protein migrates at 150 kDa (likely due to some PTMs). I am still battling with authors and vendors over antibodies to this single protein! Frustrating..
A super idea you suggest and we have such a database in my lab so that new people are aware of what is good and what to avoid. Wouldn't it be great if there was a mother-of-all antibody database? Just as you describe with notes as to validations, use in ChIP, IHC etc, dilutions.
I think we all need to confess that sometimes, maybe more often than we would like to admit, the antibody staining or the western result is not what we think it is!
  • asked a question related to Authentication
Question
2 answers
Hello everyone I hope you are doing well.
I am doing simulation for SSL VPN and I try to apply the commands that enable the HHTP however every time that I use any command with http I got the same result as follow:
CCNA-ASA(config)#http server enable
% This version of Packet Tracer does not support this option.
CCNA-ASA(config)#aaa authentication http console local
^
% Invalid input detected at '^' marker.
Note:
That I am using packet tracer version 7.3
ASA 5506 version 9.6 ASDM version 7.6
Anyone can help me with this problem.
  • asked a question related to Authentication
Question
5 answers
Here is a big question about identity authentication: I came across a wacky article that reports about the scary plan to fuse physical-, biological and digital identity into one: https://summit.news/2020/11/16/klaus-schwab-great-reset-will-lead-to-a-fusion-of-our-physical-digital-and-biological-identity/
First I thought that beats completely my own research work into multi-factor identity authentication as per the 2 papers linked to below:
Here is also a link to a very nice PhD thesis where those 2 papers linked to above form Chapter 4 (just to understand the context):
Now I realise there is no contradiction in the vision and the published work at all. Thus, my concrete question pertains to how the physical- and biological factors could be integrated in addition to digital aspects into a multi-factor identity authentication protocol such as Authcoin. Does anybody have an answer to this question? May I also add here this Microsoft patent for good measure that wants to merge the concept of blockchains with the human body as well?
This really brings together quite an amazing picture about what is possible in the future. My question is how all of that can be done concretely beyond some wacky and entertaining conspiracy visions?
Cheers, Alex
Relevant answer
Answer
Anyhow, best a master student looks into this in detail:
Multi-Factor Authentication (MFA) on a Blockchain-based Decentralised Trust Network With Customizable Challenges
Juhendaja / supervisor: Alex Norta, Benjamin Leiding
  • Suitable for MSc thesis
  • Lühikirjeldus / short summary:
The Authcoin protocol is an alternatie concept to the commonly used public key infrastructures such as central authorites and the PGP Web of Trust (WoT). Authcoin combines a challenge response-based validaton and authenticaton process for domains certicates, email accounts and public keys with the advantages of a blockchain-based storage system. The blockchain technology proivdes a publicly availableo transparent and fault tolerant mechanism for storing data in a distributed and decentralized manner The Authcoin protocol distinguishes between validaton and authenticaton. In the context of Authcoin, validaton aims to prove the following three facts: First, a specific entity has access to a certain account that is under validatono e.g., an email account. Second, a certain entity has access to a specified private- and public key. Third, the specified key pair corresponds to the tested account. The authentiicaton of Authcoin contnues the validaton procedure by verifying the identity and aims to confirm that the alleged owner is also the actual owner of the public key. Users can set up challenges for other entites and ask them to fulfill these challenges. Either the entity fails to do so, or is able to successfully complete the challenge and create a corresponding response. The chosen challenge depends on the use-case scenario, the required level of security and the given threat level of the involved entities. 
Open issues of a recently completed master thesis are: We slightly touched private challenge types that preserve the privacy of data, but in real-life scenarios, it is needed, so it needs further investigation. There are concepts such as zero-knowledge proof, which can be used for providing privacy in Authcoin protocol, but it was out of the scope of this thesis. Additionally, there are more and more authentication types introduced in today’s world, so in the case of emerging new biometric or another factor, research might be needed to validate it in the Authcoin protocol. Also, this thesis was mentioning private and public key pairs as the central resource for which authentication was taking place. However, the Authcoin protocol is not limited to private/public key pair and can authenticate users to access any resource. 
Another open issue for future research is usage of machine learning models for improving risk-based authentication. Since risk-based authentication compares old, existing contexts to user’s current context, machine learning models can be used to improve information about previously used contexts. Furthermore, in the implementation, we only consider person to person in- teraction since it is easy to test, but in real life, there can be different use cases which can include users such as organization, ministry, government or machine. Hence, many combinations can happen, and it needs further research. Other open issues pertain to fusing the physical-, digital- and biological identity as extended multi-factor authentication challenge sets that can also be combined with blockchain technology.
  • Artikliviited / references to publications (2-4)
  • Ref 1: Giorgi Sheklashvili, Master's Degree, 2020, (sup) Alexander Norta; Benjamin Leiding, Multi-Factor Authentication (MFA) on a Blockchain-based Decentralised Trust Network With Customizable Challenges, Tallinn University of Technology School of Information Technologies, Department of Software Science
  • Ref 2: Benjamin Leiding, Doctor's Degree, 2019, (sup) Dieter Hogrefe; Clemens H. Cap; Alexander Norta, The M2X Economy – Business Interactions, Transactions and Collaborations Among Autonomous Smart Devices, Georg-August-Universitaet Goettingen.
  • Teemavaldkond / topic area (to help programme managers advertise topics):  Security, blockchain, identity authentication
  • Võtmesõnad / key words: Authcoin: Authcoin, multi-factor authentication, blockchain, identity authentication
  • asked a question related to Authentication
Question
2 answers
Hi
Anybody familiar with a lab/company that is doing mouse cell line authentication in Israel?
If not , can this procedure be performed by a certain kit in a "regular" lab? and if yes how?
thank you for your help
Relevant answer
Answer
I used IDEXX BioAnalytics Europe and they gave me an excellent service. recommended!
  • asked a question related to Authentication
Question
16 answers
is it possible to use a MAC address of device as an authentication key for accessing a file? can this be implemented manually ?
like if I want a specific device to access a file( i have no access to that device, i have only MAC address) , so that no other device can run that file, is it possible ?
Relevant answer
Answer
MAC addresses by themselves are not useful for authentication, since they are seen in the open on the LAN. If you want to prevent someone from accessing a resource you must use some secret not known by others!.
For communications MAC source addresses can be used as the "claimed source" of a packet, but since anyone can readily put a given MAC address into the SA field this is only a claim that needs to be authenticated (this is what is done by 802.1X and MACsec, which rely additionally on a pre-shared key of public key crypto).
For running programs on a device, MAC addresses are only reliable if they can not be forged, i.e., if there is a direct hardware link over which the MAC address is read that can not be forged by software. This is only the case for proprietary hardware built for this purpose (for example look at the Dallas 1-wire devices), and even then MAC addresses are considered too short for truly sensitive applications.
Y(J)S
  • asked a question related to Authentication
Question
63 answers
Most of the articles are not cited because of poor visibility of that paper. The Journal policy may play a vital role in the article visibility. Some Journal without authentication we are not able to view that research papers. So If I want to improve the visibility of my research papers means what step I have to follow?
Relevant answer
Answer
You may use ORCID, Researchgate, Publons, Google Schoolar and other platforms to share your published papers.
  • asked a question related to Authentication
Question
10 answers
Many organizations encourage their users to create complicated passwords that are usually hard to remember (and easy to brute-force). Has there been a study to show that passphrases have a definitive advantage over passwords or vice versa?
Relevant answer
Answer
Passphrase guessing is exponentially higher than that of passwords.
Passphrase generally longer for added security. Most of humans are bad at creating randomness, and face difficulties at remembering things, so they prefer easy words. This kinds of password would be attacked easily by the hackers. Finally, "Security at the expense of usability comes at the expense of security".
  • asked a question related to Authentication
Question
7 answers
Hello,
I search for an article(s) comparing the security level of MAC (Message Authentication Codes) of the Crypto++ Library.
I make a benchmark wich evaluting the speed of the different algorithms.
The library contains the following algorithms:
MAC= BLAKE2b, BLAKE2s, CMAC, CBC-MAC, DMAC, GMAC (GCM), HMAC, Poly1305, SipHash, Two-Track-MAC, VMAC.
Relevant answer
Answer
MACs can be used to authenticate message between users by symmetric techniques. They can also be used by a single user to determine if his files have been altered, perhaps by a virus by compute the MAC of users' files and store that value in a table. MAC takes two inputs, a message and a secret key, and produces a fixed-size output, n bits. The MAC purpose is to facilitate assurances regarding both the source of a message and its integrity, , without the use of any additional mechanisms.
  • asked a question related to Authentication
Question
5 answers
Dear Sir,
I would like to know if there is a plan in this project to establish a Taqman based method for fraude detection in coffe blends by mixture of Coffea canephora and Coffea arabica. It would be really usefull for coffee authentication.
My best regards,
Maria.
Relevant answer
Answer
Reza Fotohi Thaank you very much!
Kind regards,
Maria
  • asked a question related to Authentication
Question
8 answers
I am working on cooja simulator for the Authentication of iot node with blockchain. could anyone share the authentication code of blockchain?
Relevant answer
Answer
Thankyou Dr Reza Fotohi
  • asked a question related to Authentication
  • asked a question related to Authentication
Question
2 answers
cell line authentication, STR profiling, fragment analyser
Relevant answer
Answer
And we can use promega Kits, like PowerPlex® Fusion 6C, in Agilent fragment analyser instrument (5200, 5300 or 5400 model?
Thanks
  • asked a question related to Authentication
Question
11 answers
We would appreciate someone installing our authentication system, and giving us feedback on various aspects like ease of installation, user experience, bugs (hopefully, none...).
We will give you a free licence for an unlimited number of users and unlimited number of installations. Ideally, we'd like to test with about a hundred users, but any number will do in practice.
You'll need to have a Linux or Sun (SPARC) Solaris system for the main server, but user connections can be from any device, running any O/S - including smartphones, tablets, etc.
You'll also need an Oracle database. You can download Oracle 11g from their website, for free.
Installation takes about an hour, plus the time to migrate any existing users - for which we can supply a free tool.
Thanks in advance.
Relevant answer
Answer
Dear Mark,
You may like to read "Analysis of Authentication Techniques Adopted by End Users in Real-Life...", published in Proceedings of International Conference on ICT for Sustainable Development pp 99-107. This may be useful to you. Link is as under:
With best wishes,
Dr Kuntal Patel
Author: Self-Study Websites
  • asked a question related to Authentication
Question
6 answers
Hello everyone,
We are designing a blockchain-based authentication & authorization scheme for smart homes, and now we need to simulate the proposed network model to ensure our scheme is practically efficient and measure its performance in a real scenario. Therefore, we are looking for a simulation tool that is most suitable for the blockchain network simulation. We would be thankful for your help.
Also, if you can do the simulation for our scheme, it would be a pleasure to work with you, so let us know.
Relevant answer
Answer
Dear Zain ul Abadin, please send an email to me, and explain more about your problem.
(you can find my email address at the "About" section in my profile)
Best Regards.
  • asked a question related to Authentication
Question
6 answers
How to find which conference belongs to tier 1 and tier 2 conferences. Is there any authenticated list of that?
Relevant answer
Answer
Most of the conferences do not mention that they belongs to which tier
  • asked a question related to Authentication
Question
11 answers
I'm working on the authentication scheme of fog node and cloud. So I don't know how to find the cost of the scheme , so as to prove that my scheme takes less time or it is cost effective.
Relevant answer
Hello, what is the tools that you are used in your work(I.e., hash function,...)
  • asked a question related to Authentication
Question
5 answers
Authentication in IoT systems are vastly insecure. Mostly the problems lies on its open ended and probable untrustworthy nodes. Also, the need for a lighter authentication mechanism will always be welcomed. The fact that IPSec limitations can also be overcome and Implementing authentication using block chain technique may give it more freedom. Please suggest your insights and ideas. Please give your insights. We can work together for a project.
Relevant answer
Answer
Hi, @Ajay Prasad,
Of course, we can use blockchain-based authentication of IoT devices.
Authentication schemes based on the blockchain technology can provide many special features, for example:
- The signing and decryption keys stay on the device.
- The verification and encryption keys are stored on the blockchain.
- Protects against critical cyber attacks such as phishing, man-in-the-middle, replay attacks...
I think this is not feasible for all IoT devices and systems because most of these last go towards low-cost solutions.
But this does not prevent to go ahead and work on such kind of schemes because it's will be suitable for many cases and scenario in IoT...
I hope my idea to be clear and at your question range.
With regards
Otmane
  • asked a question related to Authentication
Question
8 answers
Hello Everyone,
For a classification problem, we need imposter data along with authenticated user's data. I created a system that identifies an imposter or authenticated user. For the training, I gave the data imposters and authenticated to train and test the system. Now, the problem is to run the system on a new device, I always need the data of imposter.
I started my research work, keeping the classification in my mind. Now, I am at the end of my research work, can anybody guide me on how to handle this kind of problem. As I have seen many researchers are doing the same thing as I did. I am looking forward your expert opinion.
Relevant answer
Answer
I would discourage using randomly generated impostor data because the randomly generated impostor data may or may not (most likely not) be representative of the impostor class.
If you really want to use data from the impostor class, you should data of other users than the one for which you are building the model. Even that is not sufficient.
I would suggest, in addition to using data from other users, you should build an additional imitation dataset which will consist of data collected from people who make an active attempt to imitate the genuine user.
For example, in gait biometrics you can refer to the following papers:
Thanks!
  • asked a question related to Authentication
Question
4 answers
In the context of vertical industry, security demands could vary significantly among services. For instance, the mobile Internet of Things (IoT) devices requires lightweight security while high-speed mobile services demand high efficient mobile security. The network-based hop-by-hop security approach may not be efficient enough to build differentiated end-to-end (E2E) security for different services. As IoT is gaining momentum, more people will be able to remotely operate or "talk" to networked devices, for instance, instructing facilities at a smart home to get up. Therefore, there is a need for more stringent authentication method to prevent unauthorized access to IoT devices.
Now, what are the permanent authentication methods the could be to prevent unauthorized access to IoT devices?
Relevant answer
Answer
Combining 5G with IoT is the target agreed on by everyone.
And like any new technique, it will come with many security and privacy issues, but many solutions have been suggested. Some recent ones are listed below:
Please take in consideration that with 5G+IoT new paradigm of problems will arise which requires new types of solutions that includes blockchain, physical layer security, cross layer security solutions.
Best Regards
  • asked a question related to Authentication
Question
25 answers
Multi-factor authentication (MFA) adds a layer of security that allows companies to protect against the leading cause of data breach — compromised credentials. Users provide extra information or factors when they access corporate applications, networks and servers. Is Multi-factor authentication can be hacked? Yes/No and How?
Your thoughts?
Relevant answer
Answer
dear Ali A. Al-Homaidan - thank you for your reply!!
  • asked a question related to Authentication
Question
8 answers
2FA Two Factor Authentication
or 
MFA Multi factor Authentication be used with bio metric authication
Relevant answer
Answer
Dear Itrit Waqas
Thanks for your answer
  • asked a question related to Authentication
Question
4 answers
How image steganography provides authentication? Where exactly steganography is used in military application?
Relevant answer
Answer
Thank you all. Thanks for your inputs really informative.
Special thanks to @ Rashedul Islam , @ Abbas Cheddad and @ Ghada salim Mohammed . Have a nice day.
  • asked a question related to Authentication
Question
3 answers
MODBUS-RTU is a serial protocol very common in the industrial world, the protocol is not secure and doesn't have any build-in authentication mechanism, I'm looking for research projects that try to address this problem.
Sincerely,
Eli
  • asked a question related to Authentication
Question
4 answers
Bagele Chilisa (2011) and Licoln and Guba (1985) have suggesting for Indiegnous research authentication. How helpful?
Relevant answer
Answer
Jahid Siraz Seems to me like you're confusing ontology with epistemology, which is what both the people you quoted were all about. Incidentally, neither of them did any work related to authentication - the way the security industry understands authentication.
  • asked a question related to Authentication
Question
5 answers
Applications like online-banking or online-shopping cater services to multiple users. Suppose each user can access these applications by login with their unique ID followed by providing their biometric-based signature (e.g., face, fingerprint, voice, swipe gesture, etc.).
  1. Which classification model, i.e., one-class or multi-class will be more justified for such systems.
  2. If one constructed a multi-class authentication model, then how to handle the situation to add a new user. Do a model required to be reconstructed every time?
  3. As the users data is already labeled so why not the one-class authentication model more suitable option? Simply, a labeled input query can be verified with the template stored for that label only.
Relevant answer
  • asked a question related to Authentication
Question
2 answers
What techniques could be used for authentication of social media viral video or mms.
Relevant answer
  • asked a question related to Authentication
Question
4 answers
A Share Link is created– a URL providing 50 days' free access to the article " Dynamic Digest Based Authentication for Client-Server systems using Biometric Verification ".
Anyone clicking on this link before August 03, 2019 will be taken directly to the final version of your article on ScienceDirect, which they are welcome to read or download. No sign up, registration or fees are required.
Relevant answer
Answer
I wash to help you
  • asked a question related to Authentication
Question
2 answers
Sir i want extract all metadata from a digital audio file for authentication purpose.
Relevant answer
Answer
Gangwar,
Try this site:
It makes that you need without installations.
  • asked a question related to Authentication
Question
1 answer
Hi, Have a mystery cell line of mouse origin that I need help identifying. I used the IDEXX service for STR analysis but the results were inconclusive. Seems like the database is forthcoming but the project was initiated in 2012. Any experts out there that can help?
Relevant answer
Answer
NCBI BioSample
Search for strain (e.g., FVBN) or strain and STR (e.g., C57BL STR)
You can also use the criteria on the left of the page to narrow down the search results:
For example:
Attribute name: cell line
Model organism or animal
  • asked a question related to Authentication
Question
3 answers
I want to know that what are the current methods for Authentication in a CCN system , Is there nay research paper or article on it ?
  • asked a question related to Authentication
Question
4 answers
This is a question to the experts familiar with smartphone technology and banknote security features
Relevant answer
Answer
Hello,
Banknotes authentification is based on identifying security features which are present in banknotes. Consequently, one or more sensors are required to acheive the bill validation process : IR Sensor, UV Sensor, MG Sensor, FL Sensor.
Nowadays, ordinary smartphones are not equipped with this kind of specefic sensors, so, i beleive that banknotes validation process using smartphones is not actually possible, unless, specific sensors might be built-in separatly.
Best regards,
  • asked a question related to Authentication
Question
3 answers
I am working on ECG cryptography and authentication for Body Area Networks. I seek knowledge on how to get the algorithms implemented. I mean the language or libraries to use for implementations and respective results.
Relevant answer
Answer
Ms Preeti,
the data set for ECG cryptography can be obtained from Bonn university site at the below link
http://epileptologie-
you can also employ discrete chaos for realization of new ecg cryptographic method.
  • asked a question related to Authentication
Question
11 answers
I have a system of identifitcation using retina. Now I want ot calculate FRR, FAR and then plot them by changing the value of threshold to obtain DET graph(Detection error trade off). Geniune user have threshold value of 8 and imposters have threshold value less than 8. 
I am not using machine learning. So I donot have labels from which I can decide that particular user is authenticated or not? on the basis of final threshold hold I decide weather person is authenticated or not?
I am clear about the definitions of FRR and FAR. However I am confused about how to find them using matlab? 
Relevant answer
Answer
Lets assume you have a biometric evaluation system that assigns all authentication attempts a 'score' between closed interval [0, 1]. 0 means no match at all and 1 means a full match. If the threshold is set to 0, then all the users including the genuine (positive) and the impostors (negative) are authenticated. If you threshold is set to 1 then there is a high risk that no one may be authenticated. Therefore, in realtime systems the threshold is kept somewhere between 0 and 1. So, this threshold setting can sometimes may not authenticate the genuine users, which is called FRR (False Reject Rate) but may also authenticate the imposters, which is given by FAR (False Accept Rate).
Here, FP: False positive, FN: False Negative, FN: True Negative and TP: True Positive
FAR is calculated as a fraction of negative scores exceeding your threshold.
FAR = imposter scores exceeding threshold/all imposter scores.
imposter scores exceeding threshold = FP
all imposter scores = FP+TN
FAR = FPR = FP/(FP+TN)
FRR is calculated as a fraction of positive scores falling below your threshold.
FRR = genuines scores exceeding threshold/all genuine scores
genuines scores exceeding threshold = FN
all genuine scores = TP+FN
FRR = FNR = FN/(TP+FN)
  • asked a question related to Authentication
Question
3 answers
For my proposed authentication mechanism, how to simulate in NS2 and NS3. Can you please give a note on simulating authentication in simulators.
Relevant answer
If you are talking about node authentication in NS2, then node authentication is required in network for like secure route discovery and data transmission. In such cases, node attaches the encrypted identity as the signature in the packet. Elliptic Curve Cryptography (ECC) an asymmetric cryptography technique is used for encryption and decryption.
C++ part : // Encryption ec_t::Point Pa = aa*G; // Source public key ec_t::Point Pb = bb*G; // Receiver public key ec_t::Point Pk = aa*Pb; ec_t::ffe_t c1( m1*Pk.x()); ec_t::ffe_t c2( m2*Pk.y());
// Decryption Pk = bb*Pa; ec_t::ffe_t m1d = c1/Pk.x(); ec_t::ffe_t m2d = c2/Pk.y();
  • asked a question related to Authentication
Question
3 answers
Hello,
I am looking for Blockchain-based user authentication schemes.
Any suggestions..
Thank you.
Relevant answer
Answer
Common practice suitable for any blockchain: Ask user to sign some message (which is completely random or contains nonce), then verify his signature.
Additionally some blockchains have features, those could aid You. For instance, through Solidity (for Ethereum) You could compare `msg.sender` with some stored address before function call (usage of modifiers) if the user needs special treatment or You wish to restrict it usage for some_address_only.
  • asked a question related to Authentication
Question
23 answers
Let me tell you what I want to do in the detail:
PLEASE REFER FLOW chart for more understanding
Step 1: Split Original image into lets say 8 equal blocks and take color histogrm of each block. This will be the reference data REF (Attached original image = P_original.png). We can call it registration process of the true image. Please find attached file Slice.jpg and code used split.m. Here I want to neglect all the blocks with the black color (no information) before doing the histogram and in histogrm I want it to be flexible (so I can focus on the certain color intensity).
Step 2: Authentication process: Now I want to take the duplicate image. Do the same thing again. and compare the histogram result of each block with the REF data and give the result : Authentication sucessful if similar or unsuccessful if not similar. Please find P_transformedC.png file for duplicate image for comparision.
Relevant answer
Answer
Thank you very much for the code
I have one question:
From the SplitHistMatch code:
[Red1,Green1,Blue1 ]=HistMatch(blocks1);
[Red2,Green2,Blue2 ]=HistMatch(blocks2);
Does this code compare image blocks1 to blocks 2?
because I think It is comparing within the blocks 1 and blocks2
What I want to do is comparing 2 blocks from different images.
Please find attached chart for detailed understanding.
  • asked a question related to Authentication
Question
9 answers
My research focuses in Human Computer Interaction. Theoretical security evaluation includes analyzing password space. While empirical security evaluation includes doing experiment on shoulder-surfing, observation, intersection, guessing attacks etc. Can I only include theoretical evaluation?
Relevant answer
Answer
Ofcourse, its necessary to show the lacuna n literature and the extent of convergence and divergence in existing studies.
  • asked a question related to Authentication
Question
5 answers
The common practice of sending a second factor to the user via an SMS message or email is both inelegant and inconvenient. Especially, if the user is in the middle of filling in the login form on the phone to which the SMS is sent.
This apart, users find any security measure, which delays their access to a service, an irksome imposition.
A considerable improvement would be if the submission of the second factor were to be totally transparent, and immediate.
From a security point of view, it would also be good if the second factor were unique to the user, and irreproducible.
Relevant answer
Answer
Dear Mark,
I know this attack, but there have been countermeasures introduced against it as well.
  • asked a question related to Authentication
Question
4 answers
Hello,
I am going to work on multimedia authentication through machine learning. please someone suggest me a technique for this work.
Relevant answer
Answer
hi
I think it's a good method for machine learning, and authentication, it's by generated strong keys by Fuzzy Extractor and biometric.
Best regards.
  • asked a question related to Authentication
Question
9 answers
i need ideas regarding in which area i can concentrate in IOT with block chain...regarding authentication and access control...
Relevant answer
Answer
The problem with IoT and blockchain is that they are inherently insecure and unintentionally designed that way. The IoT has no device to device authentication and has been the source of numerous hacks. An extreme example is a casino that was hacked through a fishtanks thermostat. Blockchain secures the ledger, but does nothing to secure or authenticate the endpoints that contribute to the ledger. We frequently confuse user authentication with device authentication. Our authentication paradigm today rests on a 40 year old process -- PKI, which was never intended for authentication. We incorporate the human factor in our information systems and because of that we cannot keep secret the keys to our security. This is why phishing and other social engineering attacks are so successful. Our private keys last for years and are static. That means that any attacker possessing the "secret" key is treated as a trusted user. Keys should last no longer than seconds and should be ever changing in the background.
  • asked a question related to Authentication
Question
4 answers
Hi everyone
I am developping a real time chat using asp.net and signalR library.
After authentification, i am facing some problems to display a real time list of the connected clients.
Does any One can help me to find a code of how to display this list?
Relevant answer
Answer
ThanDr Salah
  • asked a question related to Authentication
Question
4 answers
Can anyone help to connect the Anfatec lockin amplifier (eLockIn203) to PC with IP address using LockInRemote program? I filled the authentication menu with the IP displayed on the eLockIn SETUP display but the computer kept saying ´No Server Found at this IP Adresse!´.
Relevant answer
Answer
Thank you, I already solved the connection problem. Does anyone have LABVIEW control panel of this device with TCIP connection? I would be happy if you can share this with me. Thank you again.
  • asked a question related to Authentication
Question
4 answers
Hello intellectuals !
Let's suppose we have a setup like Kerberos where messages are exchanged between the devices and a server. Is there any open source tool or simulator that can calculate the time each device or server takes to compute the message and the time the message takes to travel on the channel to reach its destination (other device)? The basic idea is to find out the total time a protocol takes to execute to achieve the set goals like authentication, authorization etc. Thank you.
Relevant answer
Answer
I would vote to Wireshark.
I quote some highlights from its portfolio.
"
Wireshark is the world's foremost network protocol analyzer. It lets you see what's happening on your network at a microscopic level. It is the de facto (and often de jure) standard across many industries and educational institutions.
It is community led software.
Wireshark has a rich feature set which includes the following:
* Deep inspection of hundreds of protocols, with more being added all the time
* Live capture and offline analysis
* Standard three-pane packet browser
It is Multi-platform. It runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others.
* Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility
* The most powerful display filters in the industry
* Rich VoIP analysis
* Read/write many different capture file formats: tcpdump (libpcap), Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network Monitor, Network General Sniffer® (compressed and uncompressed), Sniffer® Pro, and NetXray®, Network Instruments Observer, NetScreen snoop, Novell LANalyzer, RADCOM WAN/LAN Analyzer, Shomiti/Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, WildPackets, EtherPeek/TokenPeek/AiroPeek, and many others
Capture files compressed with gzip can be decompressed on the fly
Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platform)
Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
Coloring rules can be applied to the packet list for quick, intuitive analysis
Output can be exported to XML, PostScript®, CSV, or plain text
"
  • asked a question related to Authentication
Question
3 answers
Security scheme, especially a suitable authentication process, can improve QoS provision for data traffic transfer over optical switched network. The authentication process can limit the degradation of QoS support including to provide the traffic requirements such as the traffic loss.
Relevant answer
Answer
Please take a look at Hop-by-hop/end-to-end efficient authentication protocols and see if they can fit your case study. I think secure authentication schemes can improve QoS by dropping any packet that originates from outsiders (Unsolicited traffic) or adversaries (DoS attack).
  • asked a question related to Authentication
Question
6 answers
Selection of Multi factor Authentication (MFA) for web based application
Relevant answer
Answer
Thanks @Sandeep for your valuable comments
  • asked a question related to Authentication
Question
7 answers
I'm interested in studying the behavior of intruder over popular OSN such as Facebook. Intruder or imposter can be defined as an attacker who illegally  uses another authorised user  account to perform different activities inside that user profile.
Relevant answer
Answer
Dear Ja'far,
Have you found the data set you were looking for? Because I am looking for the same data and I would be grateful if you let me know what data set you found.
  • asked a question related to Authentication
Question
5 answers
I was conducting a research on "Database Encryption and Authentication" and was looking at the latest content on the subject matter.Unfortunately all the research I have found is dated before 2015,so I would be really grateful if I could get a reference after 2015.
Thanks in advance.
Relevant answer
Answer
Ok, let me tell you this, SQL in particular has important issues other than authentication as the authentication process apply to all other servers equally but for SQL the SQL injection attack is top of the list in the threats list, therefore if you want to deal with authentication user or server then that is enough by itself or if you want to research threats to SQL in particular then you go for the injection attack, that is my opinion.
  • asked a question related to Authentication
Question
5 answers
How do I implement one class SVM for user authentication? I have unlabelled dataset for 100 users. In my understanding, I have to create 100 different one class svm models for all users to determine if the user is authentic or not , but I am not sure about it.
Relevant answer
Answer
In your reply you've mentioned that "My problem is to distinguish an authentic user from unauthentic user". This means that you have 2 types from users: authentic and//or from unauthentic. Therefore, this led me to recommend the use binary classification.
Well, if have only one label of class attribute (say authentic) then use the way that I explained in my first reply.
Cheers,
Samer Sarsam, PhD.
  • asked a question related to Authentication
Question
5 answers
Im from Government Siddha medical College, Tirunelveli, Tamilnadu. I have done herbarium for my dissertation purposes.
1. Suggest me, where to authentication certificate ?
2. Where to submit my herbarium and sample raw drug ?
Relevant answer
Answer
You can contact:
Scientist, In-Charge, Botanical Survey of India, Southern Regional Centre, T.A.N.U. Campus, Lawley Road, Coimbatore 641 003, Tamil Nadu for having authentication of your plant specimen and you can also deposit the same in that herbarium. See the attached file.
  • asked a question related to Authentication
Question
5 answers
Cell lines after going through number of passage trends to change. Is there any fixed duration after which cell lines should be authenticated (by STR profiling etc)?How often one should authenticate their cell lines?
Best Regards
Relevant answer
Answer
Many thanks Snow
Best Regards
  • asked a question related to Authentication
Question
4 answers
Hello Authors,
I want to know how deep learning is used in media authentication?
Relevant answer
Answer
I agree with you Dr Luay Abdulwhid Shihab.
Regards!
  • asked a question related to Authentication
Question
9 answers
Barcoding is molecular authentication of the species based on its unique Marker DNA sequences particularly COI. OK, If it is so, how does it contributes to plan conservation of that species?
Relevant answer
Answer
An example:
Here in our area there are again wild wolves again. Of course they are strictly protected. Recently, wolves escaped from an enclosure. These are used to people less shy and therefore perhaps more dangerous. At a prey animal it was discovered with barcoding that it was torn by a cage animal. When compensating farmers, it is important to know whether the animals actually killed were torn from protected wildlife or not.
Another example:
Here there are few small populations of the wild-hen Tetrao urogallus. The shy animals are difficult to observe or count. Scientists collected their excrements (pellets). With the help of barcoding, they were able to determine the number of birds and determine whether and how many interchanged between the various protected areas.
Another way of barcoding is to study dietary habits of protected animals:
Regards,
Rudolf Ritt
  • asked a question related to Authentication
Question
3 answers
Hello!
This is an interesting idea !
I would like to know which spectroscopic techniques are you going to use, and for which food products.
Thank you in advance for your reply :-)
Best regards
Abdo
Relevant answer
Answer
I am following the answer
  • asked a question related to Authentication
Question
4 answers
Cell lines after going through number of passage trends to change. Is there any fixed duration after which cell lines should be authenticated (by STR profiling etc)?How often one should authenticate their cell lines?
Best Regards
Relevant answer
Answer
Thanks dear Pal....