Science topic

Authentication - Science topic

Explore the latest questions and answers in Authentication, and find Authentication experts.
Questions related to Authentication
  • asked a question related to Authentication
Question
5 answers
Hello, My question is related to authentication of ellipsometry for dielectric constant measurement. In my case, I am measuring the refractive index and dielectric constant of Al2O3 thin film on Si substrate. the measured value for refractive index is 1.66 - 1.77 and dielectric constant 2.75 - 3.15. Refractive index values are good match with reported value but dielectric constant value is differ from reported value 7.8. What is the reason of this difference in values? Does it mean ellipsometry is not always good to measure the dielectric constant?
Note - all the other parameters such as temperature , thickness, frequency is same as in reported articles.
Relevant answer
Answer
Dear Achyut
The difference is related to frequency range you consider. Ellipsometry and refractive index most often relates to optics, obviously, and thus optical frequencies in the 100-1000 THz range generally expressed in wavelength 200-2000 nm for UV-Visible-NIR. Dielectric function, the word constant is confusing, neglecting magnetic properties, is the square of index and ellipsometry is a good technique to find it in the instrument range.
Most often, people mention static dielectic constant, valid in much lower frequency range, typically for microwaves and below. Molecules, atoms, ions and electrons respond specifically and differently in each specific frequency (or energy or wavelength) range.
  • asked a question related to Authentication
Question
44 answers
I received a mail few days ago ''Congratulations! Your nominated profile has been selected for the "International Research Award on New Science Inventions" under the category of "Young Scientist Award". Kindly complete your registration process as earlier as possible and use your submission ID for the further registration process''
Is this real or just a scam?
Relevant answer
Answer
Yesterday, I received an email from ScienceFather after my recent publication. The message I received.
"Congratulation! Your nominated profile has been selected for the "International Research Awards on New Science Inventions" under the category of "Best Researcher Award".
Once you registered, they will ask for payment at the end, so don’t respond. It's a forgery.
  • asked a question related to Authentication
Question
2 answers
we are going to carry out some epigenetic experimentations. definitely we need to count the cells. however some samples are dried-freeze cell pellet and had reserved in -80 freezer. the question is can we use them for cell counting after that long-term freezing? are they intact? is it authenticated??
Relevant answer
Answer
The probability is less that the cells may be intact.
Usually, freeze drying which removes moisture through sublimation, has been used for long-term storage of food and drugs.
Freeze-drying of cells, is done less frequently due to difficulties to load cells with lyoprotectants. Bacteria and yeast are inherently more resistant towards drying stress and by washing the cells with cryoprotectant before lyophilization helps. Moreover, these cells synthesize lyoprotectants upon exposure to stress and can be freeze-dried, while resuming metabolism upon rehydration.
However, mammalian cells typically do not survive freeze drying. I suppose these cumulus cells won’t be intact for cell counting.
Best.
  • asked a question related to Authentication
Question
2 answers
Hi everyone, i am in desperate need on the STR authentication of some of the Pancreatic Cancer cell line for my publication. We purchased the cell lines including PANC-1, ASPC1, BxPC3 and HPDE6 from ATCC long ago but now we need its STR authentication , Can someone help us out by providing the required authentication. Your cooperation in this regard will be highly appreciated.
Relevant answer
Answer
Hi
You can find STR profiles of cell lines in the Cellosaurus.
For example, for the PANC-1 cell line, go to:
and go to the STR profile section.
However I am a bit worried when you say ""We purchased the cell lines including PANC-1, ASPC1, BxPC3 and HPDE6 from ATCC long ago but now we need its STR authentication": what you need to do is not to look up the STR profile of a cell line and include it in your publication. You need to perform a STR profile analysis of the batches of cell lines you are using in your lab to check if they have not become contaminated. There are many labs that can do that in China, so you need to send your samples to one of these labs.
Furthermore another thing worry me: HPDE6 was never distributed by ATCC. I am not sure if you are referring to HPDE-6/E6E7 or derived cell lines called HPDE6c7 and HPDE6c11, see:
but none of these cell lines are or were in the ATCC catalog. So if you are using it, it comes from another source. Unfortunatly there is no public STR profile for these cell lines and so you will not be able to authenticate it except if the lab that gave you this cell line has a STR profile from the originating lab (at McGill).
Best regards
Amos
  • asked a question related to Authentication
Question
9 answers
I am review security requirements frameworks for UAV security. I want to cover UAV security with CIA principles with authentication and non-repudation. Can I add these into the CIA triad?
Relevant answer
Answer
Hi,
Integrity means your data/content remains intact and no unauthorized modification hasn't done on it. With authentication, you can filter out the attacker. However, you cannot make sure that any unauthorized person has accessed it or not. Anyone has modified it or not. To cover CIA traid, You can merge with blockchain which you assist you to meet your goal. I have some papers which might give you hints.
Thanks.
  • asked a question related to Authentication
Question
3 answers
Hi friends i want to know the basic authentication for Elliptic curve cryptography for IOT devices in Verilog code also with SDk
Relevant answer
Answer
  • GitHub - pansygrass/ecc: Verilog for a SECDED Hsaio ECC ... https://github.com/pansygrass/ecc📷Apr 28, 2015 · Verilog for a SECDED Hsaio ECC and a DEC ECC. Power, delay, and area are compared for Berkeley MASIC EEW241B - Advanced Digital Integrated Circuits. - GitHub - pansygrass/ecc: Verilog for a SECDED Hsaio ECC and a DEC ECC. Power, …
  • [PDF]DESIGN AND VERIFICATION OF IMPROVED HAMMING CODE … www.digitalxplore.org/up_proc/pdf/278-148949329114-18.pdf Design and Verification of Improved Hamming Code (ECC) using Verilog Proceedings of ISETE International Conference, 04th February 2017, Bengaluru, India, ISBN: 978-93-86291-63-9 16 This code word shown is transmitted or stored in the memory. At the receiving end, the parity bits are uprooted. A parity check is performed between the
  • Where can I get a Verilog code for quad? The QuAd library contains MATLAB codes for generating verilog codes of any configuration of QuAd. It also contains functional MATLAB model of QuAd that can be used for simulations at higher abstraction levels. The library also includes PMF and Error Estimation code for QuAd configurations.verilog code free download - SourceForgesourceforge.net/directory/?q=verilog%20code How to write Verilog code for counter with testbench?Verilog code for Full Adder 20. Verilog code for counter with testbench 21. Verilog code for 16-bit RISC Processor 22. Verilog code for button debouncing on FPGA 23. How to write Verilog Testbench for bidirectional/ inout ports 24. Tic Tac Toe Game in Verilog and LogiSim 28. Verilog code for Decoder 29. Verilog code for Multiplexers 30.Verilog code for counter with testbench - FPGA4student.comwww.fpga4student.com/2017/03/verilog-code-for-counte… What is the Verilog code for a microcontroller?Verilog code for basic logic components in digital circuits 6. Verilog code for 32-bit Unsigned Divider 7. Verilog code for Fixed-Point Matrix Multiplication 8. Plate License Recognition in Verilog HDL 9. Verilog code for Carry-Look-Ahead Multiplier 10. Verilog code for a Microcontroller 11. Verilog code for 4x4 Multiplier 12.Verilog code for counter with testbench - FPGA4student.comwww.fpga4student.com/2017/03/verilog-code-for-counte… Which is the Verilog based BCH encoder / decoder?Add CONFIG_PIPELINE_LFSR for bch_encode. Limit $clog2 usage, Xilinx can't handle it it many situations. Verilog BCH encoder/decoder. This is a Verilog based BCH encoder and decoder for single bit, dual bit, and 3 or more bit error correction.GitHub - russdill/bch_verilog: Verilog based BCH encoder ...github.com/russdill/bch_verilog
  • asked a question related to Authentication
Question
4 answers
As to deal with micro scale problem we have to constricted by some political or administrative boundary , which may conflict with regional aspect or may not be accurately authenticated with overall geological, geomorphological and geographical perspective. Again natural scale regional focus may dilute the specific spatial issues . That's why the question arises.
Relevant answer
Answer
Dear just try to use uncle google, you will find lots of article regarding to your request!
Regards
  • asked a question related to Authentication
Question
3 answers
Hello everyone
I want simulate authentication in IoT with blockchain in a simplest way. I work with Ganache and Solidity in remix.ethereum.org. I have a academic project. Please help me... Thanks
Relevant answer
  • asked a question related to Authentication
Question
10 answers
What are the criteria publishers use to check authenticity of submitted papers?
What are some software they use for authentication of manuscripts?
Relevant answer
Dear Honorable Researchers,
From my point of view, I don't recommend you to use any free software checkers of plagiarism.
I haven't used them before because I am afraid that the original content of my manuscript may be copied and sold to others before I can publish it.
I know that the problem is not easy for us, especially that we haven't enough money to buy enough food and, in turn, to buy such software. Unfortunately, you have to pay for the sake of getting good results. So, I always write using my own words.
In any way, it is not well for your reputation if there were accusations of plagiarism. This is because plagiarism is a sin! If it is, severe action may be taken and/or legal notice may be given.
Kindly, could you please see the following warning that is related to this valuable question of Prof. Milind Daftari?
  • asked a question related to Authentication
Question
4 answers
I am looking for simulating a VANET environment where I can use Elliptical curve Cryptography also. Is there any suitable tool or any suggested approach to carry out this?
looking in terms to carry out secure authentication.
Thanks and Regards
Relevant answer
Answer
Thank you so much Yashar Salami..I will try this
  • asked a question related to Authentication
Question
14 answers
Is it possible that different species of particular plant encountered in a specific forest area is totally different from the previous report when surveyed after about a decade? If yes, what can be the tentative reason?
I feel that it is probably due to lack of proper identification and authentication.
Please help to find a reason.
Relevant answer
Answer
Which is why journals should demand that voucher specimens be deposited in a given herbarium before accepting a paper for publication, so that identifications can be verified. As it is, journals, even of supposedly high standing, pullulate with irreproducible results.
  • asked a question related to Authentication
Question
5 answers
Hi,
I am working on project where I am able to show V2V communication on in simulation. However, I need to implement Hash algorithm for vehicle authentication.
I could get md5 algorithm which uses SHA256 method for authetication but I am not sure how the message ID vehicle ID, TA id, formats to be fed to this algorithm
Can someone please help me to understand how can i do it , by providing some detailed example using real life IDs of vehicles , truust authority tower ID, etc ?
BR
Sameer
Relevant answer
Answer
Thanks Yashar ! WIll take a look !
  • asked a question related to Authentication
Question
4 answers
Hi
What are the best simulators/emulators that provides a wide support to simulate attacks on iot devices and protocols (BLE, MQTT, authentication, MITM, ddos, sybil ...) and that offers by the same time to implement security mechanisms (crypto, authentication, TLS,...).
Relevant answer
Answer
Avispa tool is suitable for security analysis.
You can use websploit tool for testing.
Best regards
  • asked a question related to Authentication
Question
2 answers
I have to generate unique authentication code , can eigen values are helpful for the same. please help me for the same
Relevant answer
Answer
Yes we can make use of Eigen vector
  • asked a question related to Authentication
Question
10 answers
I would like to programming my project for securing coap protocol with symmetric key and biometric by HLPSL in span of AVISPA and would like to learn about your experience with this tool.
Thanks
Relevant answer
Answer
Thank you for sharing this question
  • asked a question related to Authentication
Question
3 answers
I read papers about PLA.It often says:'Note that a PLA scheme is not designed to replace an
upper-layer authentication scheme. On the contrary, a PLA scheme is designed to compensate for an upper-layer authentication scheme, which provides a higher security level.'
Why?
Relevant answer
Answer
Physical layer security is limited to securing access to the device. Applications could be shared by several users. Each would have to be able to physically authenticate and separately authenticate at a higher layer.
  • asked a question related to Authentication
Question
4 answers
Increasingly, more articles are being retracted because of duplicate or otherwise dubious Western blots. Consequently, journals are asking for original Western blots and authentication of antibodies. Many labs rely upon data from companies. However, many antibodies continue to circulate that simply do not work as advertised. Thus, the scientific community must be vigilant and organized to maintain high quality Western blots. But how best to do this? Many labs, including my own, no longer use film. Instead, we scan blots directly and save them as digital files. Further, many labs, including my own, will physically cut blots to probe with different antibodies. I for one will only allow this once the antibody is rigorously vetted for authenticity using overexpression in cells, knockdown in cells or knockout in mice, preabsorption of antibody with peptides (when available) prior to probing, as well as cell/tissue positive/negative controls. In the case of authenticating an antibody, we use the entire blot to serve as the "authentication blot" in case a journal or reader wishes to know how we know the antibody works, as advertised. Once such a blot is filed away, we cut blots so as to streamline experiments in the most parsimonious way without compromising results. The problem with this and thus the question before the community is: will journals accept this approach or must EVERY experiment be saved as a full length (uncut) blot for purposes of submission to a journal which require original blots?
In our model, we would publish the original authentication experiment in a full length blot but then subsequent experiments would be cut down blots showing, for example, the protein of interest and then the attending loading control.
I welcome all feedback on this important issue.
Relevant answer
Answer
Hi Agnieszka
Agreed! The field I am in (smooth muscle biology) was duped into thinking a certain protein (Myocardin) of predicted MW = 100 kDa indeed migrated at that size. However, as detailed in one of my research posts, this protein migrates at 150 kDa (likely due to some PTMs). I am still battling with authors and vendors over antibodies to this single protein! Frustrating..
A super idea you suggest and we have such a database in my lab so that new people are aware of what is good and what to avoid. Wouldn't it be great if there was a mother-of-all antibody database? Just as you describe with notes as to validations, use in ChIP, IHC etc, dilutions.
I think we all need to confess that sometimes, maybe more often than we would like to admit, the antibody staining or the western result is not what we think it is!
  • asked a question related to Authentication
Question
2 answers
Hello everyone I hope you are doing well.
I am doing simulation for SSL VPN and I try to apply the commands that enable the HHTP however every time that I use any command with http I got the same result as follow:
CCNA-ASA(config)#http server enable
% This version of Packet Tracer does not support this option.
CCNA-ASA(config)#aaa authentication http console local
^
% Invalid input detected at '^' marker.
Note:
That I am using packet tracer version 7.3
ASA 5506 version 9.6 ASDM version 7.6
Anyone can help me with this problem.
  • asked a question related to Authentication
Question
4 answers
I am looking for a simulator to IOT device authentication based on blockchain without using physical device
Relevant answer
Answer
currently your best bet is to use raspberry Pi, install Ethereum on it and simulate an IoT + Ethereum network.
  • asked a question related to Authentication
Question
5 answers
Here is a big question about identity authentication: I came across a wacky article that reports about the scary plan to fuse physical-, biological and digital identity into one: https://summit.news/2020/11/16/klaus-schwab-great-reset-will-lead-to-a-fusion-of-our-physical-digital-and-biological-identity/
First I thought that beats completely my own research work into multi-factor identity authentication as per the 2 papers linked to below:
Here is also a link to a very nice PhD thesis where those 2 papers linked to above form Chapter 4 (just to understand the context):
Now I realise there is no contradiction in the vision and the published work at all. Thus, my concrete question pertains to how the physical- and biological factors could be integrated in addition to digital aspects into a multi-factor identity authentication protocol such as Authcoin. Does anybody have an answer to this question? May I also add here this Microsoft patent for good measure that wants to merge the concept of blockchains with the human body as well?
This really brings together quite an amazing picture about what is possible in the future. My question is how all of that can be done concretely beyond some wacky and entertaining conspiracy visions?
Cheers, Alex
Relevant answer
Answer
Anyhow, best a master student looks into this in detail:
Multi-Factor Authentication (MFA) on a Blockchain-based Decentralised Trust Network With Customizable Challenges
Juhendaja / supervisor: Alex Norta, Benjamin Leiding
  • Suitable for MSc thesis
  • Lühikirjeldus / short summary:
The Authcoin protocol is an alternatie concept to the commonly used public key infrastructures such as central authorites and the PGP Web of Trust (WoT). Authcoin combines a challenge response-based validaton and authenticaton process for domains certicates, email accounts and public keys with the advantages of a blockchain-based storage system. The blockchain technology proivdes a publicly availableo transparent and fault tolerant mechanism for storing data in a distributed and decentralized manner The Authcoin protocol distinguishes between validaton and authenticaton. In the context of Authcoin, validaton aims to prove the following three facts: First, a specific entity has access to a certain account that is under validatono e.g., an email account. Second, a certain entity has access to a specified private- and public key. Third, the specified key pair corresponds to the tested account. The authentiicaton of Authcoin contnues the validaton procedure by verifying the identity and aims to confirm that the alleged owner is also the actual owner of the public key. Users can set up challenges for other entites and ask them to fulfill these challenges. Either the entity fails to do so, or is able to successfully complete the challenge and create a corresponding response. The chosen challenge depends on the use-case scenario, the required level of security and the given threat level of the involved entities. 
Open issues of a recently completed master thesis are: We slightly touched private challenge types that preserve the privacy of data, but in real-life scenarios, it is needed, so it needs further investigation. There are concepts such as zero-knowledge proof, which can be used for providing privacy in Authcoin protocol, but it was out of the scope of this thesis. Additionally, there are more and more authentication types introduced in today’s world, so in the case of emerging new biometric or another factor, research might be needed to validate it in the Authcoin protocol. Also, this thesis was mentioning private and public key pairs as the central resource for which authentication was taking place. However, the Authcoin protocol is not limited to private/public key pair and can authenticate users to access any resource. 
Another open issue for future research is usage of machine learning models for improving risk-based authentication. Since risk-based authentication compares old, existing contexts to user’s current context, machine learning models can be used to improve information about previously used contexts. Furthermore, in the implementation, we only consider person to person in- teraction since it is easy to test, but in real life, there can be different use cases which can include users such as organization, ministry, government or machine. Hence, many combinations can happen, and it needs further research. Other open issues pertain to fusing the physical-, digital- and biological identity as extended multi-factor authentication challenge sets that can also be combined with blockchain technology.
  • Artikliviited / references to publications (2-4)
  • Ref 1: Giorgi Sheklashvili, Master's Degree, 2020, (sup) Alexander Norta; Benjamin Leiding, Multi-Factor Authentication (MFA) on a Blockchain-based Decentralised Trust Network With Customizable Challenges, Tallinn University of Technology School of Information Technologies, Department of Software Science
  • Ref 2: Benjamin Leiding, Doctor's Degree, 2019, (sup) Dieter Hogrefe; Clemens H. Cap; Alexander Norta, The M2X Economy – Business Interactions, Transactions and Collaborations Among Autonomous Smart Devices, Georg-August-Universitaet Goettingen.
  • Teemavaldkond / topic area (to help programme managers advertise topics):  Security, blockchain, identity authentication
  • Võtmesõnad / key words: Authcoin: Authcoin, multi-factor authentication, blockchain, identity authentication
  • asked a question related to Authentication
Question
2 answers
Hi
Anybody familiar with a lab/company that is doing mouse cell line authentication in Israel?
If not , can this procedure be performed by a certain kit in a "regular" lab? and if yes how?
thank you for your help
Relevant answer
Answer
I used IDEXX BioAnalytics Europe and they gave me an excellent service. recommended!
  • asked a question related to Authentication
Question
16 answers
is it possible to use a MAC address of device as an authentication key for accessing a file? can this be implemented manually ?
like if I want a specific device to access a file( i have no access to that device, i have only MAC address) , so that no other device can run that file, is it possible ?
Relevant answer
Answer
MAC addresses by themselves are not useful for authentication, since they are seen in the open on the LAN. If you want to prevent someone from accessing a resource you must use some secret not known by others!.
For communications MAC source addresses can be used as the "claimed source" of a packet, but since anyone can readily put a given MAC address into the SA field this is only a claim that needs to be authenticated (this is what is done by 802.1X and MACsec, which rely additionally on a pre-shared key of public key crypto).
For running programs on a device, MAC addresses are only reliable if they can not be forged, i.e., if there is a direct hardware link over which the MAC address is read that can not be forged by software. This is only the case for proprietary hardware built for this purpose (for example look at the Dallas 1-wire devices), and even then MAC addresses are considered too short for truly sensitive applications.
Y(J)S
  • asked a question related to Authentication
Question
63 answers
Most of the articles are not cited because of poor visibility of that paper. The Journal policy may play a vital role in the article visibility. Some Journal without authentication we are not able to view that research papers. So If I want to improve the visibility of my research papers means what step I have to follow?
Relevant answer
Answer
You may use ORCID, Researchgate, Publons, Google Schoolar and other platforms to share your published papers.
  • asked a question related to Authentication
Question
10 answers
Many organizations encourage their users to create complicated passwords that are usually hard to remember (and easy to brute-force). Has there been a study to show that passphrases have a definitive advantage over passwords or vice versa?
Relevant answer
Answer
Passphrase guessing is exponentially higher than that of passwords.
Passphrase generally longer for added security. Most of humans are bad at creating randomness, and face difficulties at remembering things, so they prefer easy words. This kinds of password would be attacked easily by the hackers. Finally, "Security at the expense of usability comes at the expense of security".
  • asked a question related to Authentication
Question
7 answers
Hello,
I search for an article(s) comparing the security level of MAC (Message Authentication Codes) of the Crypto++ Library.
I make a benchmark wich evaluting the speed of the different algorithms.
The library contains the following algorithms:
MAC= BLAKE2b, BLAKE2s, CMAC, CBC-MAC, DMAC, GMAC (GCM), HMAC, Poly1305, SipHash, Two-Track-MAC, VMAC.
Relevant answer
Answer
MACs can be used to authenticate message between users by symmetric techniques. They can also be used by a single user to determine if his files have been altered, perhaps by a virus by compute the MAC of users' files and store that value in a table. MAC takes two inputs, a message and a secret key, and produces a fixed-size output, n bits. The MAC purpose is to facilitate assurances regarding both the source of a message and its integrity, , without the use of any additional mechanisms.
  • asked a question related to Authentication
Question
5 answers
Dear Sir,
I would like to know if there is a plan in this project to establish a Taqman based method for fraude detection in coffe blends by mixture of Coffea canephora and Coffea arabica. It would be really usefull for coffee authentication.
My best regards,
Maria.
Relevant answer
Answer
Reza Fotohi Thaank you very much!
Kind regards,
Maria
  • asked a question related to Authentication
Question
8 answers
I am working on cooja simulator for the Authentication of iot node with blockchain. could you anyone share the authentication code of blockchain?
Relevant answer
Answer
Thankyou Dr Reza Fotohi
  • asked a question related to Authentication
  • asked a question related to Authentication
Question
11 answers
I'm working on the authentication scheme of fog node and cloud. So I don't know how to find the cost of the scheme , so as to prove that my scheme takes less time or it is cost effective.
  • asked a question related to Authentication
Question
2 answers
cell line authentication, STR profiling, fragment analyser
Relevant answer
Answer
And we can use promega Kits, like PowerPlex® Fusion 6C, in Agilent fragment analyser instrument (5200, 5300 or 5400 model?
Thanks
  • asked a question related to Authentication
Question
11 answers
We would appreciate someone installing our authentication system, and giving us feedback on various aspects like ease of installation, user experience, bugs (hopefully, none...).
We will give you a free licence for an unlimited number of users and unlimited number of installations. Ideally, we'd like to test with about a hundred users, but any number will do in practice.
You'll need to have a Linux or Sun (SPARC) Solaris system for the main server, but user connections can be from any device, running any O/S - including smartphones, tablets, etc.
You'll also need an Oracle database. You can download Oracle 11g from their website, for free.
Installation takes about an hour, plus the time to migrate any existing users - for which we can supply a free tool.
Thanks in advance.
Relevant answer
Answer
Dear Mark,
You may like to read "Analysis of Authentication Techniques Adopted by End Users in Real-Life...", published in Proceedings of International Conference on ICT for Sustainable Development pp 99-107. This may be useful to you. Link is as under:
With best wishes,
Dr Kuntal Patel
Author: Self-Study Websites
  • asked a question related to Authentication
Question
6 answers
Hello everyone,
We are designing a blockchain-based authentication & authorization scheme for smart homes, and now we need to simulate the proposed network model to ensure our scheme is practically efficient and measure its performance in a real scenario. Therefore, we are looking for a simulation tool that is most suitable for the blockchain network simulation. We would be thankful for your help.
Also, if you can do the simulation for our scheme, it would be a pleasure to work with you, so let us know.
Relevant answer
Answer
Dear Zain ul Abadin, please send an email to me, and explain more about your problem.
(you can find my email address at the "About" section in my profile)
Best Regards.
  • asked a question related to Authentication
Question
6 answers
How to find which conference belongs to tier 1 and tier 2 conferences. Is there any authenticated list of that?
Relevant answer
Answer
Most of the conferences do not mention that they belongs to which tier
  • asked a question related to Authentication
Question
5 answers
Authentication in IoT systems are vastly insecure. Mostly the problems lies on its open ended and probable untrustworthy nodes. Also, the need for a lighter authentication mechanism will always be welcomed. The fact that IPSec limitations can also be overcome and Implementing authentication using block chain technique may give it more freedom. Please suggest your insights and ideas. Please give your insights. We can work together for a project.
Relevant answer
Answer
Hi, @Ajay Prasad,
Of course, we can use blockchain-based authentication of IoT devices.
Authentication schemes based on the blockchain technology can provide many special features, for example:
- The signing and decryption keys stay on the device.
- The verification and encryption keys are stored on the blockchain.
- Protects against critical cyber attacks such as phishing, man-in-the-middle, replay attacks...
I think this is not feasible for all IoT devices and systems because most of these last go towards low-cost solutions.
But this does not prevent to go ahead and work on such kind of schemes because it's will be suitable for many cases and scenario in IoT...
I hope my idea to be clear and at your question range.
With regards
Otmane
  • asked a question related to Authentication
Question
8 answers
Hello Everyone,
For a classification problem, we need imposter data along with authenticated user's data. I created a system that identifies an imposter or authenticated user. For the training, I gave the data imposters and authenticated to train and test the system. Now, the problem is to run the system on a new device, I always need the data of imposter.
I started my research work, keeping the classification in my mind. Now, I am at the end of my research work, can anybody guide me on how to handle this kind of problem. As I have seen many researchers are doing the same thing as I did. I am looking forward your expert opinion.
Relevant answer
Answer
I would discourage using randomly generated impostor data because the randomly generated impostor data may or may not (most likely not) be representative of the impostor class.
If you really want to use data from the impostor class, you should data of other users than the one for which you are building the model. Even that is not sufficient.
I would suggest, in addition to using data from other users, you should build an additional imitation dataset which will consist of data collected from people who make an active attempt to imitate the genuine user.
For example, in gait biometrics you can refer to the following papers:
Thanks!
  • asked a question related to Authentication
Question
4 answers
In the context of vertical industry, security demands could vary significantly among services. For instance, the mobile Internet of Things (IoT) devices requires lightweight security while high-speed mobile services demand high efficient mobile security. The network-based hop-by-hop security approach may not be efficient enough to build differentiated end-to-end (E2E) security for different services. As IoT is gaining momentum, more people will be able to remotely operate or "talk" to networked devices, for instance, instructing facilities at a smart home to get up. Therefore, there is a need for more stringent authentication method to prevent unauthorized access to IoT devices.
Now, what are the permanent authentication methods the could be to prevent unauthorized access to IoT devices?
Relevant answer
Answer
Combining 5G with IoT is the target agreed on by everyone.
And like any new technique, it will come with many security and privacy issues, but many solutions have been suggested. Some recent ones are listed below:
Please take in consideration that with 5G+IoT new paradigm of problems will arise which requires new types of solutions that includes blockchain, physical layer security, cross layer security solutions.
Best Regards
  • asked a question related to Authentication
Question
25 answers
Multi-factor authentication (MFA) adds a layer of security that allows companies to protect against the leading cause of data breach — compromised credentials. Users provide extra information or factors when they access corporate applications, networks and servers. Is Multi-factor authentication can be hacked? Yes/No and How?
Your thoughts?
Relevant answer
Answer
dear Ali A. Al-Homaidan - thank you for your reply!!
  • asked a question related to Authentication
Question
4 answers
How image steganography provides authentication? Where exactly steganography is used in military application?
Relevant answer
Answer
Thank you all. Thanks for your inputs really informative.
Special thanks to @ Rashedul Islam , @ Abbas Cheddad and @ Ghada salim Mohammed . Have a nice day.
  • asked a question related to Authentication
Question
3 answers
MODBUS-RTU is a serial protocol very common in the industrial world, the protocol is not secure and doesn't have any build-in authentication mechanism, I'm looking for research projects that try to address this problem.
Sincerely,
Eli
  • asked a question related to Authentication
Question
4 answers
Bagele Chilisa (2011) and Licoln and Guba (1985) have suggesting for Indiegnous research authentication. How helpful?
Relevant answer
Answer
Jahid Siraz Seems to me like you're confusing ontology with epistemology, which is what both the people you quoted were all about. Incidentally, neither of them did any work related to authentication - the way the security industry understands authentication.
  • asked a question related to Authentication
Question
5 answers
Applications like online-banking or online-shopping cater services to multiple users. Suppose each user can access these applications by login with their unique ID followed by providing their biometric-based signature (e.g., face, fingerprint, voice, swipe gesture, etc.).
  1. Which classification model, i.e., one-class or multi-class will be more justified for such systems.
  2. If one constructed a multi-class authentication model, then how to handle the situation to add a new user. Do a model required to be reconstructed every time?
  3. As the users data is already labeled so why not the one-class authentication model more suitable option? Simply, a labeled input query can be verified with the template stored for that label only.
Relevant answer
  • asked a question related to Authentication
Question
2 answers
What techniques could be used for authentication of social media viral video or mms.
Relevant answer
  • asked a question related to Authentication
Question
4 answers
A Share Link is created– a URL providing 50 days' free access to the article " Dynamic Digest Based Authentication for Client-Server systems using Biometric Verification ".
Anyone clicking on this link before August 03, 2019 will be taken directly to the final version of your article on ScienceDirect, which they are welcome to read or download. No sign up, registration or fees are required.
Relevant answer
Answer
I wash to help you
  • asked a question related to Authentication
Question
2 answers
Sir i want extract all metadata from a digital audio file for authentication purpose.
Relevant answer
Answer
Gangwar,
Try this site:
It makes that you need without installations.
  • asked a question related to Authentication
Question
1 answer
Hi, Have a mystery cell line of mouse origin that I need help identifying. I used the IDEXX service for STR analysis but the results were inconclusive. Seems like the database is forthcoming but the project was initiated in 2012. Any experts out there that can help?
Relevant answer
Answer
NCBI BioSample
Search for strain (e.g., FVBN) or strain and STR (e.g., C57BL STR)
You can also use the criteria on the left of the page to narrow down the search results:
For example:
Attribute name: cell line
Model organism or animal
  • asked a question related to Authentication
Question
3 answers
I want to know that what are the current methods for Authentication in a CCN system , Is there nay research paper or article on it ?
  • asked a question related to Authentication
Question
4 answers
This is a question to the experts familiar with smartphone technology and banknote security features
Relevant answer
Answer
Hello,
Banknotes authentification is based on identifying security features which are present in banknotes. Consequently, one or more sensors are required to acheive the bill validation process : IR Sensor, UV Sensor, MG Sensor, FL Sensor.
Nowadays, ordinary smartphones are not equipped with this kind of specefic sensors, so, i beleive that banknotes validation process using smartphones is not actually possible, unless, specific sensors might be built-in separatly.
Best regards,
  • asked a question related to Authentication
Question
3 answers
I am working on ECG cryptography and authentication for Body Area Networks. I seek knowledge on how to get the algorithms implemented. I mean the language or libraries to use for implementations and respective results.
Relevant answer
Answer
Ms Preeti,
the data set for ECG cryptography can be obtained from Bonn university site at the below link
http://epileptologie-
you can also employ discrete chaos for realization of new ecg cryptographic method.
  • asked a question related to Authentication
Question
11 answers
I have a system of identifitcation using retina. Now I want ot calculate FRR, FAR and then plot them by changing the value of threshold to obtain DET graph(Detection error trade off). Geniune user have threshold value of 8 and imposters have threshold value less than 8. 
I am not using machine learning. So I donot have labels from which I can decide that particular user is authenticated or not? on the basis of final threshold hold I decide weather person is authenticated or not?
I am clear about the definitions of FRR and FAR. However I am confused about how to find them using matlab? 
Relevant answer
Answer
Lets assume you have a biometric evaluation system that assigns all authentication attempts a 'score' between closed interval [0, 1]. 0 means no match at all and 1 means a full match. If the threshold is set to 0, then all the users including the genuine (positive) and the impostors (negative) are authenticated. If you threshold is set to 1 then there is a high risk that no one may be authenticated. Therefore, in realtime systems the threshold is kept somewhere between 0 and 1. So, this threshold setting can sometimes may not authenticate the genuine users, which is called FRR (False Reject Rate) but may also authenticate the imposters, which is given by FAR (False Accept Rate).
Here, FP: False positive, FN: False Negative, FN: True Negative and TP: True Positive
FAR is calculated as a fraction of negative scores exceeding your threshold.
FAR = imposter scores exceeding threshold/all imposter scores.
imposter scores exceeding threshold = FP
all imposter scores = FP+TN
FAR = FPR = FP/(FP+TN)
FRR is calculated as a fraction of positive scores falling below your threshold.
FRR = genuines scores exceeding threshold/all genuine scores
genuines scores exceeding threshold = FN
all genuine scores = TP+FN
FRR = FNR = FN/(TP+FN)
  • asked a question related to Authentication
Question
3 answers
For my proposed authentication mechanism, how to simulate in NS2 and NS3. Can you please give a note on simulating authentication in simulators.
Relevant answer
If you are talking about node authentication in NS2, then node authentication is required in network for like secure route discovery and data transmission. In such cases, node attaches the encrypted identity as the signature in the packet. Elliptic Curve Cryptography (ECC) an asymmetric cryptography technique is used for encryption and decryption.
C++ part : // Encryption ec_t::Point Pa = aa*G; // Source public key ec_t::Point Pb = bb*G; // Receiver public key ec_t::Point Pk = aa*Pb; ec_t::ffe_t c1( m1*Pk.x()); ec_t::ffe_t c2( m2*Pk.y());
// Decryption Pk = bb*Pa; ec_t::ffe_t m1d = c1/Pk.x(); ec_t::ffe_t m2d = c2/Pk.y();
  • asked a question related to Authentication
Question
3 answers
Hello,
I am looking for Blockchain-based user authentication schemes.
Any suggestions..
Thank you.
Relevant answer
Answer
Common practice suitable for any blockchain: Ask user to sign some message (which is completely random or contains nonce), then verify his signature.
Additionally some blockchains have features, those could aid You. For instance, through Solidity (for Ethereum) You could compare `msg.sender` with some stored address before function call (usage of modifiers) if the user needs special treatment or You wish to restrict it usage for some_address_only.
  • asked a question related to Authentication
Question
9 answers
i need ideas regarding in which area i can concentrate in IOT with block chain...regarding authentication and access control...
  • asked a question related to Authentication
Question
23 answers
Let me tell you what I want to do in the detail:
PLEASE REFER FLOW chart for more understanding
Step 1: Split Original image into lets say 8 equal blocks and take color histogrm of each block. This will be the reference data REF (Attached original image = P_original.png). We can call it registration process of the true image. Please find attached file Slice.jpg and code used split.m. Here I want to neglect all the blocks with the black color (no information) before doing the histogram and in histogrm I want it to be flexible (so I can focus on the certain color intensity).
Step 2: Authentication process: Now I want to take the duplicate image. Do the same thing again. and compare the histogram result of each block with the REF data and give the result : Authentication sucessful if similar or unsuccessful if not similar. Please find P_transformedC.png file for duplicate image for comparision.
Relevant answer
Answer
Thank you very much for the code
I have one question:
From the SplitHistMatch code:
[Red1,Green1,Blue1 ]=HistMatch(blocks1);
[Red2,Green2,Blue2 ]=HistMatch(blocks2);
Does this code compare image blocks1 to blocks 2?
because I think It is comparing within the blocks 1 and blocks2
What I want to do is comparing 2 blocks from different images.
Please find attached chart for detailed understanding.
  • asked a question related to Authentication
Question
9 answers
My research focuses in Human Computer Interaction. Theoretical security evaluation includes analyzing password space. While empirical security evaluation includes doing experiment on shoulder-surfing, observation, intersection, guessing attacks etc. Can I only include theoretical evaluation?
Relevant answer
Answer
Ofcourse, its necessary to show the lacuna n literature and the extent of convergence and divergence in existing studies.
  • asked a question related to Authentication
Question
5 answers
The common practice of sending a second factor to the user via an SMS message or email is both inelegant and inconvenient. Especially, if the user is in the middle of filling in the login form on the phone to which the SMS is sent.
This apart, users find any security measure, which delays their access to a service, an irksome imposition.
A considerable improvement would be if the submission of the second factor were to be totally transparent, and immediate.
From a security point of view, it would also be good if the second factor were unique to the user, and irreproducible.
Relevant answer
Answer
Dear Mark,
I know this attack, but there have been countermeasures introduced against it as well.
  • asked a question related to Authentication
Question
4 answers
Hello,
I am going to work on multimedia authentication through machine learning. please someone suggest me a technique for this work.
Relevant answer
Answer
hi
I think it's a good method for machine learning, and authentication, it's by generated strong keys by Fuzzy Extractor and biometric.
Best regards.
  • asked a question related to Authentication
Question
4 answers
Hi everyone
I am developping a real time chat using asp.net and signalR library.
After authentification, i am facing some problems to display a real time list of the connected clients.
Does any One can help me to find a code of how to display this list?
Relevant answer
Answer
ThanDr Salah
  • asked a question related to Authentication
Question
6 answers
I want to implement authentication algorithm of RFID ......which language will b best to implement algorithm nd with which simulator?
Relevant answer
Answer
For simulations and implementation, C++ is required. But for the practical implementation over a software defined radio, so Python is required.
  • asked a question related to Authentication
Question
4 answers
Can anyone help to connect the Anfatec lockin amplifier (eLockIn203) to PC with IP address using LockInRemote program? I filled the authentication menu with the IP displayed on the eLockIn SETUP display but the computer kept saying ´No Server Found at this IP Adresse!´.
Relevant answer
Answer
Thank you, I already solved the connection problem. Does anyone have LABVIEW control panel of this device with TCIP connection? I would be happy if you can share this with me. Thank you again.
  • asked a question related to Authentication
Question
4 answers
Hello intellectuals !
Let's suppose we have a setup like Kerberos where messages are exchanged between the devices and a server. Is there any open source tool or simulator that can calculate the time each device or server takes to compute the message and the time the message takes to travel on the channel to reach its destination (other device)? The basic idea is to find out the total time a protocol takes to execute to achieve the set goals like authentication, authorization etc. Thank you.
Relevant answer
Answer
I would vote to Wireshark.
I quote some highlights from its portfolio.
"
Wireshark is the world's foremost network protocol analyzer. It lets you see what's happening on your network at a microscopic level. It is the de facto (and often de jure) standard across many industries and educational institutions.
It is community led software.
Wireshark has a rich feature set which includes the following:
* Deep inspection of hundreds of protocols, with more being added all the time
* Live capture and offline analysis
* Standard three-pane packet browser
It is Multi-platform. It runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others.
* Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility
* The most powerful display filters in the industry
* Rich VoIP analysis
* Read/write many different capture file formats: tcpdump (libpcap), Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network Monitor, Network General Sniffer® (compressed and uncompressed), Sniffer® Pro, and NetXray®, Network Instruments Observer, NetScreen snoop, Novell LANalyzer, RADCOM WAN/LAN Analyzer, Shomiti/Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, WildPackets, EtherPeek/TokenPeek/AiroPeek, and many others
Capture files compressed with gzip can be decompressed on the fly
Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platform)
Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
Coloring rules can be applied to the packet list for quick, intuitive analysis
Output can be exported to XML, PostScript®, CSV, or plain text
"
  • asked a question related to Authentication
Question
3 answers
Security scheme, especially a suitable authentication process, can improve QoS provision for data traffic transfer over optical switched network. The authentication process can limit the degradation of QoS support including to provide the traffic requirements such as the traffic loss.
Relevant answer
Answer
Please take a look at Hop-by-hop/end-to-end efficient authentication protocols and see if they can fit your case study. I think secure authentication schemes can improve QoS by dropping any packet that originates from outsiders (Unsolicited traffic) or adversaries (DoS attack).
  • asked a question related to Authentication
Question
6 answers
Selection of Multi factor Authentication (MFA) for web based application
Relevant answer
Answer
Thanks @Sandeep for your valuable comments
  • asked a question related to Authentication
Question
7 answers
I'm interested in studying the behavior of intruder over popular OSN such as Facebook. Intruder or imposter can be defined as an attacker who illegally  uses another authorised user  account to perform different activities inside that user profile.
Relevant answer
Answer
Dear Ja'far,
Have you found the data set you were looking for? Because I am looking for the same data and I would be grateful if you let me know what data set you found.
  • asked a question related to Authentication
Question
5 answers
I was conducting a research on "Database Encryption and Authentication" and was looking at the latest content on the subject matter.Unfortunately all the research I have found is dated before 2015,so I would be really grateful if I could get a reference after 2015.
Thanks in advance.
Relevant answer
Answer
Ok, let me tell you this, SQL in particular has important issues other than authentication as the authentication process apply to all other servers equally but for SQL the SQL injection attack is top of the list in the threats list, therefore if you want to deal with authentication user or server then that is enough by itself or if you want to research threats to SQL in particular then you go for the injection attack, that is my opinion.
  • asked a question related to Authentication
Question
5 answers
How do I implement one class SVM for user authentication? I have unlabelled dataset for 100 users. In my understanding, I have to create 100 different one class svm models for all users to determine if the user is authentic or not , but I am not sure about it.
Relevant answer
Answer
In your reply you've mentioned that "My problem is to distinguish an authentic user from unauthentic user". This means that you have 2 types from users: authentic and//or from unauthentic. Therefore, this led me to recommend the use binary classification.
Well, if have only one label of class attribute (say authentic) then use the way that I explained in my first reply.
Cheers,
Samer Sarsam, PhD.
  • asked a question related to Authentication
Question
4 answers
Im from Government Siddha medical College, Tirunelveli, Tamilnadu. I have done herbarium for my dissertation purposes.
1. Suggest me, where to authentication certificate ?
2. Where to submit my herbarium and sample raw drug ?
Relevant answer
Answer
You can contact:
Scientist, In-Charge, Botanical Survey of India, Southern Regional Centre, T.A.N.U. Campus, Lawley Road, Coimbatore 641 003, Tamil Nadu for having authentication of your plant specimen and you can also deposit the same in that herbarium. See the attached file.
  • asked a question related to Authentication
Question
5 answers
Cell lines after going through number of passage trends to change. Is there any fixed duration after which cell lines should be authenticated (by STR profiling etc)?How often one should authenticate their cell lines?
Best Regards
Relevant answer
Answer
Many thanks Snow
Best Regards
  • asked a question related to Authentication
Question
4 answers
Hello Authors,
I want to know how deep learning is used in media authentication?
Relevant answer
Answer
I agree with you Dr Luay Abdulwhid Shihab.
Regards!
  • asked a question related to Authentication
Question
4 answers
I tried many ways to install Castalia 3.2 in my omnet++ 5.2.1 but it's not help me. I want to implement RFID authentication algorithm , with which framework i should go INEt or Castalia ? Is Castalia supported in Windows operating system ?
Relevant answer
Answer
thank you sir , but i started my work with INET in omnet++ 5.2.1 ... if i insatll 4.3.1 will it overwrite or new instance generate?
  • asked a question related to Authentication
Question
9 answers
Barcoding is molecular authentication of the species based on its unique Marker DNA sequences particularly COI. OK, If it is so, how does it contributes to plan conservation of that species?
Relevant answer
Answer
An example:
Here in our area there are again wild wolves again. Of course they are strictly protected. Recently, wolves escaped from an enclosure. These are used to people less shy and therefore perhaps more dangerous. At a prey animal it was discovered with barcoding that it was torn by a cage animal. When compensating farmers, it is important to know whether the animals actually killed were torn from protected wildlife or not.
Another example:
Here there are few small populations of the wild-hen Tetrao urogallus. The shy animals are difficult to observe or count. Scientists collected their excrements (pellets). With the help of barcoding, they were able to determine the number of birds and determine whether and how many interchanged between the various protected areas.
Another way of barcoding is to study dietary habits of protected animals:
Regards,
Rudolf Ritt
  • asked a question related to Authentication
Question
3 answers
Hello!
This is an interesting idea !
I would like to know which spectroscopic techniques are you going to use, and for which food products.
Thank you in advance for your reply :-)
Best regards
Abdo
Relevant answer
Answer
I am following the answer
  • asked a question related to Authentication
Question
4 answers
Cell lines after going through number of passage trends to change. Is there any fixed duration after which cell lines should be authenticated (by STR profiling etc)?How often one should authenticate their cell lines?
Best Regards
Relevant answer
Answer
Thanks dear Pal....
  • asked a question related to Authentication
Question
5 answers
I want to test user authentication through simulation tool in cloud computing because its part of thesis. Can anyone please guide or provide me simulation tools for user authentication in cloud computing and also what are the simulation tools free available on internet regarding user authentication in cloud computing?.
Thanks for your valuable guidance
Relevant answer
Answer
When you can use the real time cloud, why do you need to simulate cloud. I guess the simulation period has gone. You can straight way use Cloud, such as AWS and GCP.
If you need any information or support, you can reach me via praveenkumar558@gmail.com
  • asked a question related to Authentication
Question
3 answers
Implementation details
Relevant answer
Answer
Do you man artificial neural networks? They work with approximate real values due to the principle of fault tolerance and learning. RSA (Rivest, Shamir, Adleman?) is based on precise big integer mathematics. Hard to see a possibility for reconciliation. Note that only the key should be secret, not the method. That means, once you have trained your neural network, you have to present a copy of it and its source code to your opponent.
Maybe neural nets can be used to discover patterns in encrypted texts, which might facilitate cryptanalysis.
Regards,
Joachim