Science topic
Authentication - Science topic
Explore the latest questions and answers in Authentication, and find Authentication experts.
Questions related to Authentication
Dear friends:
I have identified several topics for collaboration, which can result in possible intellectual property products. Interested people can reach me by email: kaushandi@gmail.com. Please state the collaboration title in the subject line of your email. We can discuss the logistics once you reach out to me with your interest.
Please join my whatsapp group
I will keep adding more topics and open to explore more ideas
1. SOLAR POWERED JUICE CART
2. IOT BASED BLOOD OXYGEN SATURATION METER
3. Apparatus for Testing and Studying the Transport of Contaminant through Soil
4. Portable Torch with air quality tracking
5. IOT BASED SMART ROBOT FOR AIR CONDITIONER DUCT CLEANING
6. IOT BASED AUTONOMOUS STAIR CLIMBING MATERIAL HANDLING ROBOT
7. CONFIDENCE TRACKING DEVICE OF THE EMPLOYEE (MACHINE LEARNING BASED)
8. MILK QUALITY ANALYSING AND PURIFICATION SYSTEM
9. PORTABLE MOUNT STAND FOR SUN TRACKING SOLAR PANEL
10. GAS STOVE WITH PORTABLE STORAGE CABIN
11. Biometric fingerprint reader/Iris/ Face/ Voice Authentication Device
12. Water Distillation /Solar Powered Water Distillation System
13. Walking Stick for Visually Impaired People / Elderly People
14. Wearable Electronic Device for Blinds/ IOT Based Wearable Medical Monitoring Device
15. Obstacle Avoidance Shoe with Motion Sensors
16. IoT Enabled Signal/ Driver/ Temperature/Health Monitoring System
17. Ultrasonic Pulse/Velocity Monitoring Device
18. Food/Milk/Oil/Honey/Fuel Adulteration Monitoring Device
19. Safety Helmet for Construction Workers
20. Solar Inverter/Portable Solar Tree/ Solar Power Tent/ Sun Tracking Solar Panel
21. IoT Enabled Audio Player Integrated Printer
22. IoT Based Solar Powered Agriculture Robot
23. Animal Tracking Strap Using RFID and IoT
24. IoT Based Face Mask Detecting and Body Temperature Measuring Device
25. IoT Based Automated Rail Track Inspection Trolley
26. Biosensor Based Biotech Device to Detect Lung Cancer
27. Portable IoT Based Plant Health Monitoring System
28. IOT Enabled Streetlight Controller/ Water Level device
29. Wind/ Solar Power Charging Station for Vehicles/Mobile
30. Agriculture Drone for Monitoring and Spraying Pesticides
31. Fire extinguishing equipped life-saving drone
32. Exam Invigilation Drone/ Pollution Identifying Device/Drone/Underwater Drone
33. Portable Solar Vegetables and Fish Dryer
34. Portable Solar Grass Cutting Machine
35. IoT Based/Solar based Irrigation System
36. Microwave Sensor based Soil Analyzer
37. Soil Moisture Indicator/Smoke and Heat Detector Indicator
38. Helmet with Integrated Camera/ Safety Helmet for Construction Workers
39. IoT based Camera for Healthcare Management
40. IoT Weather/ Air/ Environmental/ Antenna Signal Quality Monitoring Device
41. Pen/ A pen for converting text into speech/ Pen With USB Pen Drive and LED Light
42. Portable Touch Free Sanitizer/Water Dispenser
43. Wrist Band/ Belt for School Children’s /Woman/ Elderly People Security
44. Cell Phone Jammer/ Integrated Indoor Jammer
45. Construction Material/Digital Compression Testing Machine
46. IoT Panel for Door Security System
3l47. Multiple Die Manufacturing Unit
48. Wireless Laptop Charger Cum Cooling Pad
49. Sensor for Breast/Lung Cancer Detection
50. Agriculture Seed & Fertilizer Feeder with Linear Plough Digger
51. Network Device/Network Functions Platform/ Network Computing
52. Defect Display Device for Ad Hoc Network/ Optical Network Terminal
53. Wireless Networking Device For Controlling Home Appliances
54. Detection of Diabetic Analyser/ Apparatus for Healing Diabetic Foot Ulcer
55. Seed/Vegetable Quality Analyser Device/ Colour Image Detection Device/Fruit Processing Machine
56. Device for detecting diseased leaves in plant by image processing
57. Room Heater/ Water heater/ Solar Water Heater
58. LED Light/ Solar Step Light/ Emergency Light/ Photographic Flashlight/ Lighter for Gas Stove
59. Headphone/ Wireless Headphone
60. Border/ Marine Boundary Alert System for Fishermen
61. Food/Metal/Stone/ Image/Data Processing Unit
62. PLASTIC WASTE MANAGEMENT SYSTEM
63. FINANCIAL DATA MANAGING DEVICE IN BANK.
64. Portable Device for Queue Management
65. ATTENDENCE MANAGEMENT SYSTEM
66. Dissolution Testing Apparatus
67. BIO-TELE MONITORING BELT FOR PREGNANT WOMEN
68. Medical Device for Measuring Bodily Fluid in Neonates
69. Drug dissolution Analyzing apparatus
70. Mobile Agitator Vessel for pharmaceutical and chemical industries
71.Pneumatic Stirrer Agitator for pharmaceutical laboratory
72. PHARMACEUTICAL SOXHLET APPARATUS
73. INFRARED TRACKING LIGHT FOR JOINT AND MUSCLE THERAPY
74. Blister Machine for Pharmaceutical Purpose
75. Cartoning Machine for Pharmaceutical Purpose
76. Medical Waste Treatment Device
77. A DEVICE FOR MEASURING HEART RATE AND RESPIRATORY RATE OF FOETUS DURING PREGNANCY
78. CARDIOVASCULAR STENT FOR THE PREVENTION AND MANAGEMENT OF CARDIOVASCULAR DISORDER
79. AI based smart glasses for determining retinal stress
80. BELT FOR SCHOOL CHILDREN SAFETY
81. wireless Medical appliance controlling device
82. ML based robot for determining Crop Yield
83. Facemask banding machine with online payment facility
84. MACHINE LEARNING BASED HEALTH MONITORING WEARABLE DEVICE
85. PLANT MONITORING DEVICE USING IOT
86. SMART TROLLEY WITH PRODUCT TRACKING USING IOT
87. ELECTRONIC VAPORIZATION DEVICE
88. AI based collapsible metal detector
88. IoT BASED BLOOD OXYGEN SATURATION METER
89. IoT BASED WEATHER FORCASTING DEVICE
90. MICROREACTOR FOR NANOPARTICLES SYNTHESIS
91. Artificial Electronic Hand with Electromyographic (EMG) Signals
92.. Machine learning based stress detection device
93. 5G based Remotely control IOT street lamp
94. AI based smart glasses for determining retinal stress
95. BELT FOR SCHOOL CHILDREN SAFETY
96. wireless Medical appliance controlling device
97. ML based robot for determining Crop Yield
98. Facemask banding machine with online payment facility
99. MACHINE LEARNING BASED HEALTH MONITORING WEARABLE DEVICE
100. PLANT MONITORING DEVICE USING IOT
101. SMART TROLLEY WITH PRODUCT TRACKING USING IOT
102. ELECTRONIC VAPORIZATION DEVICE
103. AI based collapsible metal detector
104. TELESCOPIC WALKING AID FOR HANDICAP
105. VESSEL CLEANING ROBOT
106. IOT BASED BIOGAS LEAKAGE DETECTING DEVICE
107. LEAD TOXICITY DETECTOR AND WATER CLEANING MACHINE
108. MICROREACTOR FOR NANOPARTICLES SYNTHESIS
109.Weather and Natural Disasters Prevention and Monitoring Using IOT, AI and ML
110. IoT based Solar Powered Robot for Agriculture
We are setting up PingFederate in GCP env using devops. The vanilla Ping authentication works without issues.
However, helm charts of Pingfederate does not have annotations / variables to configure x509 on same end-point as regular authentication.
Provide a trustworthy reference also, please. How can we calculate this?
What are the critical security considerations prompt engineers must address when crafting prompts for sensitive data interactions, and how can they mitigate risks related to data privacy, injection attacks, model exploitation, ethical bias, and the secure handling of user authentication and access control? Additionally, how can prompt engineers implement auditing mechanisms and ensure ethical safeguards while maintaining system performance and preventing misuse of AI-generated content?
I am looking for simulating a VANET environment where I can use Elliptical curve Cryptography also. Is there any suitable tool or any suggested approach to carry out this?
looking in terms to carry out secure authentication.
Thanks and Regards
I want to test user authentication through simulation tool in cloud computing because its part of thesis. Can anyone please guide or provide me simulation tools for user authentication in cloud computing and also what are the simulation tools free available on internet regarding user authentication in cloud computing?.
Thanks for your valuable guidance
Which is the best simulation tool I can use to implement location based authentication?
what is the scope of research in location based authentication in IOT?
In quantum cryptographic protocols, participants typically share both a quantum channel and a classical authenticated channel. Authenticated channels ensure that messages come from legitimate senders and have not been tampered with. However, these channels do not inherently protect against the interception or blocking of messages by an adversary. Blocking or delaying messages in the classical channel is considered an active attack.
Many sources, including the first article in quantum key distribution by Bennett and Brassard, mention that the public channel between participants is only susceptible to passive attacks, not active attacks.
My question is: In quantum cryptographic protocols (such as QKD, QSS, and QPC), can an attacker block or delay messages in the public channel without being detected? If so, wouldn't that compromise the security of many well-established protocols such as the BB84?
I am doing research in the field of IoT.I need guidance for identifying research topic in location based authentication.
could i please get an example Use case diagram for fingerprint authentication in a mobile banking app?
I have isolated granulosa cells from mice ovary using puncture method. Cells are healthy and growing in DMEM. Their morphology is same as granulosa cells. However I would like to use a molecular markers or Immunohistochemistry method to authenticate them further, before downstream use. Can anyone suggest the best methods and markers for the same ?
I am doing my phd in parapsychology, I would like to know any authenticated questioners regarding this.
The recognition process of all types of biometrics relies on the probabilistic judgment of variable physical and / or behavioral features of human beings. However, an authentication system requires the recognition result from authenticating the right person deterministically. But, biometrics recognition is inherently probabilistic and hence unreliable. Biometrics recognition can not yield a deterministic "yes/no" result as text passwords/PINs. Thus, biometrics can lower security.
Also, I would like to know how can I proceed with learning the usage of Proverif2.0, RoM and BAN Logic for a particular proposed authentication scheme.
I'm interested in understanding the practical implementation of authentication and authorization using .NET Identity, specifically in the context of accommodating individual user schedules. If you've worked on such scenarios or have insights into the integration of .NET Identity with personalized schedules, I'd love to hear your experiences and recommendations
Where can i find pesudo implementation for cloud auditing mechanism proposed in "Enabling Parity Authenticator based public auditing with protection of a valid user revocation in cloud". I am attaching the paper to help people help me, I hope i am not breaking any rules here.
PS: I tried contacting the authors of the paper through on their official emails but didnt get any responce.
provide any suggestions from studies to support this question
If yes, would you please provide examples from literature.
Which authentication schemes would perform better than improved Feige–Fiat–Shamir (IFFS) for modeling a secure IoT-integrated WBAN framework for e-healthcare?
Note: We will devote a set of questions to Functional Requirements
We will have another set of questions related to non-functional requirements later.
[1]
The functional requirements (First) describe the functionalities required from the system, such as business rules, transaction corrections, adjustments and cancellations, administrative functions, Authentication, and Authorization levels (Second).
First:
The functional and non-functional requirements present the Problem Space, and no one knows how to define and understand the Problem Space.
Why?
Because if we know how to understand the Problem Space, we will be able to:
1. Stop the nightmare of Maintenance, and we can implement preventive Maintenance.
2. Stop reinventing the wheels.
3. Develop self-manageable, self-adaptable, self, extendable, and self-configurable systems with unlimited applicability, reuse, and other quality properties of the system development.
Second:
(1) The functionalities described above do not tell the software and system requirements and only represent the business properties, which is very easy to do. It has been business as usual. Where are we now?
(2) Limited to business software and has nothing to do with critical life & time software systems, Aerospace, defense, and others,
(3) Limited to developing an instance-oriented software system which would lead to within and out reinventing the wheels.
(4) How to guarantee the business rules, transaction corrections, and others
The first 5G radio networks are now live. This generation of telecommunication system aims to deliver
- Enhanced mobile broadband,
- Massive machine-type communications,
- Ultra-reliable and low latency communications.
The purpose is to be faster, more reliable and manage the scale of devices predicted for the Mobile Internet of Things (MIoT). Enabling the digital transformation of our society, business processes and manufacturing. To enable this, 5G will deliver multi-network slicing, multi-level of services and multi-connectivity network capabilities. To allow the required flexibility, agility and economies of scale these technologies will be delivered via virtual and containerised environments. This is a revolutionary way of working for the industry. 5G has designed in security controls to address many of the threats faced in today’s 4G/3G/2G networks. These controls include new mutual authentication capabilities, enhanced subscriber identity protection, and additional security mechanisms. 5G offers the mobile industry an unprecedented opportunity to uplift network and service security levels. 5G provides preventative measures to limit the impact to known threats, but the adoption of new network technologies introduces potential new threats for the industry to manage.
what are the different measures we can consider for calculating the trust score of web application whose authentication is based on oauth2.0
How Can We use Artificial Intelligence technology in user authentication in Wireless Communication?
Every user needs to get authenticated before connecting to network. Here we want to do this process using Artificial Intelligence technology.
Here how AI can be used for this authentication process?
Is there any alternative approach to show the performance evaluation in designing and analysis of authentication key agreement protocols?
is the ROC curve good? instead of conventional Bar charts?
Are there any other alternatives ??
Assuming this publication about multi-factor self-sovereign identity authentication:
Conference Paper A Blockchain Implementation for Configurable Multi-Factor Ch...
The question arises of how to manage a library for a challenge set that needs to be responded to by either a device, a system, an organization, or a human.
I received a mail few days ago ''Congratulations! Your nominated profile has been selected for the "International Research Award on New Science Inventions" under the category of "Young Scientist Award". Kindly complete your registration process as earlier as possible and use your submission ID for the further registration process''
Is this real or just a scam?
we are going to carry out some epigenetic experimentations. definitely we need to count the cells. however some samples are dried-freeze cell pellet and had reserved in -80 freezer. the question is can we use them for cell counting after that long-term freezing? are they intact? is it authenticated??
Hi everyone, i am in desperate need on the STR authentication of some of the Pancreatic Cancer cell line for my publication. We purchased the cell lines including PANC-1, ASPC1, BxPC3 and HPDE6 from ATCC long ago but now we need its STR authentication , Can someone help us out by providing the required authentication. Your cooperation in this regard will be highly appreciated.
I am review security requirements frameworks for UAV security. I want to cover UAV security with CIA principles with authentication and non-repudation. Can I add these into the CIA triad?
Hi friends i want to know the basic authentication for Elliptic curve cryptography for IOT devices in Verilog code also with SDk
As to deal with micro scale problem we have to constricted by some political or administrative boundary , which may conflict with regional aspect or may not be accurately authenticated with overall geological, geomorphological and geographical perspective. Again natural scale regional focus may dilute the specific spatial issues . That's why the question arises.
Hello everyone
I want simulate authentication in IoT with blockchain in a simplest way.
I work with Ganache and Solidity in remix.ethereum.org.
I have a academic project.
Please help me...
Thanks
What are the criteria publishers use to check authenticity of submitted papers?
What are some software they use for authentication of manuscripts?
Is it possible that different species of particular plant encountered in a specific forest area is totally different from the previous report when surveyed after about a decade? If yes, what can be the tentative reason?
I feel that it is probably due to lack of proper identification and authentication.
Please help to find a reason.
Hi,
I am working on project where I am able to show V2V communication on in simulation. However, I need to implement Hash algorithm for vehicle authentication.
I could get md5 algorithm which uses SHA256 method for authetication but I am not sure how the message ID vehicle ID, TA id, formats to be fed to this algorithm
Can someone please help me to understand how can i do it , by providing some detailed example using real life IDs of vehicles , truust authority tower ID, etc ?
BR
Sameer
Hi
What are the best simulators/emulators that provides a wide support to simulate attacks on iot devices and protocols (BLE, MQTT, authentication, MITM, ddos, sybil ...) and that offers by the same time to implement security mechanisms (crypto, authentication, TLS,...).
I have to generate unique authentication code , can eigen values are helpful for the same. please help me for the same
I would like to programming my project for securing coap protocol with symmetric key and biometric by HLPSL in span of AVISPA and would like to learn about your experience with this tool.
Thanks
I read papers about PLA.It often says:'Note that a PLA scheme is not designed to replace an
upper-layer authentication scheme. On the contrary, a PLA scheme is designed to compensate for an upper-layer authentication scheme, which provides a higher security level.'
Why?
Increasingly, more articles are being retracted because of duplicate or otherwise dubious Western blots. Consequently, journals are asking for original Western blots and authentication of antibodies. Many labs rely upon data from companies. However, many antibodies continue to circulate that simply do not work as advertised. Thus, the scientific community must be vigilant and organized to maintain high quality Western blots. But how best to do this? Many labs, including my own, no longer use film. Instead, we scan blots directly and save them as digital files. Further, many labs, including my own, will physically cut blots to probe with different antibodies. I for one will only allow this once the antibody is rigorously vetted for authenticity using overexpression in cells, knockdown in cells or knockout in mice, preabsorption of antibody with peptides (when available) prior to probing, as well as cell/tissue positive/negative controls. In the case of authenticating an antibody, we use the entire blot to serve as the "authentication blot" in case a journal or reader wishes to know how we know the antibody works, as advertised. Once such a blot is filed away, we cut blots so as to streamline experiments in the most parsimonious way without compromising results. The problem with this and thus the question before the community is: will journals accept this approach or must EVERY experiment be saved as a full length (uncut) blot for purposes of submission to a journal which require original blots?
In our model, we would publish the original authentication experiment in a full length blot but then subsequent experiments would be cut down blots showing, for example, the protein of interest and then the attending loading control.
I welcome all feedback on this important issue.
Hello everyone I hope you are doing well.
I am doing simulation for SSL VPN and I try to apply the commands that enable the HHTP however every time that I use any command with http I got the same result as follow:
CCNA-ASA(config)#http server enable
% This version of Packet Tracer does not support this option.
CCNA-ASA(config)#aaa authentication http console local
^
% Invalid input detected at '^' marker.
Note:
That I am using packet tracer version 7.3
ASA 5506 version 9.6 ASDM version 7.6
Anyone can help me with this problem.
Here is a big question about identity authentication: I came across a wacky article that reports about the scary plan to fuse physical-, biological and digital identity into one: https://summit.news/2020/11/16/klaus-schwab-great-reset-will-lead-to-a-fusion-of-our-physical-digital-and-biological-identity/
First I thought that beats completely my own research work into multi-factor identity authentication as per the 2 papers linked to below:
Conference Paper Mapping Requirements Specifications into a Formalized Blockc...
Here is also a link to a very nice PhD thesis where those 2 papers linked to above form Chapter 4 (just to understand the context):
Now I realise there is no contradiction in the vision and the published work at all. Thus, my concrete question pertains to how the physical- and biological factors could be integrated in addition to digital aspects into a multi-factor identity authentication protocol such as Authcoin. Does anybody have an answer to this question? May I also add here this Microsoft patent for good measure that wants to merge the concept of blockchains with the human body as well?
This really brings together quite an amazing picture about what is possible in the future. My question is how all of that can be done concretely beyond some wacky and entertaining conspiracy visions?
Cheers, Alex
Hi
Anybody familiar with a lab/company that is doing mouse cell line authentication in Israel?
If not , can this procedure be performed by a certain kit in a "regular" lab? and if yes how?
thank you for your help
is it possible to use a MAC address of device as an authentication key for accessing a file? can this be implemented manually ?
like if I want a specific device to access a file( i have no access to that device, i have only MAC address) , so that no other device can run that file, is it possible ?
Most of the articles are not cited because of poor visibility of that paper. The Journal policy may play a vital role in the article visibility. Some Journal without authentication we are not able to view that research papers. So If I want to improve the visibility of my research papers means what step I have to follow?
Many organizations encourage their users to create complicated passwords that are usually hard to remember (and easy to brute-force). Has there been a study to show that passphrases have a definitive advantage over passwords or vice versa?
Hello,
I search for an article(s) comparing the security level of MAC (Message Authentication Codes) of the Crypto++ Library.
I make a benchmark wich evaluting the speed of the different algorithms.
The library contains the following algorithms:
MAC= BLAKE2b, BLAKE2s, CMAC, CBC-MAC, DMAC, GMAC (GCM), HMAC, Poly1305, SipHash, Two-Track-MAC, VMAC.
Dear Sir,
I would like to know if there is a plan in this project to establish a Taqman based method for fraude detection in coffe blends by mixture of Coffea canephora and Coffea arabica. It would be really usefull for coffee authentication.
My best regards,
Maria.
I am working on cooja simulator for the Authentication of iot node with blockchain. could anyone share the authentication code of blockchain?
An authentication system using negative filtering (authentication) approach.
cell line authentication, STR profiling, fragment analyser
We would appreciate someone installing our authentication system, and giving us feedback on various aspects like ease of installation, user experience, bugs (hopefully, none...).
We will give you a free licence for an unlimited number of users and unlimited number of installations. Ideally, we'd like to test with about a hundred users, but any number will do in practice.
You'll need to have a Linux or Sun (SPARC) Solaris system for the main server, but user connections can be from any device, running any O/S - including smartphones, tablets, etc.
You'll also need an Oracle database. You can download Oracle 11g from their website, for free.
Installation takes about an hour, plus the time to migrate any existing users - for which we can supply a free tool.
Thanks in advance.

Hello everyone,
We are designing a blockchain-based authentication & authorization scheme for smart homes, and now we need to simulate the proposed network model to ensure our scheme is practically efficient and measure its performance in a real scenario. Therefore, we are looking for a simulation tool that is most suitable for the blockchain network simulation. We would be thankful for your help.
Also, if you can do the simulation for our scheme, it would be a pleasure to work with you, so let us know.
How to find which conference belongs to tier 1 and tier 2 conferences. Is there any authenticated list of that?
I'm working on the authentication scheme of fog node and cloud. So I don't know how to find the cost of the scheme , so as to prove that my scheme takes less time or it is cost effective.
Authentication in IoT systems are vastly insecure. Mostly the problems lies on its open ended and probable untrustworthy nodes. Also, the need for a lighter authentication mechanism will always be welcomed. The fact that IPSec limitations can also be overcome and Implementing authentication using block chain technique may give it more freedom. Please suggest your insights and ideas. Please give your insights. We can work together for a project.
Hello Everyone,
For a classification problem, we need imposter data along with authenticated user's data. I created a system that identifies an imposter or authenticated user. For the training, I gave the data imposters and authenticated to train and test the system. Now, the problem is to run the system on a new device, I always need the data of imposter.
I started my research work, keeping the classification in my mind. Now, I am at the end of my research work, can anybody guide me on how to handle this kind of problem. As I have seen many researchers are doing the same thing as I did. I am looking forward your expert opinion.
In the context of vertical industry, security demands could vary significantly among services. For instance, the mobile Internet of Things (IoT) devices requires lightweight security while high-speed mobile services demand high efficient mobile security. The network-based hop-by-hop security approach may not be efficient enough to build differentiated end-to-end (E2E) security for different services. As IoT is gaining momentum, more people will be able to remotely operate or "talk" to networked devices, for instance, instructing facilities at a smart home to get up. Therefore, there is a need for more stringent authentication method to prevent unauthorized access to IoT devices.
Now, what are the permanent authentication methods the could be to prevent unauthorized access to IoT devices?
Multi-factor authentication (MFA) adds a layer of security that allows companies to protect against the leading cause of data breach — compromised credentials. Users provide extra information or factors when they access corporate applications, networks and servers. Is Multi-factor authentication can be hacked? Yes/No and How?
Your thoughts?
2FA Two Factor Authentication
or
MFA Multi factor Authentication be used with bio metric authication
How image steganography provides authentication? Where exactly steganography is used in military application?
MODBUS-RTU is a serial protocol very common in the industrial world, the protocol is not secure and doesn't have any build-in authentication mechanism, I'm looking for research projects that try to address this problem.
Sincerely,
Eli
Bagele Chilisa (2011) and Licoln and Guba (1985) have suggesting for Indiegnous research authentication. How helpful?
Applications like online-banking or online-shopping cater services to multiple users. Suppose each user can access these applications by login with their unique ID followed by providing their biometric-based signature (e.g., face, fingerprint, voice, swipe gesture, etc.).
- Which classification model, i.e., one-class or multi-class will be more justified for such systems.
- If one constructed a multi-class authentication model, then how to handle the situation to add a new user. Do a model required to be reconstructed every time?
- As the users data is already labeled so why not the one-class authentication model more suitable option? Simply, a labeled input query can be verified with the template stored for that label only.
What techniques could be used for authentication of social media viral video or mms.
A Share Link is created– a URL providing 50 days' free access to the article " Dynamic Digest Based Authentication for Client-Server systems using Biometric Verification ".
Anyone clicking on this link before August 03, 2019 will be taken directly to the final version of your article on ScienceDirect, which they are welcome to read or download. No sign up, registration or fees are required.
Share Link:
https://authors.elsevier.com/a/1ZDjy,3q5xW6iW
Sir i want extract all metadata from a digital audio file for authentication purpose.
Hi, Have a mystery cell line of mouse origin that I need help identifying. I used the IDEXX service for STR analysis but the results were inconclusive. Seems like the database is forthcoming but the project was initiated in 2012. Any experts out there that can help?
I want to know that what are the current methods for Authentication in a CCN system , Is there nay research paper or article on it ?
This is a question to the experts familiar with smartphone technology and banknote security features
I am working on ECG cryptography and authentication for Body Area Networks. I seek knowledge on how to get the algorithms implemented. I mean the language or libraries to use for implementations and respective results.
I have a system of identifitcation using retina. Now I want ot calculate FRR, FAR and then plot them by changing the value of threshold to obtain DET graph(Detection error trade off). Geniune user have threshold value of 8 and imposters have threshold value less than 8.
I am not using machine learning. So I donot have labels from which I can decide that particular user is authenticated or not? on the basis of final threshold hold I decide weather person is authenticated or not?
I am clear about the definitions of FRR and FAR. However I am confused about how to find them using matlab?
For my proposed authentication mechanism, how to simulate in NS2 and NS3. Can you please give a note on simulating authentication in simulators.
Hello,
I am looking for Blockchain-based user authentication schemes.
Any suggestions..
Thank you.
Let me tell you what I want to do in the detail:
PLEASE REFER FLOW chart for more understanding
Step 1: Split Original image into lets say 8 equal blocks and take color histogrm of each block. This will be the reference data REF (Attached original image = P_original.png). We can call it registration process of the true image. Please find attached file Slice.jpg and code used split.m. Here I want to neglect all the blocks with the black color (no information) before doing the histogram and in histogrm I want it to be flexible (so I can focus on the certain color intensity).
Step 2: Authentication process: Now I want to take the duplicate image. Do the same thing again. and compare the histogram result of each block with the REF data and give the result : Authentication sucessful if similar or unsuccessful if not similar. Please find P_transformedC.png file for duplicate image for comparision.




My research focuses in Human Computer Interaction. Theoretical security evaluation includes analyzing password space. While empirical security evaluation includes doing experiment on shoulder-surfing, observation, intersection, guessing attacks etc. Can I only include theoretical evaluation?
The common practice of sending a second factor to the user via an SMS message or email is both inelegant and inconvenient. Especially, if the user is in the middle of filling in the login form on the phone to which the SMS is sent.
This apart, users find any security measure, which delays their access to a service, an irksome imposition.
A considerable improvement would be if the submission of the second factor were to be totally transparent, and immediate.
From a security point of view, it would also be good if the second factor were unique to the user, and irreproducible.
Hello,
I am going to work on multimedia authentication through machine learning. please someone suggest me a technique for this work.
how to incorporate machine learning with iot and blockchain in providing authentication?
i need ideas regarding in which area i can concentrate in IOT with block chain...regarding authentication and access control...
Hi everyone
I am developping a real time chat using asp.net and signalR library.
After authentification, i am facing some problems to display a real time list of the connected clients.
Does any One can help me to find a code of how to display this list?
Can anyone help to connect the Anfatec lockin amplifier (eLockIn203) to PC with IP address using LockInRemote program? I filled the authentication menu with the IP displayed on the eLockIn SETUP display but the computer kept saying ´No Server Found at this IP Adresse!´.
Hello intellectuals !
Let's suppose we have a setup like Kerberos where messages are exchanged between the devices and a server. Is there any open source tool or simulator that can calculate the time each device or server takes to compute the message and the time the message takes to travel on the channel to reach its destination (other device)? The basic idea is to find out the total time a protocol takes to execute to achieve the set goals like authentication, authorization etc. Thank you.
Security scheme, especially a suitable authentication process, can improve QoS provision for data traffic transfer over optical switched network. The authentication process can limit the degradation of QoS support including to provide the traffic requirements such as the traffic loss.
Selection of Multi factor Authentication (MFA) for web based application
I'm interested in studying the behavior of intruder over popular OSN such as Facebook. Intruder or imposter can be defined as an attacker who illegally uses another authorised user account to perform different activities inside that user profile.
I was conducting a research on "Database Encryption and Authentication" and was looking at the latest content on the subject matter.Unfortunately all the research I have found is dated before 2015,so I would be really grateful if I could get a reference after 2015.
Thanks in advance.
How do I implement one class SVM for user authentication? I have unlabelled dataset for 100 users. In my understanding, I have to create 100 different one class svm models for all users to determine if the user is authentic or not , but I am not sure about it.
Im from Government Siddha medical College, Tirunelveli, Tamilnadu. I have done herbarium for my dissertation purposes.
1. Suggest me, where to authentication certificate ?
2. Where to submit my herbarium and sample raw drug ?
Cell lines after going through number of passage trends to change. Is there any fixed duration after which cell lines should be authenticated (by STR profiling etc)?How often one should authenticate their cell lines?
Best Regards
Hello Authors,
I want to know how deep learning is used in media authentication?
Barcoding is molecular authentication of the species based on its unique Marker DNA sequences particularly COI. OK, If it is so, how does it contributes to plan conservation of that species?
Hello!
This is an interesting idea !
I would like to know which spectroscopic techniques are you going to use, and for which food products.
Thank you in advance for your reply :-)
Best regards
Abdo
Cell lines after going through number of passage trends to change. Is there any fixed duration after which cell lines should be authenticated (by STR profiling etc)?How often one should authenticate their cell lines?
Best Regards