Science topic

Authentication - Science topic

Explore the latest publications in Authentication, and find Authentication experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Authentication (10,000)
Sorted by most recent
Book
Full-text available
Advanced Techniques of Honey Analysis: Characterization, Authentication, and Adulteration presents an overview of honey, including its classification, composition, safety, present status, quality issues, and prospects before delving into honey adulteration and presenting various methodologies for honey analysis. Broken into fourteen chapters, this...
Preprint
Full-text available
User reviews in app stores are considered very rich maintenance information texts that developers need to know. Many apps' reviews contain requirements details such as bugs or problems, evaluation of user experience with some features, suggestions for improvements, and ideas for new features. The previous literature has illustrated different techni...
Article
Full-text available
A autenticação de usuários em sistemas de informação é um dos pontos mais delicados dos mesmos, pois uma vez validados, dependendo dos privilégios, eventualmente podem ter acesso a recursos que talvez não deveriam. A utilização de múltiplos fatores de autenticação, tem sido uma das soluções para este tipo de problema, sendo um recurso cada vez mais...
Presentation
Full-text available
MitID is the new electronic identification (eID) solution in Denmark. It provides access to many online services, including online banking, insurance, taxes, and health information. In this work, we analyze the security of the new solution from the user experience perspective concerning Denial of Service (DoS), Social Engineering (SocEng), and othe...
Article
Full-text available
Sistema de información para el manejo de datos moleculares en café: II. desarrollo de bases de datos. Rev. Acad. Colomb. Cienc. 32(124): 325-330, 2008. ISSN 0370-3908. Cenicafé ha realizado el desarrollo de una plataforma de Bioinformática para el almacenamien-to, análisis y fácil accesibilidad de los datos del proyecto de estudio del genoma del ca...
Article
Full-text available
With the increasing use of the internet, a global network, Information security is a substantial issue in today's business. Information security has become one of the most important aspects of modern electronic society. Security of information, networks, and systems is vital to make information systems work satisfactorily and enable people to safel...
Article
Full-text available
Phone number recycling (PNR) refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner. It has posed a threat to the reliability of the existing authentication solution for e-commerce platforms. Specifically, a new owner of a reassigned number can access the application account that the number is a...
Article
Full-text available
Este proyecto se centra en explorar y analizar las vulnerabilidades en redes inal´ambricas Wi-Fi mediante avanzadas t´ecnicas de pruebas de penetraci´on, utilizando Kali Linux en un entorno virtualizado. La investigaci´on comienza con la implementaci´on de herramientas de penetraci´on especializadas en Kali Linux, orientadas a examinar las debilida...
Article
Full-text available
Digital media devices such as smartphones, cameras, and notebooks are becoming increasingly popular. Through digital platforms such as Facebook, WhatsApp, Twitter, and others, people share digital images, videos, and audio in large quantities. Especially in a crime scene investigation, digital evidence plays a crucial role in a courtroom. Manipulat...
Article
Full-text available
The advent of the metaverse has revolutionized virtual interactions and navigation, introducing intricate access control challenges. This paper addresses the need for effective access control models in the cloud-based metaverse. It explores its distinct characteristics, including its dynamic nature, diverse user base, and shared spaces, highlightin...
Article
Full-text available
This study focuses on the field of voice forgery detection, which is increasing in importance owing to the introduction of advanced voice editing technologies and the proliferation of smartphones. This study introduces a unique dataset that was built specifically to identify forgeries created using the “Mix Paste” technique. This editing technique...
Article
Full-text available
In recent days, extensive digital communication process has been performed. Due to this phenomenon, a proper maintenance of authentication, communication without any overhead such as signal attenuation code rate fluctuations during digital communication process can be minimized and optimized by adopting parallel encoder and decoder operations. To o...
Article
Full-text available
Managers have been applying the influence of herd behaviour to stimulate purchase intention but have not achieved precise results because they do not clearly understand the mechanism of this relationship. This article aims to determine the effect of herd behaviour on the relationship between information adoption and purchase intention and the moder...
Article
Full-text available
p>Recognition systems have received a lot of attention because of their various uses in people's daily lives, for example in robotic intelligence, smart cameras, security surveillance or even criminal identification. Determining the similarity of faces by different face variations is based on robust algorithms. The validation of our experiment is d...
Article
Full-text available
Advancements in computing and communication technology have increased the number of devices connected to the Internet, leading to the emergence of the Internet of Things (IoT) technology. However, currently available network security measures are mainly designed for devices with higher computing power and cannot be directly applied to IoT devices....
Article
Full-text available
Widely accepted explicit authentication protocols are vulnerable to a series of attacks, for example, shoulder surfing and smudge attacks, leaving users with the constant burden of periodic password changes. As such, we propose a novel framework for continuous authentication on smartphones. This approach is guided by pattern unlocking, which is wid...
Article
Full-text available
Civilian services of Global Navigation Satellite System are threatened by spoofing attacks since it is hard to determine the authenticity of a navigation signal with a detailed structure open to the public. Signal authentication effectively protects the security of the signal by attaching unforgeable information to one or several elements of the si...
Article
Full-text available
New media hold the rapid dominance over the health information. People acquire the health information in different social media which includes YouTube, popular video sharing site. A systematic protocol was used to locate the 200 videos on YouTube in 20 different health topics. Blind coding was followed with two independent coders in the topics of a...
Article
Full-text available
Online Social Media (OSM) enables users to create a powerful virtual bond that facilitates global forwarding/sharing of messages, decision-making, analysis, or voting. Along with the ease of internet services, one may easily forward/share web content over OSM such as WhatsApp, Facebook, Twitter, or Instagram, to name a few. The practice of forwardi...
Article
Full-text available
The project has been developed to operate a pump for theft identification system using GSM devices, such as mobile device. This project is specifically designed to operate remote located submersible pumpsand motors for benefit of farmers, agriculture people and industries where wireless pump and motorcontrol required. Our project is designed with a...
Conference Paper
Full-text available
Widely used asymmetric primitives such as RSA or Ellip-tic Curve Diffie Hellman (ECDH), which enable authentication and key exchange, could be broken by Quantum Computers (QCs) in the coming years. Quantum-safe alternatives are urgently needed. However, a thorough investigation of these schemes is crucial to achieve sufficient levels of security, p...
Article
Full-text available
Smart door lock systems have become an interesting topic of research in recent years due to the need for higher security when accessing rooms or buildings. This research aims to design and implement a smart door lock system that uses an Internet of Things (IoT)-based personal identification number (PIN) that can be controlled through the Telegram m...
Article
Full-text available
The prosecutor's office is a government institution that has the authority to delegate, prosecute perpetrators in court and carry out the decisions and decisions of criminal judges. Evidence is the object of a criminal act. Administrative processing of evidence at the East Aceh District Prosecutor's Office uses office computer applications so that...
Article
Full-text available
With the popularity of metaverse, the number of questions about the legal framework of utility tokens has also grown. In this area, the application of blockchain allows us to generalize the experience of tokenization of services. A countertrend is the evolution of NFTs from digital image right authentication to a utility solution that allows consum...
Chapter
Full-text available
Currently, WSN is widely used, and it is important to obtain the location information of each node in real time for WSN where localization is the main function or where nodes are subject to unpredictable changes in location by different factors. In this paper, the traditional TDOA algorithm and the FDEM algorithm based on energy consumption are ana...
Preprint
Full-text available
Internet of Things (IoT) applications are composed of massive quantities of resource-limited devices that collect sensitive data with long-term operational and security requirements. With the threat of emerging quantum computers, Post-Quantum Cryptography (PQC) is a critical requirement for IoTs. In particular, digital signatures offer scalable aut...
Article
Full-text available
Usable security involves designing security measures that accommodate users' needs and behaviors. Balancing usability and security poses challenges: the more secure the systems, the less usable they will be. On the contrary, more usable systems will be less secure. Numerous studies have addressed this balance. These studies, spanning psychology and...
Article
Full-text available
This paper considers three moments in the treatment of data about race and identity in India. Many elements go into the development of data imaginaries as these change over time. A complete history is beyond the scope of this paper, but I develop three key episodes to explore critical but changing features of interrelations between race, identity a...
Article
Full-text available
This study was done out of the curiosity to restore confidence in customers through reinventing products that meet and satisfy their immediate needs, and also the need to develop employees technically and otherwise so that they can function effectively in their assigned jobs. The main purpose of this study was to examine the effect of economic sust...
Article
Full-text available
We study the information-theoretic model of stegosystem with an active adversary, where unlike a passive adversary he can not only read but also write. The legitimate sender as well as the adversary can embed or not a message in the sending data. The receiver’s first task is to decide whether the communication is a covertext, data with no hidden me...
Article
Full-text available
Aadhaar, the largest biometric identification system in the world, has been lauded for its promise to bring efficiencies to government service delivery, and the stimulus to private sector innovation. However, its claims have been contested, and criticized for excesses in terms of potential threats to privacy on account of the vulnerabilities of bio...
Preprint
Full-text available
Advancement in technology, which has solved greater traffic problems utilizing Vehicular Adhoc NETwork (VANET), has made vehicles communicate with each other by means of Road Side Units (RSU). But, in urban areas, reducing traffic is quite difficult owing to the random movement of vehicles. Thus, this paper proposes a secured routing framework util...
Conference Paper
Full-text available
The rapid advancement of AI-based image generation techniques has led to the increasing need for methods to distinguish between real and AI-generated images. In response, this study applies two popular deep learning algorithms namely Residual Networks (ResNets) and Variational Autoencoders (VAEs) to recognize AI-generated synthetic images. The algo...
Article
Full-text available
A pesquisa em Educação Matemática enfrenta desafios na era da digitalização. O tema central é a autenticidade e ética no uso de documentos digitalizados. Como garantir que sejam genuínos e utilizados responsavelmente? O objetivo é estabelecer diretrizes éticas e métodos de avaliação sólidos. Utilizamos uma metodologia abrangente com ferramentas de...
Conference Paper
Full-text available
The increasing adoption of distributed systems has led to a growing need to understand and analyze user behavior in these environments. However, obtaining service-specific event logs for such systems, suitable for process mining and data modeling tasks, remains a significant challenge due to the complexities associated with distributed architecture...
Experiment Findings
Full-text available
PixelKey represents a novel approach to authentication, leveraging the capabilities of Convolutional Neural Networks (CNNs) and Artificial Intelligence (AI). This whitepaper delves into the core principles and technological underpinnings of our system, demonstrating its potential to revolutionize the field of authentication. We elaborate on CNN arc...
Article
Full-text available
Ḥadīth, as the second primary source of Islam, is shrouded in many issues. Its application among the Sufis has attracted an array of attention. This is because they (Sufis) appear not to be in absolute compliance with the conventional methods of ḥadīth narration, authentication and application as put in place by Muḥaddithūn and widely used by schol...
Presentation
Full-text available
"Securing the Core: A Comprehensive Guide to Database Security" is a detailed resource covering all aspects of database security. It addresses threats like SQL injection, encryption techniques, authentication, and backup strategies. The guide also delves into legal compliance, such as GDPR, and the use of firewalls and network security. Practical a...
Article
Full-text available
This research paper explores the intricate tapestry of security considerations in integrating augmented reality (AR) within corporate landscapes. The journey begins with an in-depth literature review, providing insights into authentication, data privacy, network security, and device vulnerabilities specific to AR systems. A conceptual framework, sy...
Article
Full-text available
With the rapid expansion of IoT devices and their applications, there is an increasing demand for efficient and secure authentication mechanisms to protect against unauthorized access. Traditional authentication mechanisms face limitations regarding computational speed, communication costs, and vulnerability to cyber-attacks. Zero-knowledge proof (...
Article
Full-text available
This study was aimed at the sensitive immunodetection of porcine myoglobin (MG) as a species-specific biomarker in meat products. The enhanced lateral flow immunoassay (LFIA) was created in the sandwich format using monoclonal antibodies (Mab) with specificity to porcine MG and labeled by Prussian blue nanoparticles (PBNPs) as peroxidase-mimicking...
Article
Full-text available
With the increasing connectivity between multiple smart devices in the Internet of Vehicles, privacy and security have become stringent threats due to unauthorized access. To overcome this issue, designing continuous authentication systems has become an important research topic because of the advantages of continuous monitoring of users after the i...
Research
Full-text available
An essay about two-factor authentication
Article
Full-text available
This meta-analysis study focused on cyber dominance in modern warfare, particularly, exploring cyber-attacks and mitigation strategies. The study ascertained that the escalating growth of internet connectivity and the rising reliance on networked digital technologies have opened new avenues for cyber-attack in the contemporary era. Various actors,...
Article
Full-text available
The certificateless online/offline aggregate signcryption scheme combines the characteristics of the certificateless aggregate signcryption scheme and the online/offline encryption scheme, which can increase efficiency while simultaneously reducing consumption. Some schemes can meet the requirements of confidentiality and real-time transmission of...
Conference Paper
Full-text available
Biometric identification still remains one of the most reliable and consistent methodologies for identification as established over the years from various studies among other authentication systems. Fingerprint biometrics is the most commonly and universally accepted biometric due to its uniqueness among all other biometrics. Minutiae algorithm rem...
Article
Full-text available
Crowdsensing systems use a group of people to collect and share sensor data for various tasks. One example is the crowdsensing-based healthcare system, which provides smart services to patients and elderly people using wearable sensors. However, such a system faces a significant security challenge: how to authenticate the sensor device (patient) an...
Article
Full-text available
Ferroresonance, as an undesirable disturbance, leads to significant overvoltage and distorted waveforms. This phenomenon can be highly damaging to voltage transformers and other parallel-connected equipment and can entail catastrophic consequences. This paper aims to design and study a solid-state ferroresonance-suppressing circuit (SSFSC) to prote...
Conference Paper
Full-text available
In this work, the result of the initial attempt to propose an Association of Southeast Asian Nations (ASEAN) digital security and interoperability standard to support the mobility among ASEAN countries is presented. Literature reviews on existing coronavirus disease 2019 (COVID-19) related digital technologies of six ASEAN member countries are cond...
Article
Full-text available
This paper gives brief idea about "Graphical Password Authentication System". As we know according to human psychology , human mind have great tendency to remember pictures than that of text. By this motivation the graphical password authentication system is created as a replacement for Text-Based Passwords. The main purpose of this paper is to stu...
Article
Full-text available
With the increasing concern for public privacy protection, Secret Image Sharing (SIS) has garnered significant attention among researchers. The goal of SIS is to split a secret image into multiple shadows, rendering it unrecoverable unless a specific threshold of shares is obtained. However, these shadows typically appear as meaningless noise-like...
Preprint
Full-text available
This paper conducts an extensive review of biometric user authentication literature, addressing three primary research questions: (1) commonly used biometric traits and their suitability for specific applications, (2) performance factors such as security, convenience, and robustness, and potential countermeasures against cyberattacks, and (3) facto...
Article
Full-text available
Sebagai upaya untuk melindungi konsumen dari pelabelan halal palsu pada produk makanan, kosmetik maupun obat-obatan maka dibutuhkan suatu metode yang mampu menjamin kehalalan dari suatu produk. Daging babi menjadi salah satu jenis yang sering digunakan untuk mencampur dengan daging sapi dikarenakan kedua daging tersebut memiliki kemiripan secara fi...
Article
Full-text available
Sterols are known for a plethora of 250 different structures. Between 5 and 10% of them usually occur with varying abundance ratios (~ four orders of magnitude) and total amounts (0.4–1000 mg/100 g oil) in samples. Yet, quantitative data are mostly restricted to the few major sterols which are available as reference standards. Here, we developed a...
Article
Full-text available
This work reviews the dataset-driven advancements that have occurred in the area of lip motion analysis, particularly visual lip-reading and visual lip motion authentication, in the deep learning era. We provide an analysis of datasets and their usage, creation, and associated challenges. Future research can utilize this work as a guide for selecti...
Article
Full-text available
The rapid development of the Internet of Things creates information security vulnerabilities due to the unavoidable process of exchanging data. One device that is vulnerable to data security is RFID. One way to increase its security is to embed a cryptosystem in it. The NTRU algorithm can be a solution because of its low computational power. Howeve...
Conference Paper
Full-text available
In cases of digital enrolment via mobile and online services, identity documents (IDs) verification is critical to efficiently detect forgery and therefore build user trust in the digital world. In this paper, we propose a copy-move public dataset, called FMIDV (forged mobile ID video dataset) containing forged IDs with respect to guilloche pattern...
Article
Full-text available
This paper introduces a comprehensive methodology for strengthening the security of cloud computing by incorporating a combination of hybrid encryption algorithms, chaotic key generation, and intelligent decision-making using fuzzy logic systems. Our study integrates state-of-the-art encryption techniques that involve the utilization of the robust...
Article
Full-text available
Combining deep learning and hyperspectral imaging (HSI) has proven to be an effective approach in the quality control of medicinal and edible plants. Nonetheless, hyperspectral data contains redundant information and highly correlated characteristic bands, which can adversely impact sample identification. To address this issue, we proposed an enhan...
Article
Full-text available
Authentication is a security function that ensures the system's proper security by identifying and verifying users. Despite the advantages of quantum computers, it is still difficult to enforce authentication on behalf of multiple quantum channel users without the involvement of a third party because present protocols only consider two parties invo...
Article
Full-text available
During the COVID-19 pandemic, finding effective methods to prevent the spread of infectious diseases has become critical. One important measure for reducing the transmission of airborne viruses is wearing face masks but enforcing mask-wearing regulations can be difficult in many settings. Real-time and accurate monitoring of mask usage is needed to...
Preprint
Full-text available
Blind detection of the forged regions in digital images is an effective authentication means to counter the malicious use of local image editing techniques. Existing encoder-decoder forensic networks overlook the fact that detecting complex and subtle tampered regions typically requires more feedback information. In this paper, we propose a Progres...
Article
Full-text available
Cryptographyconverts original information into secret codes, allowing the proposed receivers to recover the original content. Military operations, secret government services, and diplomatic services have used cryptography for years to provide security functions like data confidentiality, integrity, and origin authentication.
Article
Full-text available
This paper studies the concept of “hybrid regimes”, not so much in defining and authenticating their functionality but, above all, to exhibit them as so-called “partial” constitutional concepts. Articulating the tensions, divergences, and antagonisms characteristic of these regimes, as well as highlighting the blurring boundaries between democratic...
Article
Full-text available
Entity authentication is crucial for ensuring secure quantum communication as it helps confirm the identity of participants before transmitting any confidential information. We propose a practical entity authentication protocol for quantum key distribution (QKD) network systems that utilizes authentication qubits. In this protocol, authentication q...
Article
Full-text available
This paper proposes a blockchain-based identity authentication (BA) scheme for IoT devices to solve the authentication security problem of IoT devices. The BA scheme uses hashing and digital signature algorithms to achieve integrity and nonrepudiation of authentication messages. Blockchain technology is used to achieve decentralised and distributed...
Article
Full-text available
Wireless body area networks (WBANs) can be used to realize the real-time monitoring and transmission of health data concerning the human body based on wireless communication technology. With the transmission of these sensitive health data, security and privacy protection issues have become increasingly prominent. Fine-grained authentication allows...
Article
Full-text available
Objective: The present research study was conducted to investigate in vitro anti-diabetic potentials of ethanol extract of leaves of Muntingia calabura for α-glucosidase and α-amylase inhibitory activities. Materials & Methods: The leaves of Muntingia calabura were collected and authenticated. dried and powdered. The powdered drug was defatted usin...
Article
Full-text available
There is a plethora of image authentication techniques in the literature. Almost all of these methods use either a form of watermarking or data hiding techniques to embed data directly in the original image or its decomposed sub-bands. Recently, new multiple watermarking methods have emerged to tackle more robust forgery challenges where a single w...
Article
Full-text available
With the rise of short video and the development of self-media, video has become a type of frequently used data, thus the protection of video data is particularly important. Digital watermarking is a very effective digital authentication and copyright protection technology that hides a piece of data called watermark into digital multimedia content....
Article
Full-text available
O presente artigo tem como objetivo verificar a jurisprudência no direito brasileiro para dar o amparo necessário para o uso do blockchain para comprovação de propriedade de segredos industriais. A pesquisa, classificada como aplicada, qualitativa e descritiva, utilizou como metodologia a pesquisa bibliográfica e documental para levantar informaçõe...
Article
Full-text available
Handwritten signatures are one of the most extensively utilized biometrics used for authentication, and forgeries of this behavioral biometric are quite widespread. Biometric databases are also difficult to access for training purposes due to privacy issues. The efficiency of automated authentication systems has been severely harmed as a result of...
Article
Full-text available
Implicit authentication is an efficient tool focusing on achieving identity authentication during the transmitting ciphertext or signed message without extra authentication information. As quantum cryptography is emerging as a means to provide true randomness between quantum smart devices, it is imperative and crucial to solve the problem that comp...