Science topic

Authentication - Science topic

Explore the latest publications in Authentication, and find Authentication experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Authentication (10,000)
Sorted by most recent
Chapter
Full-text available
This paper aims to investigate a real-time hierarchical communication network for traffic management systems. The suggested management program would provide effective, cost-efficient, and secure solutions to critical issues such as authentication, hierarchical processing, reduced latency, overtaking judgments, speed adjustments, and accident notifi...
Research Proposal
Full-text available
Forgery detection is an increasingly critical area of research, particularly in the age of digital transformation where the authenticity of documents, images, videos, and other forms of media is frequently challenged. This Topical Collection aims to explore the latest advancements, methodologies, and technologies in the field of forgery detection,...
Conference Paper
Full-text available
Given the widespread issues with passwords, Multi-Factor Authentication (MFA) is crucial for protecting online services. Despite vulnerabilities in widely used OTP and app-based MFAs, more secure methods, such as Physical Authentication Devices (PADs), have not garnered widespread adoption. This study aims to understand why the adoption of PADs has...
Chapter
Full-text available
Authenticated Key Exchange ( $${\textsf {AKE}}$$ AKE ) can be used in client-server applications for mutual authentication and key establishment. In scenarios where client authentication is neither feasible nor desirable, One-Sided AKE ( $${\textsf {OS-AKE}}$$ OS - AKE ) allows both parties to establish a key while only the server authenticates to...
Article
Full-text available
SIM swap fraud has emerged as a critical threat in the telecommunications sector, enabling attackers to bypass traditional security mechanisms and gain control of users' phone numbers. This paper examines SIM swap fraud as a growing challenge and explores the application of machine learning algorithms for its detection. Additionally, it presents mu...
Article
Full-text available
Este artigo visa argumentar sobre o problema das denominadas deepfakes em ambientes epistêmicos e como tal fenômeno é uma ameaça às estruturas de obtenção, armazenamento, divulgação de informação e aquisição de conhecimento. Para isso, faremos uma análise das principais semelhanças e distinções ao fenômeno das fake news e como ela é um tipo de desi...
Article
Full-text available
The rapid advancement of information technology has transformed many aspects of legal proceedings, particularly in the area of evidence. One of the most urgent adaptations is the use of electronic evidence in court trials, especially in response to the increasing influence of social media on legal processes and public perception. This article exami...
Article
Full-text available
This research introduces Fortified-Edge 2.0, a novel authentication framework that addresses critical security and privacy challenges in Physically Unclonable Function (PUF)-based systems for collaborative edge computing (CEC). Unlike conventional methods that transmit full binary Challenge–Response Pairs (CRPs) and risk exposing sensitive data, Fo...
Article
Full-text available
As more and more Internet of Thing (IoT) devices directly access to low earth orbit (LEO) satellite networks, the Zero-Trust Architecture brings dynamic security to the enlarging exposure surface. However, the constrained resources of satellites add difficulties to the dynamic management of the edge access network. In order to balance the scalabili...
Article
Full-text available
Federated learning (FL) is a collaborative process that involves sharing information in a distributed control. Certain healthcare applications meant for prognosis, diagnosis, etc. in a federated setting require the sharing of sensitive information, especially medical images. The hospital data warehouse (data centers) or patients themselves can be t...
Article
Full-text available
Fluorescent epoxy adhesive was prepared from covalent incorporation of coumarin and microcrystalline cellulose into epoxy matrix and used as anticounterfeiting adhesive in antiquities. Fluorescent coumarin was covalently incorporated in 2.5 wt% to give fluorescence properties to the adhesive. The covalent incorporation of fluorescent dye into the e...
Article
Full-text available
The integration of the Internet of Things (IoT) with fog computing has significantly enhanced the capabilities of IoT applications by extending their reach and reducing latency. Fog nodes, being transient and authorized service providers, necessitate reauthentication of IoT end devices when contact is lost, requiring the device to connect to a new...
Technical Report
Full-text available
This paper introduces IAST (Irreversible Alwin-Sahira Transform), a lightweight and efficient one-way function for data integrity, authentication, and key derivation. We develop IAST into a location-based encryption scheme called IAST-GeoFence, which ensures cipher-text can only be decrypted within predetermined geographical regions. Implementation...
Article
Full-text available
This study examines the balance between usability and security in electronic online services by comparing the effectiveness and user experience of different authentication methods, including password-only authentication, multi-factor authentication (MFA), and biometric authentication. A mixed-methods approach was used to collect both quantitative a...
Article
Full-text available
The OData API “Attachments” Service in SAP S/4HANA Cloud provides a standardized RESTful interface for managing file-based attachments and Document Info Records (DIRs) associated with business objects like Purchase Orders, Sales Orders, and Supplier Invoices. This API enables full CRUD operations on attachment metadata and content, linking files to...
Article
Full-text available
Prenuptial agreements serve as essential legal instruments that define financial arrangements and property rights between spouses before marriage. However, their enforceability and legal certainty depend heavily on compliance with legal formalities, particularly the role of notaries in ensuring their validity. This research examines the legal frame...
Preprint
Full-text available
In today's digital age, personal data is constantly at risk of compromise. Attribute-Based Encryption (ABE) has emerged as a promising approach to privacy-preserving data protection. This paper proposes an anonymous authentication mechanism based on ABE, which allows users to authenticate without revealing their identity. The mechanism adds a priva...
Preprint
Full-text available
Tele-operated robots rely on real-time user behavior mapping for remote tasks, but ensuring secure authentication remains a challenge. Traditional methods, such as passwords and static biometrics, are vulnerable to spoofing and replay attacks, particularly in high-stakes, continuous interactions. This paper presents a novel anti-spoofing and anti-r...
Article
Full-text available
Optimalisasi Al-Qur’an digital sebagai media pembelajaran bertujuan untuk meningkatkan literasi keislaman, khususnya bagi generasi milenial yang lebih akrab dengan teknologi. Penelitian ini menggunakan metode deskriptif kualitatif dengan studi literatur untuk menganalisis efektivitas Al-Qur’an digital dalam mendukung pemahaman ajaran Islam. Hasil p...
Article
Full-text available
User authentication is a basic security mechanism under Internet-of-Things (IoT) environments, which means to verify whether the logging user is legitimate or not. Due to known limitations of existing password-based authentication, graphical password is one promising solution to enhance the current user authentication process in IoT. However, it is...
Presentation
Full-text available
Cryptography is extremely important in today's digital world because it secures sensitive information, enabling confidential and trustworthy digital interactions. It ensures data confidentiality, integrity, and authentication, protecting against unauthorized access, modification, or misuse
Article
Full-text available
Overview HFVN is the voice-activated cybernetic front-end of the ERES ecosystem. It enables real-time, biometric, symbolic, and contextual control over ERES systems, including navigation, authentication, simulation, and governance via spoken commands. HFVN seamlessly channels user intention through a unified symbolic framework rooted in PlayNAC and...
Article
Full-text available
The dynamically changing cybersecurity landscape in the USA demands a much more robust Identity Access management approach. At the core of this evolution lies the trust mode of security relies on the never-trusted-always-verify principles, turning it into one of the leading ways to plan how access to crucial resources should be secured. This study...
Preprint
Full-text available
Biometric authentication systems pose privacy risks, as leaked templates such as iris or fingerprints can lead to security breaches. Fully Homomorphic Encryption (FHE) enables secure encrypted evaluation, but its deployment is hindered by large ciphertexts, high key overhead, and limited trust models. We propose the Bidirectional Transciphering Fra...
Preprint
Full-text available
Software-Defined Networking (SDN) introduces centralized control and programmability to network management but also exposes critical vulnerabilities, particularly in ensuring the integrity and authenticity of service paths. This paper presents .EnsureS, a lightweight and efficient security framework designed for real-time service path validation in...
Article
Full-text available
Weex is a fast-growing cryptocurrency exchange trusted by traders worldwide. By registering with the referral code "N6AG", new users can unlock up to $30,000 in welcome bonuses and enjoy an ultra-low 50% trading fee discount. Weex offers a wide selection of digital assets including Bitcoin, Ethereum, and top altcoins, suitable for both spot and fut...
Article
Full-text available
Weex is a trusted global cryptocurrency exchange known for its user-friendly platform and secure trading environment. By registering with the referral code "CKK0", you can unlock up to $30,000 in welcome bonuses and enjoy an ultra-low 50% trading fee discount. The platform offers a variety of trading products including spot, futures, and perpetual...
Presentation
Full-text available
This study explores the secret acquisition and strategic release of the AMAD Project archives by Mossad in 2018, assessing how these disclosures influenced global discourse on Iran's nuclear intentions. The research examines the intelligence operation's methodology, the authentication process of retrieved materials, and the subsequent impact on int...
Article
Full-text available
Las drogas vegetales son ampliamente utilizadas con fines medicinales, pero su calidad puede verse comprometida por adulteraciones y deficiencias en los procesos de control. En Uruguay, los análisis botánicos sobre estos productos siguen siendo escasos, a pesar de su creciente demanda. Este trabajo evaluó la calidad botánica de 42 muestras de droga...
Conference Paper
Full-text available
Nowadays, secured embedded devices with high resolution displays, in which user interaction for critical assets is a part of the trust chain (user authentication, validation, etc.), leave the processing of the Trusted User Interface to the general purpose processor. Indeed, such displays are usually interfaced with MIPI-DSI and require an amount of...
Article
Full-text available
In this article, we present an algorithm to determine the authenticity of a signature with high probability. This study addresses the increasing need for robust and accurate methods of verifying offline signatures, which are crucial in various legal and financial contexts. By combining geometric properties of curves and advanced image processing te...
Article
KuCoin es una de las plataformas de intercambio de criptomonedas más reconocidas a nivel mundial, destacando por su seguridad, amplia variedad de activos y facilidad de uso. Gracias a su programa de referidos, los nuevos usuarios pueden acceder a atractivos beneficios, incluyendo bonificaciones y descuentos en comisiones de trading. Al registrarte...
Article
Full-text available
The increasing adoption of hybrid and multi-cloud database environments introduces profound security challenges, particularly during database migration. Traditional perimeter-based security models are insufficient in mitigating threats in dynamic and distributed environments. This research investigates the development of end-to-end zero-trust secur...
Preprint
Full-text available
An important family of codes for data storage systems, cryptography, consumer electronics, and network coding for error control in digital communications are the so-called cyclic codes. This kind of linear codes are also important due to their efficient encoding and decoding algorithms. Because of this, cyclic codes have been studied for many years...
Article
Full-text available
The Industrial Internet of Things (IIoT) is increasingly being adopted by factories, making the security of communication ever more significant. In order to realize secure communication between users and smart devices in IIoT, researchers have proposed numerous schemes, but these schemes are difficult to meet the needs of IIoT for security, efficie...
Article
Full-text available
Physical unclonable functions (PUFs)—a hardware‐based security device using randomness—have evolved from basic integrated circuit designs to advanced systems using diverse materials and mechanisms. However, most PUFs are limited by single‐factor challenges and fixed key generation, making them vulnerable to brute‐force attacks. A reconfigurable and...
Article
Full-text available
Numerous computing devices can connect with extremely low latency on next-generation networks, particularly the sixth generation (6G). Inferentially, 6G capabilities offer enormous advantages for the Internet of Things and cloud, taking into account a variety of application fields. However, several issues with authentication and encryption procedur...
Preprint
Full-text available
The identification of the devices from which a message is received is part of security mechanisms to ensure authentication in wireless communications. Conventional authentication approaches are cryptography-based, which, however, are usually computationally expensive and not adequate in the Internet of Things (IoT), where devices tend to be low-cos...
Conference Paper
Full-text available
In this era of digital connectivity, securing user information and ensuring valid access to web resources are key considerations in web application development. Various technologies have been developed for this purpose, notably JSON Web Tokens (JWT), Security Assertion Markup Language (SAML), OAuth 2.0, and OpenID Connect. This paper aims to presen...
Article
Full-text available
Pneumonia is a pulmonary infection that causes thoracic discomfort, typically caused by bacteria, or viruses. The pneumonia in children and elderly is medical emergency and hence appropriate diagnosis and treatment is necessary. Clinical-level screening of pneumonia is frequently executed using the chest X-ray and its analysis will help in treatmen...
Conference Paper
Full-text available
Anti-hammering mechanisms frequently struggle to manage both Brute Force Attacks (BFAs) and Denial of Service (DoS) attacks effectively, highlighting the need for robust safeguards to counter credential guessing and account lockouts. A pluggable authentication module for e-mail as an additional authentication factor may offer a practical solution b...
Article
Full-text available
In cryptocurrency transactions, effective wallet key management by users is crucial for asset protection. Fuzzy Signature (FS) schemes enhance the binding between signers and their keys by using biometric information instead of traditional signing keys, offering secure and convenient key management. However, FS faces two significant privacy concern...
Article
Full-text available
The Unified Extensible Firmware Interface (UEFI) has become a foundational component in modern computing platforms, providing critical bootstrapping and runtime services. UEFI Capsule updates offer a mechanism for firmware updates independent of operating system-level controls, thereby enhancing maintainability and security. However, this capabilit...
Article
Full-text available
Unified Extensible Firmware Interface (UEFI) firmware updates play a critical role in maintaining the security posture of modern computing platforms. However, rollback and replay attacks present significant threats by allowing adversaries to revert firmware to vulnerable versions or reuse previously valid update packages. This paper presents a comp...
Article
Full-text available
As System-on-Chip (SoC) platforms become increasingly complex and interconnected, ensuring robust security is critical. Trust anchors-hardware or software roots of trust-play a pivotal role in establishing a secure foundation within SoC security engines. This paper explores the design principles and core policy frameworks essential for creating rel...
Preprint
Full-text available
The burgeoning adoption of electric vehicles (EVs) globally necessitates a robust and intelligent charging infrastructure. This article provides a comprehensive review of current and emerging EV charging technologies, focusing on the fundamental distinctions between Alternating Current (AC) and Direct Current (DC) charging, the diverse landscape of...
Article
Full-text available
This paper proposes a Secure and Privacy-preserving Authentication and Pseudonym Change Scheme (SAPACS) for Vehicular Ad-hoc Networks to address challenges in ensuring security and privacy in Internet of Vehicles (IoV). By adopting a certificateless authentication method based on Merkle mountain range and Modified Merkle Patricia Tree, SAPACS elimi...
Preprint
Full-text available
In this paper, we aim to examine the importance of security issues in the Internet of Things (IoT). Traditional methods for authentication and authorization in IoT are considered insufficient due to the use of static digital systems and complex computations. Separate security schemes for different layers have been criticized for contributing to sec...
Article
Full-text available
For some decades now, the Cameroonian and Nigerian governments have been involved in a complex information war against some armed separatist movements operating in their respective countries. This longstanding war has partly been characterised by the use of gloomy Internet videos that represent the separatist fighters as war crimes perpetrators, hu...
Article
Full-text available
The most common form of securing digital assets is still via passwords, but weak password practices leave the door wide open to cyberattacks. In this study, we describe PassCrack, a responsible credential cracking suite that raises user awareness by demonstrating real vulnerabilities. This is an educational exploration as well as a practical securi...
Conference Paper
Full-text available
In today’s digital era, the demand for secure, efficient, and flexible file storage and sharing solutions has become paramount. How- ever, existing platforms often struggle to meet the challenges related to flexibility, user management, and security. In response to these chal- lenges, this research presents Celerity Drive, an innovative file stor- ag...
Article
Full-text available
The Internet of Things (IoT) is a smart infrastructure where devices share captured data with the respective server or edge modules. However, secure and reliable communication is among the challenging tasks in these networks, as shared channels are used to transmit packets. In this paper, a decision tree is integrated with other metrics to form a s...
Article
Full-text available
Vivimos en un mundo digital cada vez más dependiente de plataformas en línea donde garantizar la seguridad se ha convertido en una de las grandes dificultades del día a día. Este trabajo muestra los resultados obtenidos de una auditoría de ciberseguridad sobre una plataforma web bajo este marco OWASP como marco de referencia técnico. En el análisis...
Article
Full-text available
This paper proposes an encoding method based on the characteristics of multi-particle system. Utilizing this encoding method, a robust semi-quantum secure direct communication protocol that can resist collective dephasing noise and collective rotation noise is proposed. In the proposed protocol, the classical sender can safely transmit the secret m...
Article
Full-text available
Masked Even–Mansour (MEM) is a tweakable construction proposed at EUROCRYPT 2016 for usage in authenticated encryption schemes. This paper investigates the quantum security of MEM, highlighting the threat of quantum computing in applications, i.e., multi-user networks. In the single-key scenario, an attack on MEM using only known-plaintext classica...
Article
Full-text available
A Physical Unclonable Function (PUF) is a security primitive that exploits inherent variations in manufacturing protocols to generate unique, random‐like identifiers. These identifiers are used for authentication and encryption purposes in hardware security applications in the semiconductor industry. Inspired by the success of silicon PUFs, herein...
Preprint
Full-text available
Electric Vehicles (EVs) are rapidly gaining adoption as a sustainable alternative to fuel-powered vehicles, making secure charging infrastructure essential. Despite traditional authentication protocols, recent results showed that attackers may steal energy through tailored relay attacks. One countermeasure is leveraging the EV's fingerprint on the...
Research
Full-text available
Connected autonomous vehicles (CAVs) depend heavily on high-definition (HD) maps for safe navigation. As these maps are frequently transmitted between cloud servers, infrastructure, and vehicles, ensuring their secure delivery is critical. This paper explores key security challenges associated with HD map transmission in CAVs, including data integr...
Article
Full-text available
Many people think of using passwords for their data security, but few of them think about how to protect their passwords. The passwords we use also need to be protected. While creating a password, it’s better to create a strong password, but because many people can forget it, they choose to use weak or reused passwords, which make their accounts mo...
Article
Full-text available
In recent years, telecommunication network fraud has become increasingly severe, posing significant threats to financial security and social stability. This study aims to investigate the correlation between fraud occurrence and key indicators, including bank card usage and PIN authentication, to identify risk factors and protective measures. Statis...
Article
Full-text available
This project introduces a Flutter-based Transportation Management System (TMS) designed to enhance the efficiency and coordination of student transportation services. The system comprises three distinct modules—Student, Driver, and Admin—each tailored to meet the specific requirements of its users. The student module facilitates user registration a...
Article
Full-text available
Unlike traditional Internet of Things (IoT), Vehicular Ad Hoc Networks (VANETs) operate in open environments and transmit information through wireless communication technologies, making VANETs more susceptible to various attacks. To protect the security of drivers’ private information and improve the efficiency of the transportation system, various...
Preprint
Full-text available
Traditional CAPTCHA mechanisms—such as dis- torted text and image selection challenges—are increasingly ineffective against modern machine learning-driven bots. This vulnerability is especially critical in decentralized applications (dApps) and Web3 platforms, where automated exploits like front-running and flash loan attacks result in substantial...
Preprint
Full-text available
Large language model (LLM) watermarks enable authentication of text provenance, curb misuse of machine-generated text, and promote trust in AI systems. Current watermarks operate by changing the next-token predictions output by an LLM. The updated (i.e., watermarked) predictions depend on random side information produced, for example, by hashing pr...
Preprint
Full-text available
Private Set Intersection (PSI) enables secure computation of set intersections while preserving participant privacy, standard PSI existing protocols remain vulnerable to data integrity attacks allowing malicious participants to extract additional intersection information or mislead other parties. In this paper, we propose the definition of data int...
Article
Full-text available
The Internet of Things (IoMT) has revolutionized the global landscape by enabling the hierarchy of interconnectivity between medical devices, sensors, and healthcare applications. Significant limitations in terms of scalability, privacy, and security are associated with this connection. This study presents a scalable, lightweight hybrid authenticat...
Article
Full-text available
Authenticated encryption (AE) is a fundamental tool in today’s secure communication. Numerous designs have been proposed, including well-known standards such as GCM. While their performance for long inputs is excellent, that for short inputs is often problematic due to high overhead in computation, showing a gap between the real need for IoT-like p...
Preprint
Full-text available
Electricity consumption in Oriental Mindoro remains inefficient, often leading to high costs. This study presents eVolta, a cloud-based, real-time electricity monitoring system for local adaptation. Unlike existing solutions, eVolta features direct integration with ORMECO to provide users timely maintenance and service interruption updates. It feat...
Article
Full-text available
Template matching authentication technology is a critical means of protecting sensitive information, with widespread applications in security monitoring and verification. Nevertheless, the intrusiveness of this technology risks the leakage of the verified party’s sensitive information. To address this issue, we propose a method combining nuclear re...
Article
Full-text available
By bringing services closer to the network edge, mobile edge computing (MEC) improves traditional cloud computing and increases end-user accessibility. This represents a significant improvement in Internet of Things (IoT) applications. Ensuring strong security is becoming more and more important as more mobile users access MEC services across sever...
Preprint
Full-text available
Reliable millimeter-wave (mmWave) communication in non-line-of-sight (NLoS) conditions remains a major challenge for both military and civilian operations, especially in urban or infrastructure-limited environments. This paper presents a vision-aided autonomous reflector system designed to enhance mmWave link performance by dynamically steering sig...
Article
Full-text available
The XEX/XE scheme has been widely used to realize authenticated encryptions (AEs), message authentication codes (MACs), and storage encryptions, such as OCB, PMAC, and XTS. Although these schemes have been extensively deployed in the real world, limited studies have evaluated side-channel attacks (SCAs) on them. In this study, we propose an efficie...
Conference Paper
Full-text available
In this research, we present SecPassGAN, a novel AI-driven framework designed for generating robust and unpredictable passwords. Our approach merges the generative capabilities of LSTM networks with the refinement and scrutiny of GAN-based discrimination to craft passwords that are both secure and varied. The framework also features a built-in mech...
Article
Full-text available
The professional level and inspection ability of drug inspectors directly determine the quality of inspection and affect drug safety. Drug inspectors need to guarantee that they can effectively perform their duties and better provide reliable supervision by receiving strict qualification authentication, systematic professional training, and standar...
Article
Full-text available
ATMs are utilized by everyone to withdraw and transfer money in today's environment. The implementation of fingerprint mechanisms in the ATM system served as the basis for this study. We chose this location in order to make transactions easier and safer for all clients. Each person's fingerprints have unique minute characteristics. You don't have t...
Article
Full-text available
The rapid digital transformation of urban ecosystems into Smart Cities has brought unprecedented connectivity and operational efficiency to critical infrastructures such as energy grids, water supply systems, transportation networks, and emergency services. However, this interconnectivity also expands the attack surface, exposing vital systems to i...
Preprint
Full-text available
Quantum key distribution (QKD) provides an information-theoretic way of securely exchanging secret keys, and typically relies on pre-shared keys or public keys for message authentication. To lift the requirement of pre-shared or public keys, Buhrman et. al. [SIAM J. Comput. 43, 150 (2014)] proposed utilizing the location of a party as a credential....
Article
Full-text available
The east-west interface in Software Defined Networking (SDN) plays a crucial role in enabling inter-controller communication, which is vital for scalability, load balancing, and fault tolerance in distributed SDN environments. Despite its importance, this interface remains vulnerable to serious security threats, such as Man-in-the-Middle (MitM), un...
Article
Full-text available
As the treat landscape in Operational Technology (OT) cyber security is getting more complicated, there is a general demand in most industries to increase the Target Security Level (SL-T) of Industry Automation and Control Systems (IACS). More sophisticated treat actors with higher motivation are on stage, and treat actors are getting increasingly...
Chapter
Full-text available
EEG-based brain fingerprint identification usually requires participators to complete a particular task under external stimuli, such as recognition based on visual-evoked potentials (VEP) and resting potential (RP). These paradigms often fail to generalize due to their dependency on task-specific brain responses, which restricts their applicability...
Article
Full-text available
Purpose Digital mobile radio communication networks are used for coordinating operations in many important sectors, including critical infrastructures and large industries. Despite this, there is a dearth of knowledge about how their information security is managed. The most commonly used standard for such networks is TETRA. Given the critical role...
Article
Full-text available
As the use of the internet and digital devices has grown rapidly, keeping digital communications secure has become very important. Authenticated Key Agreement (AKA) protocols play a vital role in securing digital communications. These protocols enable the communicating parties to mutually authenticate and securely establish a shared secret key. The...
Article
Full-text available
Security in networks has become a more sophisticated problem since that such networks are open and lack infrastructure. In this paper, we describe the primary safety issues for network and data link layer protection. These levels' security needs are identified and requirements for design are established to create networks that are safe from malicio...
Article
Full-text available
SAP Identity Authentication Service (IAS) integration with SAP Business Technology Platform (BTP) provides enterprise-grade identity management for distributed cloud environments. Built on SAP NetWeaver AS ABAP infrastructure, the solution delivers secure authentication, authorization, and identity governance through standardized protocols and secu...
Article
Full-text available
Establishing secure keys over untrusted networks is one of the most fundamental cryptographic tasks. While two-party key establishment protocols are available for many scenarios, even offering resistance to potential adversaries equipped with quantum computing resources, the multi-party scenario is not as well understood. In particular, there is a...
Article
Full-text available
With the growing prevalence of security attacks, there is an increasing demand for robust cryptographic methods that ensure confidentiality and authenticity. This study presents JIGS, a hybrid secure messaging architecture designed to balance security and efficiency. JIGS integrates Elliptic Curve Diffie-Hellman (ECDH) key exchanges with nonce-base...
Article
Full-text available
The rapid digital transformation of urban ecosystems into Smart Cities has brought unprecedented connectivity and operational efficiency to critical infrastructures such as energy grids, water supply systems, transportation networks, and emergency services. However, this interconnectivity also expands the attack surface, exposing vital systems to i...
Article
Full-text available
Stanzas in saga prosimetrum are often differentiated as authenticating stanzas, quoted by the narrative voice to evidence the prose account, and situational stanzas, spoken by characters as part of the plot. Yet in implying that only some types of stanza quotation authenticate events, the dichotomy conflates two questions: the narrative function of...
Preprint
Full-text available
Biometric face authentication is crucial in computer vision, but ensuring fairness and generalization across demographic groups remains a big challenge. Therefore, we investigated whether Vision Transformer (ViT) and ResNet, leveraging pre-trained global features, can fairly authenticate different demographic faces while relying minimally on local...
Conference Paper
Full-text available
This paper explores the integration of blockchain based Self-Sovereign Identity (SSI) technologies into Industrial Automation and Control Systems (IACS) to strengthen cyber security and operational resilience. After an overview of the threats facing industrial systems, we present a logical framework for a layered defense incorporating SSI. The logi...
Conference Paper
Full-text available
The advent of quantum computing poses a significant existential threat to the security of current public-key cryptographic systems, which form the bedrock of digital security in financial institutions worldwide. This paper addresses the urgent need for financial organizations to transition to Post-Quantum Cryptography (PQC) to safeguard sensitive f...
Article
Full-text available
Several remote user authentication schemes have been proposed using external memory and smart cards. Smart card-based schemes have user mobility and deployment problems, and those based on external memory have a tamper resistance problem. Although Cherbal and Benchetioui’s scheme solved remote authentication problems using Elliptical Curve Cryptogr...
Article
Full-text available
We show the Rakeei–Moazami key agreement scheme [Wireless Networks, 2022, 28, 2983–2999] is flawed. It neglects the basic structure of bilinear pairing over elliptic curve, and presents some false equalities. Some point multiplications over the underlying elliptic curve are falsely specified, which result in the failure of later integrity authentic...
Article
Full-text available
Data sharing is a fundamental component that facilitates collaboration and interoperability among entities in cloud computing environments. It enables cross‐domain access, concurrent task execution, and parallel multi‐task processing. However, challenges such as privacy breaches, vulnerabilities of sensitive data, and inflexible access control mech...
Article
Full-text available
Addressing concerns related to network security involves protecting a network from various threats, including internal and external risks, such as identity theft, collusion, malicious activities, and other attacks. This study aims to address these challenges by introducing the authentication of the identity of nodes that are connected to a network,...
Article
Full-text available
Optical physical unclonable functions (PUFs) are state-of-the-art in advanced security applications. Fabricated with inherent randomness, they generate fingerprint-like responses, serving as trust anchors for material assets. However, the existing PUFs, typically reliant on microscopic spatial features, face increasing threats from rapidly advancin...
Article
Full-text available
The CHEZ PL architecture introduces a revolutionary approach to enterprise identity management by integrating Customer Identity and Access Management (CIAM) and Privileged Access Management (PAM) within a cohesive zero-trust framework. Traditional security perimeters have proven increasingly inadequate against sophisticated identity-based threats,...
Article
Full-text available
Food authentication has gained significant interest in recent years due to the rising incidence of fraud in the food industry. Honey is frequently subjected to fraudulent practises and is currently one of the most adulterated food items. As a result, authentication methods are essential to ensure the integrity and authenticity of honey products. He...