A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cascade Forward Back-propagation Neural Network Based Group Authentication Using (n, n) Secret Sharing Scheme
2016
Procedia Computer Science
This paper proposes the Shamir Secret Sharing Scheme along with Cascade forward back propagation neural network. ...
The neural network is already trained for RGB image database and images are stored in particular group having a group category number which is to be predicted as output of neural network. ...
Proposed work The proposed methodology is based on Cascade forward back propagation neural network. ...
doi:10.1016/j.procs.2016.02.032
fatcat:mg2kvrw74fhxheregsstwef3qa
A Novel Soft Computing Authentication Scheme for Textual and Graphical Passwords
2013
International Journal of Computer Applications
User with his password clicks some pass characters which are different for different sessions and explained in proposed scheme. To provide better results Neural Network is used for the authentication. ...
To overcome the problem of shoulder surfing we introduced a novel scheme called S3PA (Scalable Shoulder Surfing Resistant Textual-Graphical Password Authentication Scheme) . ...
ACKNOWLEDGMENTS The authors would like to thank everyone, whoever remained a great source of help and inspirations in this humble presentation. ...
doi:10.5120/12397-8776
fatcat:npxqhom6vvfednemlkxt42baoi
Software engineering based secured E-payment system
2021
International Journal of Power Electronics and Drive Systems (IJPEDS)
It uses the neural network back-propagation method for ensuring the security of generated keys that have sufficient random levels. ...
This system uses different proposed algorithms for applying authentication to the devices of users as mobile application. They are used to control the key management in the system. ...
It is generated automatically depending on the user information and encrypted using back-propagation neural network algorithm explained earlier. ...
doi:10.11591/ijece.v11i5.pp4413-4422
fatcat:zwu4fjsbdffc7c7vwhkbxmgs3q
An Initial Framework of Fuzzy Neural Network Approach for Online Learner Verification Process
2019
International Journal of Advanced Trends in Computer Science and Engineering
A fuzzy neural network is used to train and validate the online learner's identity. The proposed framework can be implementing in any online learning environment for verifying online learner identity. ...
The student authentication as online learner is widely seen as a major concern for online assessment. ...
table which implements feed forward neural network analysis with back propagation. ...
doi:10.30534/ijatcse/2019/3781.32019
fatcat:rss3vm5iyvdlxaa5p655bei63u
Performance Evaluation of Password Authentication using Associative Neural Memory Models
2012
International Journal of Advanced Information Technology
They are many ways of providing security to user resources. Password authentication is a very important system security procedure to secure user resources. ...
In order to solve the problems with traditional password authentication several methods have been introduced to provide password authentication using Associative Memories like Back Propagation Neural Network ...
ACKNOWLEDGEMENTS The authors would like to thank everyone, whoever remained a great source of help and inspirations in this humble presentation. ...
doi:10.5121/ijait.2012.2107
fatcat:mjetdiyuk5fahfapj7jotlpmz4
How to improve performance of Neural Network in the hardened password mechanism
2011
GSTF International Journal on Computing
Current systems are based on the three vertex of the authentication triangle which are, possession of the token, knowledge of a secret and possessing the required biometric. ...
This correspondence investigates possibility and ways for optimising performance of hardened password mechanism using the widely accepted Neural Network classifier. ...
Another work worth mentioning is the one where the authors applied keystroke dynamics to strengthen a code of six digits using Neural Network with a multi-layer perceptron for each user with back-propagation ...
doi:10.5176/2010-2283_1.2.42
fatcat:ipd45p4sdjdpzgeaji57iwifoe
Simulation of Biometric Data in VANETs using Layer Recurrent Model
2019
International journal of recent technology and engineering
Biometric identification methods like fingerprints are used throughout the world for authentication such methods are now being researched worldwide for VANETs too. ...
In this paper we proposed to design and simulate the storage of such biometric data in the form of network parameters of a Neural Network. ...
LAYER RECURRENT NEURAL NETWORK Layer recurrent is the special type of back propagation model which basically depends on time so it is also called back propagation through time [3] . ...
doi:10.35940/ijrte.d8578.118419
fatcat:cgo2r6nupbehtok66wmxklyko4
A Grid-Based Neural Network Framework For Multimodal Biometrics
2010
Zenodo
reliable authentication system. ...
The framework combines the concept of Grid services for reliable brokering and privacy policy management of shared biometric resources along with a momentum back propagation ANN (MBPANN) model of machine ...
Such a Grid-based neural network framework that uses momentum back propagation for multimodal biometric fusion and authentication is capable of taking advantage of Grid services for seamless integration ...
doi:10.5281/zenodo.1073095
fatcat:h6o4guwexra7xbqiyq2x2lhufy
Prevention of DDoS and Brute Force Attacks on Web Log Files using Combination of Genetic Algorithm and Feed forward Back Propagation Neural Network
2015
International Journal of Computer Applications
Whenever the users make use of any web application, all the activities of the users get automatically get appended into the web log files. ...
In this paper, a new technique has been proposed to prevent the log file data from the two most common attacks: Brute force attack and DDoS attack. ...
Fig 2 : 2 Fig 2: A simple Neural Network
Fig 3 : 3 Fig 3: Methodology for DDoS and Brute Force attack prevention
Initialize back propagation feed forward neural network If (Neural network.e.file > ...
doi:10.5120/21399-4406
fatcat:fbmjfbjwefauxjycx2qphauzbu
Simulating Manual Signature using Elman Back Propagation Model to Create Pseudo Digital Signature
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Back Propagation Algorithm to create pseudo digital signature. ...
Manual Signatures are used in authentication worldwide. But they are still not used in VANETs and in ad hoc networks for security. ...
After that, network trained by using Elman Back Propagation Model of Artificial Neural Network so that verification process did not take much time. ...
doi:10.35940/ijitee.b6452.129219
fatcat:wh6dmtqrh5ecbob24tdknchdru
Authenticating On-Body IoT Devices: An Adversarial Learning Approach
[article]
2020
arXiv
pre-print
radio propagation patterns and facilitate on-body device authentication. ...
We build a prototype of our system using Universal Software Radio Peripheral (USRP) devices and conduct extensive experiments with various static and dynamic body motions in typical indoor and outdoor ...
Our system adopts an adversarial neural network for wireless device authentication. ...
arXiv:2005.11170v1
fatcat:twtvl3nq2jamfewr2jcj3l5zpq
Inventions on LDAP Security - A TRIZ Based Analysis
2006
Social Science Research Network
US Patent 6438549 discloses a method of securing sparse Access Control List (ACL) data in a relational database used as a backing store for LDAP. ...
Solution provided by US Patent 6708170: US Patent 6708170 finds a method of maintaining authentication information in a distributed network of servers using LDAP directories. ...
doi:10.2139/ssrn.925928
fatcat:lqbgwpjtffavvdoftcniqfurw4
Online Signature Forgery Prevention
2013
International Journal of Computer Applications
A signature verification system using Error Back Propagation Training Algorithm is designed using Neural Network Toolbox of MATLAB to verify the signatures. ...
Both the steps are carried out by Neural Networks trained using Error Back-Propagation Training Algorithm. ...
This paper presents an Online Signature Forgery Prevention system created using Neural Networks which are trained using Error Back-Propagation Training Algorithm. ...
doi:10.5120/13172-0849
fatcat:fjrq4ugwtfev7lzmq62behunvu
Offline Signature Recognition Using Image Processing Techniques and Back Propagation Neuron Network System
2021
SN Computer Science
Processed image feature is extracted using back propagation neuron network system with defined number of neurons and hidden layers. ...
In this paper, offline signature recognition using back propagation neuron network system and image processing techniques has been proposed. ...
Conclusion Offline signature recognition using image processing techniques and back propagation neuron network system has been proposed. ...
doi:10.1007/s42979-021-00591-y
fatcat:vgkejaghefbyhmi7z4ifz5tkki
Joint pollution detection and attacker identification in peer-to-peer live streaming
2010
2010 IEEE International Conference on Acoustics, Speech and Signal Processing
To resist pollution attacks and stimulate user cooperation in P2P live streaming, this paper proposes a joint pollution detection and attacker identification system, where polluted chunks are detected ...
In the emerging peer-to-peer (P2P) live streaming, users cooperate with each other to support efficient delivery of video over networks. ...
Each chunk piggies back the group digital signature and its corresponding authentication information before being transmitted over networks. ...
doi:10.1109/icassp.2010.5496015
dblp:conf/icassp/HuZ10
fatcat:fuso7gvqsbemtfgb22yhpjmhzi
« Previous
Showing results 1 — 15 out of 22,347 results