Filters








100,954 Hits in 5.2 sec

A Risk Analysis Approach for Biometric Authentication Technology

Arslan Broemme
2006 International Journal of Network Security  
A discussion on the enabled possibilities for risk analysis shows the significant advantage of this integrated approach for holistic security risk analysis of biometric authentication technology in comparison  ...  of biometric authentication technology, also proposed here.  ...  and evaluation of an iris recognition algorithm's reliability and performance.  ... 
dblp:journals/ijnsec/Broemme06 fatcat:w3hhznrarrczzfcwc5e64uv3fy

Preventing SQL Injection Attacks

Asha. N, M. Varun Kumar, Vaidhyanathan.G Vaidhyanathan.G
2012 International Journal of Computer Applications  
It allows an attacker to gain control over the database of an application, thereby able to read and alter confidential data.  ...  Two levels of user authentication has been proposed in this method, SQL based authentication and an XML based authentication, and has been found to be very effective in preventing such attacks.  ...  So in the case of an attacker input/injection, even if the SQL authentication evaluates to true, the XML authentication will fail and hence the request will not be processed by the database, thus preventing  ... 
doi:10.5120/8264-1809 fatcat:flm5wuloavcrzdjgnnyd3y7jfi

Improving authentication performance of distributed SIP proxies

Italo Dacosta, Vijay Balasubramaniyan, Mustaque Ahamad, Patrick Traynor
2009 Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications - IPTComm '09  
In particular, systems in which multiple proxies share a remote authentication database can experience reduced performance due to latency.  ...  The performance of SIP proxies is critical for the robust operation of many applications.  ...  In this paper we evaluate the use of multiple processes and batch requests to improve the performance of a SIP proxy configured with digest authentication and a remote database.  ... 
doi:10.1145/1595637.1595639 dblp:conf/iptcomm/DacostaBAT09 fatcat:66hz7ooqnvbf5kt6ma2iy7mfde

DroidBarrier

Hussain M.J. Almohri, Danfeng (Daphne) Yao, Dennis Kafura
2014 Proceedings of the 4th ACM conference on Data and application security and privacy - CODASPY '14  
A performance evaluation of DroidBarrier unveils its low performance penalties.  ...  In this paper, we propose the use of a technique called process authentication for Android applications to overcome the shortcomings of current Android security practices.  ...  Performance Evaluation We evaluate the performance of our implementation prototype described in Section 4.  ... 
doi:10.1145/2557547.2557571 dblp:conf/codaspy/AlmohriYK14 fatcat:l6ebztk5rrbrpayzb2dixjcjku

Improving Authentication Performance of Distributed SIP Proxies

Italo Dacosta, Vijay Balasubramaniyan, Mustaque Ahamad, Patrick Traynor
2011 IEEE Transactions on Parallel and Distributed Systems  
In particular, systems in which multiple proxies share a remote authentication database can experience reduced performance due to latency.  ...  The performance of SIP proxies is critical for the robust operation of many applications.  ...  In this paper we evaluate the use of multiple processes and batch requests to improve the performance of a SIP proxy configured with digest authentication and a remote database.  ... 
doi:10.1109/tpds.2011.62 fatcat:qugvgkvcnjemlmb73auo3z4bo4

Adoption of Biometric Fingerprint Identification as an Accessible, Secured form of ATM Transaction Authentication

Michael Mireku, Hanan Yaro, Eugene Louis
2015 International Journal of Advanced Computer Science and Applications  
In this paper, the authors address the ATM transaction authentication problem of banking transactions using fingerprint identification as one form of biometric authentication.  ...  Moreover, the use of BioHASH templates ensures an irreversible cryptographic hash function, facilitates a faster authentication, and enables an efficient framework of detecting potential duplicates of  ...  In Section VI, the authors address the implementation, testing, and evaluation of the methodology framework; as an effective approach in providing security in ATM systems.  ... 
doi:10.14569/ijacsa.2015.061035 fatcat:2xbah3jpmnglrig33k6i55zw5y

A Proposed Biometric Authentication Model to Improve Cloud Systems Security

Hosam El- El-Sofany
2022 Computer systems science and engineering  
The paper presents the performance evaluation of the proposed model in terms of three main characteristics including accuracy, sensitivity, and specificity.  ...  Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password.  ...  Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/csse.2022.024302 fatcat:a25fybkofvbztgzlzi5n72n2zi

An embedded biometric sensor for ubiquitous authentication

V. Conti, S. Vitabile, G. Vitello, F. Sorbello
2013 AEIT Annual Conference 2013  
Finally, recognition rates of the proposed embedded biometric sensor have been evaluated considering three different databases: the FVC2002 reference database, the CSAI/Biometrika proprietary database,  ...  Conventional authentication systems, based on username and password, are in crisis since they are not able to guarantee a suitable security level for several applications.  ...  Firstly, the prototyped fingerprint recognizer has been tested using the FVC database, necessary to obtain an evaluation on a standard database of the proposed approach.  ... 
doi:10.1109/aeit.2013.6666815 fatcat:nvfs7oxzabfozp3he3kanzxpiq

A Fuzzy Vault Scheme for Ordered Biometrics

Lifang Wu, Peng Xiao, Songlong Yuan, Siyuan Jiang, Chang Wen Chen
2011 Journal of Communications  
Experimental results show that our scheme is able to achieve an improved performance with several desired properties of an online authentication system.  ...  Based on the proposed scheme, we design an online authentication application framework implemented using face images.  ...  Figure 1 . 1 The frame work of online authentication application Figure 2 . 2 The example face images in ORL database Figure 3 . 3 The example face images in FRAV2D database Figure 4 . 4 Performance  ... 
doi:10.4304/jcm.6.9.682-690 fatcat:j7s77kalyjghtj4tllzz46x6cy

A Frictionless and Secure User Authentication in Web-Based Premium Applications

Rashidah F. Olanrewaju, Burhan Ul Islam Khan, Malik Arman Morshidi, Farhat Anwar, Miss Laiha B. Mat Kiah
2021 IEEE Access  
The authors express their personal appreciation for the effort of Gousia Nissar, Md Moktarul Alam and Abdul Mobeen Khan in proofreading and editing the paper.  ...  the contents of the paper.  ...  The user or consumer database in web applications can often be directly accessed.  ... 
doi:10.1109/access.2021.3110310 fatcat:tbhgsr5f6vemris4x6m4jfzs5q

Supporting active database learning and training through interactive multimedia

Claus Pahl, Ronan Barrett, Claire Kenny
2004 Proceedings of the 9th annual SIGCSE conference on Innovation and technology in computer science education - ITiCSE '04  
We show that tool-mediated independent learning and training in an authentic setting is an alternative to traditional classroom-based approaches.  ...  Combining knowledge learning and skills training in an integrated environment is a central aspect of our system.  ...  In order to enable learning-by-doing in an active learning approach, the learner should be able to interact with the system in terms of activities relevant for a development project -an authentic setting  ... 
doi:10.1145/1007996.1008007 dblp:conf/iticse/PahlBK04 fatcat:me2j6anlynb63jjaar7sb6dwq4

Supporting active database learning and training through interactive multimedia

Claus Pahl, Ronan Barrett, Claire Kenny
2004 ACM SIGCSE Bulletin  
We show that tool-mediated independent learning and training in an authentic setting is an alternative to traditional classroom-based approaches.  ...  Combining knowledge learning and skills training in an integrated environment is a central aspect of our system.  ...  In order to enable learning-by-doing in an active learning approach, the learner should be able to interact with the system in terms of activities relevant for a development project -an authentic setting  ... 
doi:10.1145/1026487.1008007 fatcat:xuytwrv2hbewjdgaq6ya4z2zui

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

Michael Dalton, Christos Kozyrakis, Nickolai Zeldovich
2009 USENIX Security Symposium  
Access control attacks occur when an access control check in the web application is incorrect or missing, allowing users unauthorized access to privileged resources such as databases and files.  ...  Nemesis automatically determines when an application safely and correctly authenticates users, by using Dynamic Information Flow Tracking (DIFT) techniques to track the flow of user credentials through  ...  Authentication is performed using a table from a MySQL database. DeluxeBB has the most intricate ACL of any application in our experiments.  ... 
dblp:conf/uss/DaltonKZ09 fatcat:meh7krtaefdgfhvd4rhbssxurm

IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO FINGER-VEIN IMAGES

Remya Krishnan.
2016 International Journal of Advanced Research  
The work uses the publically available database to evaluate the performance of the system which provides better FPR and FNR rates. Copy Right, IJAR, 2016,.  ...  The work proposed by Javier et.al in [8] is an image quality approach where a parameterization of 22 features is performed. The work was applied to iris biometric samples.  ... 
doi:10.21474/ijar01/1418 fatcat:chanqlr57nhctntqn4ywfo42ii

Keystroke Dynamics for User Authentication and Identification by using Typing Rhythm

Rohit A., Amar L.
2016 International Journal of Computer Applications  
The result provides emphasis with pleasure security that growing in demand in web-based application.  ...  In this era computer security is an important issue now a days because these are used everywhere to store & process the sensitive data.  ...  We have mentioned 2 authentication approaches: Static and continuous. Which approach is better and the use of approach depends upon type of application.  ... 
doi:10.5120/ijca2016910432 fatcat:75ylojxjifgffgxq4ffj4eg74u
« Previous Showing results 1 — 15 out of 100,954 results