A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
Context-sensitive authorization in interaction patterns
2009
Proceedings of the 6th International Conference on Mobile Technology, Application & Systems - Mobility '09
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. ...
On the other hand, access control generally trust users once they have authenticated, despite the fact that they may reach unauthorized situations. ...
Observers are trusted entities from the publisher's point of view thanks to dynamic insertion of authentication components with aspects of assemblies. ...
doi:10.1145/1710035.1710055
dblp:conf/mobility/HourdinTLRR09
fatcat:pgcy3s3xrvcwtd6zsbyivm62hq
DSK-Based Authentication Technique for Secure Smart Grid Wireless Communication
[chapter]
2016
Advances in Computing Applications
In this paper the concept of dynamic secret is applied to design dynamic secret based authentication and encryption scheme for smart grid wireless communication. ...
Any missing or misjudging in retransmission sequence would prevent the adversary from achieving the keys. ...
control networked devices based on these signals and the customer's preferences ...
doi:10.1007/978-981-10-2630-0_10
fatcat:zxhk3fzco5efli6k2kn65lhll4
Design of Speaker Verification using Dynamic Time Warping (DTW) on Graphical Programming for Authentication Process
2017
Journal of Information Technology and Computer Science
We implement Dynamic Time Warping algorithm to compare human voice with reference voice as the authentication process. ...
However, this type of authentication has been identified to have many weaknesses. ...
We have design of speaker verification using dynamic time warping (DTW) on graphical programming for authentication process. ...
doi:10.25126/jitecs.20172124
fatcat:wulfhalynfcl5ffcz6jf5agjnm
Context-aware Authorization in Highly Dynamic Environments
[article]
2011
arXiv
pre-print
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user needs. ...
On the other hand, standard access control trusts users once they have authenticated, despite the fact that they may reach unauthorized contexts. ...
Access Control in Interaction Patterns
studied it; the Information from column summarizes how
contextual information is obtained and if it is authenticated The granularity of operations access control ...
arXiv:1102.5194v1
fatcat:qjoopgnx7vgqpfxsr6bwdlt7cu
Highly Secured Dynamic Color QR Pattern Generation for Real Time Application
[chapter]
2021
Advances in Parallel Computing
This work advances the state-of-art secured WBAN system and QR pattern enabled authentication for privacy measures. ...
Access control model output
R. Sanjjey et al. / Highly Secured Dynamic Color QR Pattern Generation ...
Access Control Model Authenticity in WBAN denotes the medical information transfer from access point to the storage space and rule sets to define each valid group. ...
doi:10.3233/apc210290
fatcat:eqfuc6463zeufofk6ell6uygpy
Evolution of the Brain Computing Interface (BCI) and Proposed Electroencephalography (EEG) Signals Based Authentication Model
2018
MATEC Web of Conferences
When everything is interconnected through IoT and considering that we control all interconnected things by means of our brain using BCI (Brain Computer Interface), the meaning of security breach becomes ...
Considering the sensitivity of data in the era of IoT, a new form of authentication is required, which should incorporate BCI rather than usual authentication techniques. ...
Rumyantseva from Tomsk State University for English language editing. ...
doi:10.1051/matecconf/201815501006
fatcat:c3hao2zpyjb7hoyg4lkrb4ibza
Design of High-Security USB Flash Drives Based on Chaos Authentication
2018
Electronics
Recently, due to the remarkable progress of digital signal processing (DSP) technology, the researchers often implement the controllers by the microcontroller with DSP technology for better reliability ...
The Bluetooth module is used to communicate between the master and the slave to achieve chaos synchronization such that the same random and dynamical chaos signal can be simultaneously obtained at both ...
Conflict of Interest: The authors declare no conflicts of interest. ...
doi:10.3390/electronics7060082
fatcat:ro6p6hk5rvdq3jc3wcboxaj3bi
Set-based replay attack detection in closed-loop systems using a plug & play watermarking approach
2019
2019 4th Conference on Control and Fault Tolerant Systems (SysTol)
Similar to a virtual actuator scheme, the proposed methodology masks the presence of the authentication signal to the system controller, that do not need to be retuned as it remains immunized. ...
Furthermore, a set-based analysis concerning the effect that the performance loss imposed by a watermarking signal has in the detectability of a replay attack is performed for the stationary, assuming ...
It also shows (in green), the system outputs as seen from the controller point of view which are immunized to the injection of the authentication signal. 2) Replay attack: It is assumed that an attacker ...
doi:10.1109/systol.2019.8864790
dblp:conf/systol/TrapielloP19
fatcat:ipnbvnklcvcyfdsqdxu5ibj4tu
Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks
2016
2016 11th International Conference on Availability, Reliability and Security (ARES)
The authors acknowledge support from the Cyber CNI Chair of Institut Mines-Télécom. ...
It has been acknowledged by the Center of excellence in Cybersecurity. ...
The Proposed Multi-watermark Signal The goal of the new detection scheme is to increase the difficulty in retrieving the authentication watermark ∆u t from the control signal u t , so that the probability ...
doi:10.1109/ares.2016.2
dblp:conf/IEEEares/Rubio-HernanCG16
fatcat:3o35lhpcvjgwpksycsu4avxnha
Cyber-Physical Systems Attestation
2014
2014 IEEE International Conference on Distributed Computing in Sensor Systems
During CPS-attestation, the verifier introduces false control signals to the system and observes the system dynamics to verify that the sensors and controllers are operating correctly. ...
be controlled properly by the PLC control signal. ...
doi:10.1109/dcoss.2014.61
dblp:conf/dcoss/ValenteBC14
fatcat:uvgd2sverzh75p3pgibykejygu
IoT Security Techniques Based on Machine Learning
[article]
2018
arXiv
pre-print
We focus on the machine learning based IoT authentication, access control, secure offloading and malware detection schemes to protect data privacy. ...
of service attacks, jamming and eavesdropping. ...
and dynamic networks. ...
arXiv:1801.06275v1
fatcat:y6fkpgin2vgjxexkst6nsd7ynq
A Secure, Scalable and Elastic Autonomic Computing Systems Paradigm: Supporting Dynamic Adaptation of Self-* Services from an Autonomic Cloud
2018
Symmetry
Autonomic computing embeds self-management features in software systems using external feedback control loops, i.e., autonomic managers. ...
An autonomic computing design should accommodate autonomic capability growth by allowing the dynamic configuration of self-* services, but this causes security and integrity issues. ...
The design of control systems that integrate and configure self-* services from the cloud offer the dynamic incorporation of self-management capabilities. ...
doi:10.3390/sym10050141
fatcat:gxkngo3fizfudj3phkvqmzjac4
Injecting Reliable Radio Frequency Fingerprints Using Metasurface for The Internet of Things
[article]
2020
arXiv
pre-print
Existing authentication schemes-based on digital signatures have overhead costs associated with them in terms of computation time, battery power, bandwidth, memory, and related hardware costs. ...
The proposed MeRFFI system can be easily integrated into the existing authentication schemes. ...
The authentication sends back the acknowledgment along with the hash of the feature extracted from the pilot signal (H(f p)). ...
arXiv:2006.06895v3
fatcat:assk5szutnapzctjkx7wnxal4a
New Thermo-Optical Plants for Laboratory Experiments
2014
IFAC Proceedings Volumes
Then it continues with a short description of linear and nonlinear identification and control experiments that may be carried out with the recently innovated model directly in a classroom from the Matlab ...
This paper explains motivation and gives a brief development history of a laboratory model of thermo-optical plant. ...
From the control point of view it is based on dynamical classes (DC) of control given by the number of pulses of a nearly time optimal control input. ...
doi:10.3182/20140824-6-za-1003.02760
fatcat:vhat2quvlrbdrg4ba6nsmdgnci
A Synergy of the Wireless Sensor Network and the Data Center System
2013
2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems
It is shown that wireless sensor networks (sensornets) can provide fine-grained measurements in data centers, and achieve better control of the data center platform for energy efficiency. ...
We argue that the combined computational and networking capability of a sensor network enables it to interact with the clusters in a much more sophisticated way and enhance essential functions in a data ...
Upon receiving CONTROL_COMMAND, the anchor motes retrieve the ID of the control mote from the message, and may conduct additional authentication for the control mote (refer to Section II-C). ...
doi:10.1109/mass.2013.49
dblp:conf/mass/HongYMG13
fatcat:big7uoxk7revrj3idysonbzrti
« Previous
Showing results 1 — 15 out of 59,999 results