Filters








35,310 Hits in 4.4 sec

Authentication Schemes for Open Distributed Network: A Classification

Deepak Kumar, Vinod Kumar
2013 International Journal of Computer Applications  
This paper describes the authentication procedure and a classification that clarifies similarities and differences among authentication protocol described in the literature.  ...  An authentication protocol is a sequence of message exchanges between entities that either distributes secrets to some of those principals or allows the use of some secret to be recognized .Distributed  ...  This paper presents a classification of authentication protocols in distributed networks.  ... 
doi:10.5120/13181-0855 fatcat:37lqrh4pkrddbimlz3rzdon7bq

A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2013 Journal of Computer Security  
Today, SFE is a subject of immense amount of research in a variety of directions and is not easy to navigate.  ...  We hope our guide paints a high-level picture of the field, including most common approaches and their trade-offs and gives precise and numerous pointers to formal treatment of its specific aspects.  ...  Acknowledgments The authors would like to thank Juan Garay and the anonymous reviewers of the Journal of Computer Security for their helpful comments.  ... 
doi:10.3233/jcs-130464 fatcat:h3e2udfufrcetpf2pbzz6z6mru

Classification Methods of Multiway Arrays as a Basic Tool for Food PDO Authentication [chapter]

Elisa Salvatore, Marta Bevilacqua, Rasmus Bro, Federico Marini, Marina Cocchi
2013 Comprehensive Analytical Chemistry  
s0015 1.2 Multiway Characterization in Food Authenticity Context p0040 Recently, there has been a progressive change in the approach to the study of foodstuff.  ...  the issues connected with the practical applications of these methods, highlighting their feasibility.  ...  In this chapter, the state-of-the-art approaches for the classification of multiway data is discussed theoretically and compared with the case studies coming from the food authenticity context, such as  ... 
doi:10.1016/b978-0-444-59562-1.00014-1 fatcat:eakdayzwhngvpbd3nn6ej3bsdq

A study secure multi authentication based data classification model in cloud based system

Sakshi Kaushal, Bala Buksh
2020 International Journal of Advances in Applied Sciences  
Data classification is a machine learning technique used to predict the class of the unclassified data.  ...  The concepts come true because of fast internet bandwidth and advanced cooperation technology. Resources on the cloud can be accessed through internet without self built infrastructure.  ...  The concerns are also provided against a variety of attacks practical on unusual layers of Cloud System access.  ... 
doi:10.11591/ijaas.v9.i3.pp240-254 fatcat:aw3biarw45hcxaguxnyxm4dfyy

Classification of Authentic and Tampered Video Using Motion Residual and Parasitic Layers

Mubbashar Saddique, Khurshid Asghar, Usama Ijaz Bajwa, Muhammad Hussain, Hatim A. Aboalsamh, Zulfiqar Habib
2020 IEEE Access  
However, due to sophisticated nature of the content alteration tools, alterations remain inconspicuous to the naked eye and it is a challenging task to differentiate between authentic and tampered videos  ...  Based on this observation, in this study, a new method is introduced for discriminating authentic and tampered video clips.  ...  The second approach has been effectively employed for many recognition and classification tasks [41] .  ... 
doi:10.1109/access.2020.2980951 fatcat:5eaxr5yfyrhulcomwj57hc5n5m

"Verify-on-Demand" - A Practical and Scalable Approach for Broadcast Authentication in Vehicle-to-Vehicle Communication

Hariharan Krishnan, Andre Weimerskirch
2011 SAE International Journal of Passenger Cars - Mechanical Systems  
It is shown that Verify-on-Demand (VoD) is a practical and scalable approach for broadcast authentication in V2V safety communication while conforming to the IEEE 1609.2 standard.  ...  Therefore it is reasonable to define an approach where messages are first processed and then authenticated using verification on-demand.  ...  VoD is a novel approach that provides practical and scalable broadcast authentication for vehicle safety communication.  ... 
doi:10.4271/2011-01-0584 fatcat:67ujrixigvesrld2cnyap5yiaa

Security Protocol Deployment Risk [chapter]

Simon N. Foley, Giampaolo Bella, Stefano Bistarelli
2011 Lecture Notes in Computer Science  
We believe that a complete security verification of a system is not currently achievable in practice and seek some degree of useful feedback from an analysis that a particular protocol deployment is reasonable  ...  Instead of concentrating on detailed semantics and formal verification of the protocol and implementation, we are concerned more with with the ability to trace, at a practical level of abstraction, how  ...  phase that is typical of practical protocols.  ... 
doi:10.1007/978-3-642-22137-8_3 fatcat:mwv7zw4t5vhm3bk2cf4sqpwbfi

Securing IoT Data Using Steganography: A Practical Implementation Approach

Fatiha Djebbar
2021 Electronics  
Due to the constrained environment of IoT devices, practical security implementation presents a great challenge.  ...  The proposed algorithm is evaluated using well-established performance evaluation techniques and has been demonstrated to be a practical candidate for the mass deployment of IoT devices.  ...  To promote secure data transfer in a smart IoT environment, a security scheme is advocated to employ a combined approach of lightweight cryptography and the variable least significant bit substitution  ... 
doi:10.3390/electronics10212707 fatcat:nuasyz4fcneihijahuvfc76wbe

A Habermasian Approach to the Examination of Language Teachers' Cognitive Interests

Maria Villalobos-Buehner
2021 Theory and Practice of Second Language Acquisition  
Using two reflective essays and a piece of authentic assessment as instruments to gather data, as well as Jürgen Habermas's theory on cognitive interests as a framework to explore the espoused beliefs  ...  In the end, most of the participants held practical interests, and three out of the nine pre-service teachers held elementary emancipatory beliefs.  ...  (Ele) Jan's position about the use of authentic material in the classroom is an example of someone operating at a practical level of cognitive interest.  ... 
doi:10.31261/tapsla.8229 fatcat:bvrc2igqvjb7fltcm5zq33rbfi

Blind Authentication: A Secure Crypto-Biometric Verification Protocol

Maneesh Upmanyu, Anoop M Namboodiri, Kannan Srinathan, C V Jawahar
2010 IEEE Transactions on Information Forensics and Security  
Such a protocol has significant advantages over existing biometric cryptosystems, which use a biometric to secure a secret key, which in turn is used for authentication.  ...  In this paper, we propose a provably secure and blind biometric authentication protocol, which addresses the concerns of user's privacy, template protection, and trust issues.  ...  Their approach, termed ZeroBio, models the verification problem as classification of a biometric feature vector using a 3-layer neural network.  ... 
doi:10.1109/tifs.2010.2043188 fatcat:ftim6dmf6zhv3nob6elxzliuua

Digital Evidence and Investigatory Protocols

Tommy Umberg, Cherrie Warden
2014 Digital Evidence and Electronic Signature Law Review  
This paper discusses cyber investigation protocols relevant to three types of digital evidence: data that is stored on a physical device; data that is not stored on a device that an investigator is able  ...  The protocols demonstrate methods that reduce the risk of inadmissibility and manipulation.  ...  A consideration of the protocols described below will enhance the veracity of the evidence. These protocols are a compilation of the U.S.  ... 
doi:10.14296/deeslr.v11i0.2131 fatcat:azbkzg3imjcszdx5dfj5h7gmza

A Critical Analysis of RFID Security Protocols

Atif Sharif, Vidyasagar Potdar
2008 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)  
In this paper we provide a comprehensive survey of various RFID authentication protocols proposed in the literature and classify them in different categories.  ...  We then study RFID authentication protocols having minimalist technique namely EMAP, LMAP and M2MAP. 1 confidentiality in communication between the tag and the reader. 2 reliability of the information  ...  RFID. [1] DongGook Park, Colin Boyd, and Ed Dawson, "Classification of Authentication Protocols: A Practical Approach", Proceedings of Information Security Workshop (ISW 2000), Springer-Verlag, LNCS  ... 
doi:10.1109/waina.2008.212 dblp:conf/aina/SharifP08 fatcat:gcbauiw3ajaa5olkhqmnkp7w5u

From critical pedagogy to critical methodology: a 'detective' approach for examining offensive practices in higher education

Ahmed Alhazmi
2018 Learning & Teaching in Higher Education: Gulf Perspectives  
The study applies a 'detective' approach examining some problematic uses of technology a higher education institution.  ...  The purpose of this theoretical approach is to empower alienated social groups against such practices by identifying 'defendants'‎‎ and the implications of their acts.  ...  Doubt The theme of doubt emerged from the classification of accusation into two categories: Administrative Scepticism, and Authenticity/Originality.  ... 
doi:10.18538/lthe.v15.n2.310 fatcat:nihzwn6uqnduhhj23r6bdelvf4

The Logic of Authentication Protocols [chapter]

Paul Syverson, Iliano Cervesato
2001 Lecture Notes in Computer Science  
We schematically describe BAN's approach to authentication in the following diagram, a final evolution of pictures above: Idealization of protocol P ↓ Authentication assumptions for P −→ BAN −→ Authentication  ...  Some of these other approaches are discussed elsewhere in this volume. The remainder of this section will provide background on authentication protocols and introduce a running example.  ... 
doi:10.1007/3-540-45608-2_2 fatcat:bfi5h47qlfgtvodgjfgv7jyiai

Privacy Preserving Biometrics-Based and User Centric Authentication Protocol [chapter]

Hasini Gunasinghe, Elisa Bertino
2014 Lecture Notes in Computer Science  
The paper includes experimental results on a dataset of iris images and a security and privacy analysis of the protocol.  ...  Authentication is performed through a zero-knowledge proof of knowledge protocol which is based on a cryptographic identity token created using the unique, repeatable and revocable biometric identifier  ...  in the output of the SVM classification, which does not happen practically based on the observation of our experiments.  ... 
doi:10.1007/978-3-319-11698-3_30 fatcat:zs5gwqetfbbpjgjpxq357afumq
« Previous Showing results 1 — 15 out of 35,310 results