54 Hits in 4.8 sec

A Secure Mobile Authentication Alternative to Biometrics

Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar
2017 Proceedings of the 33rd Annual Computer Security Applications Conference on - ACSAC 2017  
Biometrics are widely used for authentication in consumer devices and business settings as they provide sufficiently strong security, instant verification and convenience for users.  ...  We introduce ai.lock, a secret image based authentication method for mobile devices which uses an imaging sensor to reliably extract authentication credentials similar to biometrics.  ...  For instance, while biometric authentication provides sufficiently strong security, instant verification and convenience for users, biometrics are also hard to keep secret and pose lifelong security risks  ... 
doi:10.1145/3134600.3134619 dblp:conf/acsac/AzimpourkiviTC17 fatcat:bwrk2nzbxbflxfj6r4ljjali6e

Privacy-Protecting Techniques for Behavioral Data: A Survey [article]

Simon Hanisch, Patricia Arias-Cabarcos, Javier Parra-Arnau, Thorsten Strufe
2021 arXiv   pre-print
Our behavior (the way we talk, walk, or think) is unique and can be used as a biometric trait. It also correlates with sensitive attributes like emotions.  ...  We taxonomize and compare existing solutions regarding privacy goals, conceptual operation, advantages, and limitations.  ...  The feature vectors are then encoded with secure binary embeddings which have the property that if the euclidian distance of the two vectors is below a certain threshold then the hamming distance of the  ... 
arXiv:2109.04120v1 fatcat:zsv2bgrynveutlq2akx3vllhbq

A Secure Biometrics And PUFs-Based Authentication Scheme With Key Agreement For Multi-Server Environments

Jun Zhao, Weixin Bian, Deqin Xu, Biao Jie, Xintao Ding, Wen Zhou, Hui Zhang
2020 IEEE Access  
INDEX TERMS Multi-server authentication, mutual authentication, physical unclonable function, biometric security and privacy, fuzzy extractor.  ...  The emergence of multi-server authentication key protocol schemes provides a viable environment for users to easily access the services of multiple legitimate servers through a single registration.  ...  formula: Pr[HD(PUF 1 (C 1 ), PUF 2 (C 2 )) > d] ≥ 1 − ε. (3) Here, the term HD represents the Hamming distance. 2) For any physical unclonable function and any input PUF i (·) and for any input C 1 ,  ... 
doi:10.1109/access.2020.2975615 fatcat:yfrptayn4nckzhf6draxwhaqrm

Securing Next Generation Multinodal Leadless Cardiac Pacemaker System: A Proof of Concept in a Single Animal

Muhammad Faheem Awan, Rafael Cordero, Kimmo Kansanen, Delphine Feuerstein
2020 IEEE Access  
KEY MISMATCH RATE To evaluate the key mismatch rate before the reconciliation phase, the same metric of hamming distance is used. The hamming distance for perfectly matched keys should be zero.  ...  We determine the hamming distance between generated keys across the nodes.  ... 
doi:10.1109/access.2020.3017553 fatcat:sfurj5bmj5djnl2c4sbs752oge

Privacy-preserving speech processing: cryptographic and string-matching frameworks show promise

M. A. Pathak, B. Raj, S. D. Rane, P. Smaragdis
2013 IEEE Signal Processing Magazine  
This exposes the user to abuse, with security, privacy and economic implications.  ...  E.g. a voice-authentication service could make unauthorized use of the models or voice prints it has for users to try to identify their presence in other media such as YouTube.  ...  Biometric Applications: Identification and Authentication Biometric applications deal with determining the identity of the speaker.  ... 
doi:10.1109/msp.2012.2230222 fatcat:k2djygz765bpflblw3wgh2k75e

RFID Technology, Security Vulnerabilities, and Countermeasures [chapter]

Qinghan Xiao, Thomas Gibbons, Herv Lebru
2009 Supply Chain the Way to Flat Organisation  
Considering privacy issues related to the biometric e-passport, it may be possible for an attacker to gain access to the chip and read its memory contents optically to retrieve the PIN, biometric data,  ...  For example, the Ontario Commissioner for Information and Privacy released a set of guidelines to address privacy issues regarding use of item-level RFID technology in the retail/commercial sector.  ... 
doi:10.5772/6668 fatcat:vopadtcnfvhndmflyakqs2nphy

On Unique Personal Identifiers

Rodrigo Borges Nogueira, Ricardo Staciarini Puttini
2015 Journal of Internet Technology and Secured Transaction  
Therefore, an UPId is usually submitted along with some data for authentication purposes, such as a password or biometrics.  ...  To catch more errors, we just consider an arbitrary greater value for the Hamming distance among all active UPId.  ...  Additionally, we have proposed mechanisms for unique personal identifiers generation in different settings.  ... 
doi:10.20533/jitst.2046.3723.2015.0046 fatcat:oiysu4vvv5fxjf2wfyj5y6zopa

Inertial Sensor-Based Gait Recognition: A Review

Sebastijan Sprager, Matjaz Juric
2015 Sensors  
Considering the fact that each individual has a unique way of walking, inertial sensors can be applied to the problem of gait recognition where assessed gait can be interpreted as a biometric trait.  ...  According to these facts, one of the most intriguing research questions is whether it is possible to recognise (either identify or authenticate) user by the way he walks by using either single or multiple  ...  cryptosystem approach (fuzzy commitment scheme) Hamming distance Security and privacy preserved system (encrypted gait templates) Sprager et al., 2015 [46] Acc. data (all axes, magnitude  ... 
doi:10.3390/s150922089 pmid:26340634 pmcid:PMC4610468 fatcat:qirvsc4rfbfa5lwrdopbz3ytkm

A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks

Amit Kumar Gautam, Rakesh Kumar
2021 SN Applied Sciences  
We did a detailed survey in our paper on how the properties of various trust management, authentication, and key management schemes can be used for specific applications.  ...  One of the active areas of research is key management, authentication, and trust management in wireless sensor networks (WSN).  ...  [68] point out the various problem in password and keys based authentication and gives beneficial fact to use biometric information for authentication.  ... 
doi:10.1007/s42452-020-04089-9 fatcat:ioaq4ud5sfgvlk3bayjfzpddv4

Addressing Security and Privacy Challenges in Internet of Things [article]

Arsalan Mosenia
2018 arXiv   pre-print
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a holistic and transformative approach for providing numerous services.  ...  In this thesis, we tackle several domain-specific security/privacy challenges associated with IoT-enabled systems.  ...  Level 4-Data accumulation: Most of the applications may not need instant data processing.  ... 
arXiv:1807.06724v1 fatcat:f45cytbjkjgyjiytvr2ygdcsze

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

Joseph I. Choi, Kevin R. B. Butler
2019 Security and Communication Networks  
This paper also addresses three open challenges: (1) defeating malicious adversaries, (2) mobile-friendly TEE-supported SMC, and (3) a more general coupling of trusted hardware and privacy-preserving computation  ...  Trusted execution environments (TEEs) provide hardware-enforced isolation of code and data in use, making them promising candidates for making SMC more tractable.  ...  Acknowledgments Special thanks are due to Patrick Traynor and Thomas Shrimpton for their interest in and constructive criticisms of this work.  ... 
doi:10.1155/2019/1368905 fatcat:izynm6msrvehfa3ghkw7tykk34

Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions

Pan Jun Sun
2019 IEEE Access  
protection in the cloud computing; finally, we point out corresponding privacy protection laws to make up for the technical deficiencies.  ...  For more information, see VOLUME 7, 2019 P.  ...  For the input with a smaller hamming distance, the LSH's output has the same hash value.  ... 
doi:10.1109/access.2019.2946185 fatcat:tbg5a25f5rd3je4mogemegrvje

Electronic Cash [chapter]

Caroline Fontaine, Bir Bhanu, Micah Sherr, Darrel Hankerson, Alfred Menezes, Tanja Lange, Jean-Jacques Quisquater, David Samyde, Gerrit Bleumer, Marijke De Soete, Gerrit Bleumer, Gerrit Bleumer (+39 others)
2011 Encyclopedia of Cryptography and Security  
and the other 30 bits being the required hamming distance to get a sufficiently low probability of successful fraud without traceability.  ...  compromised, security measures for account holders, and techniques to achieve payment privacy.  ... 
doi:10.1007/978-1-4419-5906-5_197 fatcat:refw5kajwbbhdjwkpcwlaur5lq

The Impacts of Cement Dust Deposits on Soil Available Micronutrients

Buba M. Wufem, A. Q. Ibrahim, Humphrey M. Maina, Nangbes J. Gungsat, Nvau J. Barnabas
2014 International Journal of Science and Engineering Applications  
The concentration of each element in the soil varies in a decreasing order with increasing distance away from the cement factory and generally occurring above background levels (Zn, Mn, Ni).  ...  ANNEXURE The KVKR Multimodal Biometrics database is designed by research team from Biometrics Research Lab situated in Dept. of Computer Science and IT, Dr. B.A. M.  ...  ACKNOWLEDGMENTS The authors of this work would like to acknowledge the Benue State University Makurdi, Nigeria particularly the Chemistry department for their support during the course of this work.  ... 
doi:10.7753/ijsea0304.1001 fatcat:azs4jnugczaj3moqdb6gpzhane

Correspondents Theory 1800/2000: Philosophical Reflections Upon Epistolary Technics And Praxis In The Analogue And Digital

Anthony John Charles Ross, Moss Michael, Susan Stuart
2015 Zenodo  
The thesis is structured thematically, with chapters examining the experience of distance and presence in these two periods, the potential for meaningful engagements by way of communicative media, the  ...  praxis in the early nineteenth and 21st centuries, making use of Romantic era archival letters and related materials to compare and contrast our own, Internet-enabled experience of communicating over distance  ...  1989 (Hamming : 1410 .  ... 
doi:10.5281/zenodo.13889 fatcat:mzjqiccd55cmvj7yvm67wzvnlm
« Previous Showing results 1 — 15 out of 54 results