Filters








71,765 Hits in 4.7 sec

User-aided data authentication

Sven Laur, Sylvain Pasini
2009 International Journal of Security and Networks (IJSN)  
In this paper, we study the corresponding user-aided message authentication and key agreement protocols.  ...  We also show that certain properties of user-aided protocols simplify the security analysis in complex environments compared to the standard authentication protocols.  ...  This result represents the main technical difference between classical and user-aided data authentication.  ... 
doi:10.1504/ijsn.2009.023427 fatcat:7oyxukrharalrewf3d7a4amdjy

Evaluating knowledge-based security questions for fallback authentication

Reem AlHusain, Ali Alkhalifah
2022 PeerJ Computer Science  
The approach proposed in this study was designed considering different factors, such as question features, authentication mechanisms, and the use of tools to aid in composing memorable and secure answers  ...  Failed user authentication is a common event. Forgotten passwords and fingerprint non-recognition are the most common causes.  ...  data).  ... 
doi:10.7717/peerj-cs.903 pmid:35494806 pmcid:PMC9044221 fatcat:6o6druwxpbgtnjcfr7cgwdbyjm

An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem

Lidong Han, Qi Xie, Wenhao Liu
2017 International Journal of Network Security  
The protection of user's privacy and data security is significant over public communication.  ...  We demonstrate that Lu et al's scheme can't protect user anonymity and insecure against impersonation attack.  ...  In this phase, user and server first authenticate each other and then agree on a session key that can be used for the secure transmission of data. • U i first inserts SC i into the card reader, and enters  ... 
dblp:journals/ijnsec/HanXL17 fatcat:tkm22cvrb5eqtleq43hs6wbnse

An Efficient Anonymous Authentication Scheme Using Registration List in VANETs [article]

A. Aghabagherloo, J. Mohajeri, M. Salmasizadeh, M. Mohassel Feghhi
2020 arXiv   pre-print
These networks need several security requirements, such as anonymity, data authentication, confidentiality, traceability and cancellation of offending users, unlinkability, integrity, undeniability and  ...  One of the well-known techniques to provide users authentication in these networks is the authentication based on the smartcard (ASC).  ...  Step3: RSU saves {ID, AIDi, ks} in its authentication list (Lauth) to use it in the data authentication phase, then it sends / { } , , i s i AID k a to the OBUr.  ... 
arXiv:2004.00282v1 fatcat:gijpx7rfdvgp5btswmj2nuu6za

Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction

Younsung Choi, Youngsook Lee, Dongho Won
2016 International Journal of Distributed Sensor Networks  
Finally, we conduct a security analysis for the proposed biometrics-based user authentication scheme.  ...  He et al. suggested a robust biometrics-based user authentication scheme, but Yoon and Kim indicated that their scheme had several security vulnerabilities.  ...  This hash function can be used to map the data of an arbitrary size to data of a fixed size with slight differences in the input data producing very large differences in the output data.  ... 
doi:10.1155/2016/8572410 fatcat:crmf3ofprbc2vfnyjfk5r3ly5y

Cryptanalysis of Multi-Server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Cards and Biometrics [article]

Dheerendra Mishra
2014 arXiv   pre-print
Most of the authentication schemes support single server environment where the user has to register with each server.  ...  Although multi-server authentication schemes introduced a scalable platform such that a user can interact with any server using single registration.  ...  The password based authentication schemes provide two-factor remote user authentication while biometrics based user authentication schemes provide three-factor authentication.  ... 
arXiv:1401.4790v1 fatcat:s3zj5ud3brhvnf7vn6aixvkmre

Two-Factor Authentication and Key Agreement Schemes for Smart Home Fingerprint Characteristics

Zhenpeng Liu, Zeyuan Li, Qingwen Zhang, Shuhui Dong, Jiahang Liu, Yonggang Zhao, Jose M. Barcelo-Ordinas
2022 Mobile Information Systems  
The scheme consisted of fingerprint authentication and a key protocol.  ...  Aiming at the potential security threat of personal information disclosure in smart homes, a two-factor authentication and key protocol scheme based on fingerprint feature was designed to ensure privacy  ...  F2019201427 and Fund for Integration of Cloud Computing and Big Data, Innovation of Science and Education of China under Grant No. 2017A20004.  ... 
doi:10.1155/2022/4184433 fatcat:5lrv43cccrhexec3uqj6whlooy

Classifying Eyes-Free Mobile Authentication Techniques [article]

Flynn Wolf and Adam J. Aviv and Ravi Kuber
2018 arXiv   pre-print
Mobile device users avoiding observational attacks and coping with situational impairments may employ techniques for eyes-free mobile unlock authentication, where a user enters his/her passcode without  ...  This study supplies an initial description of user accu- racy in performing this authentication behavior with PIN and pattern passcodes, with varying lengths and visual characteristics.  ...  The data collection application's interface is designed to assist the study procedure by presenting the participant with an authentication code and then directing users to place the device in the eyesfree  ... 
arXiv:1805.12539v1 fatcat:cu2cyljs6beufj6txwtkkd2dc4

Perceptions of Mobile Device Authentication Mechanisms by Individuals who are Blind

Flynn Wolf, Ravi Kuber, Adam J. Aviv
2017 Proceedings of the 19th International ACM SIGACCESS Conference on Computers and Accessibility - ASSETS '17  
A tactile aid for a mobile authentication interface was introduced to participants to obtain preliminary feedback on its design.  ...  The aid was found to offer promise for supporting orientation, which could be used support novice users, and provide assistance when the mobile device must be used privately in public spaces.  ...  INTRODUCTION Authentication mechanisms are often used to secure access to mobile devices, where personal and sensitive data may be viewed or stored.  ... 
doi:10.1145/3132525.3134793 dblp:conf/assets/WolfKA17 fatcat:uaq2qfqztren3pizo42pf3gosm

ABE based Access Control with Authenticated Dynamic Policy Updating in Clouds

Liang-Ao Zhang, Xingming Sun, Zhihua Xia, Qiuju Ji
2015 International Journal of Security and Its Applications  
However the cloud should also authenticate the owner because the adversary may modify the access policies of the files in the cloud to prevent the legal users from accessing them.  ...  By adding an interact communication between cloud and data owner, the cloud could authenticate the owner without learning anything of the owner's data.  ...  Data users are assigned with unique global user identities.  ... 
doi:10.14257/ijsia.2015.9.8.08 fatcat:knon7ote3fbbvamaptpnpykxvu

Weaknesses of a dynamic ID-based remote user authentication scheme

Debiao He, Jianhua Chen, Rui Zhang
2010 International Journal of Electronic Security and Digital Forensics  
In password authentication, DoS attack can cause permanent error on authentication by introducing unexpected data during the procedures of authentication.  ...  The most vulnerable procedure is the password changing phase since it usually refreshes the data in storage. If an  ...  To be more precise, the attack can 6 be implemented as follows: 1) The attacker (say, user j U ) eavesdrops the victim's (say, user i U 's) authentication session from which i AID , i  ... 
doi:10.1504/ijesdf.2010.038613 fatcat:uf2jjx3s2beefkcc6ydaf2nb7e

RUASN: A Robust User Authentication Framework for Wireless Sensor Networks

Pardeep Kumar, Amlan Jyoti Choudhury, Mangal Sain, Sang-Gon Lee, Hoon-Jae Lee
2011 Sensors  
his/her authenticity, so that only authentic users can access the WSN data.  ...  User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services  ...  RUASN: Robust User Authentication for Wireless Sensor Network To solve the potential problems of user authentication for WSNs, we propose RUASN which ensures WSN data are only accessed by legitimate users  ... 
doi:10.3390/s110505020 pmid:22163888 pmcid:PMC3231354 fatcat:mbenyrkl45dhbjts6klwzjcxb4

MetaboID: A graphical user interface package for assignment of 1H NMR spectra of bodyfluids and tissues

Neil MacKinnon, Bagganahalli S. Somashekar, Pratima Tripathi, Wencheng Ge, Thekkelnaycke M. Rajendiran, Arul M. Chinnaiyan, Ayyalusamy Ramamoorthy
2013 Journal of magnetic resonance (San Diego, Calif. 1997 : Print)  
This library serves as the basis for MetaboID, a Matlab-based user interface designed to aid in the one-dimensional spectral assignment process.  ...  Thus, one-dimensional spectral assignment is routinely performed, guided by two-dimensional experiments on a selected sample subset; however, a publicly available graphical interface for aiding in this  ...  MetaboID was designed as a user-friendly, customizable interface for accessing the vast amount of authentic metabolite NMR data in an intuitive, centralized fashion.  ... 
doi:10.1016/j.jmr.2012.11.008 pmid:23232331 pmcid:PMC3529807 fatcat:4xh2pzp5j5ejpeenkqinmvya64

A diary study of password usage in daily life

Eiji Hayashi, Jason Hong
2011 Proceedings of the 2011 annual conference on Human factors in computing systems - CHI '11  
The analyses of the data provided several implications about user authentication systems. We hope that this paper contributes to further investigation and development of user authentication systems.  ...  As a result, while our data helps estimating users' actual workload, it under-estimate the frequency of user authentication. Moreover, our study was limited to password events using computers.  ... 
doi:10.1145/1978942.1979326 dblp:conf/chi/HayashiH11 fatcat:man33mbsmbcg3nijlszohd75nm

Geometric Authentication Mechanism for Enhancing Security in IoT Environment

Ming-Chin Chuang, Chia-Cheng Yen
2021 Symmetry  
, session key agreement, and flexibility in users choosing and changing their passwords easily.  ...  In this paper, we designed a new geometric authentication mechanism to enhance security. The solution is based on geometric characteristics to achieve rapid authentication at low computational cost.  ...  Step 5: The user sends an authentication message {AID i , A i , C i , T} to the IGW through a normal wireless network.  ... 
doi:10.3390/sym13081369 fatcat:z4jhmhciqbb3nm5ayjqs36iwqe
« Previous Showing results 1 — 15 out of 71,765 results