• No results found

authentication systems

A Survey of Key Negotiation and Authentication Systems in WSNs

A Survey of Key Negotiation and Authentication Systems in WSNs

... security systems are more appropriate due to less overhead in establishing a secure ...Weight Authentication Systems and ECC are investigated to study the impact of physical attack on ...

7

A Survey on Shoulder Surfing Resistant Graphical Authentication Systems

A Survey on Shoulder Surfing Resistant Graphical Authentication Systems

... user authentication that we callpass-thoughts ...changeable, authentication method resilient ...thought authentication,the status quo of BCI technology ...

5

A Broad Review on Data Authentication Systems in Cloud Computing

A Broad Review on Data Authentication Systems in Cloud Computing

... computing authentication by using USB token with a combination of hash feature and Diffie- Hellman key ...user authentication that's visible as a core requirement for the cloud computing device the personal ...

10

A Review Of Multimodal Biometric Authentication Systems

A Review Of Multimodal Biometric Authentication Systems

... Biometrics systems have been introduced in various aspects of the ...Multimodal systems have recently got major attention due to the increased level of security it ...

5

Towards the Security Evaluation of Biometric Authentication Systems

Towards the Security Evaluation of Biometric Authentication Systems

... security systems with biometric ...biometric systems including: i) the lack of secrecy: everybody knows our biometric traits such as iris and ii) the fact that a biometric trait cannot be replaced if it is ...

6

A SURVEY ON VARIOUS ATTACKS POSSIBLE IN AUTHENTICATION

A SURVEY ON VARIOUS ATTACKS POSSIBLE IN AUTHENTICATION

... conventional authentication systems present, in the initial stages of the development of the authentication processes, various flaws has occurred which is responsible for the development of the ...

5

A Novel Approach for Fingerprint Liveness Detection Using Multi Features

A Novel Approach for Fingerprint Liveness Detection Using Multi Features

... biometric authentication. Password based authentication systems are less secure than that of the fingerprint authentication where fingerprints and Iris are unique for every ...biometric ...

6

Biometric Authentication and Verification for Medical
Cyber Physical Systems

Biometric Authentication and Verification for Medical Cyber Physical Systems

... WBAN authentication systems ...an authentication scheme based on human body motions to verify a person wearing a wrist worn smart device using Samsung Galaxy Gear (SGG) ...

15

On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage

On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage

... proximity authentication of access control systems is mainly based on the exchange of encoded identification information stored on the access ...passive authentication mechanisms suffer from problems ...

8

A Survey on Biometric Liveness Detection Using Various Techniques

A Survey on Biometric Liveness Detection Using Various Techniques

... Biometric systems are increasingly used for authentication purposes in various security ...authentication systems. This kind of techniques can solve the typical problem of systems based ...

7

A COMPREHENSIVE STUDY ON ACADEMIC AND INDUSTRY AUTHENTICATION AND ATTENDANCE SYSTEMS

A COMPREHENSIVE STUDY ON ACADEMIC AND INDUSTRY AUTHENTICATION AND ATTENDANCE SYSTEMS

... A Barcode is a means of visualizing machine-readable content. This composed of adjacent, overlapping spaces and walls. For Attendance Program Systems based on barcode, a barcode is at the backside of the identity ...

7

Multimodal Biometric System: A Feature Level Fusion Approach

Multimodal Biometric System: A Feature Level Fusion Approach

... Feature fusion of palmprint and fingerprint features forms the basis of the multimodal system in this study. Fingerprint verification is a very reliable biometric authentication process due to its universality, ...

5

A Framework for Token and Biometrics Based Authentication in Computer Systems

A Framework for Token and Biometrics Based Authentication in Computer Systems

... This paper offers another solution. Instead of adapting biometrics measurements painfully to cryptographic algorithms, we propose a new scheme that incorporates both techniques in a natural way. Our basic idea is to ...

7

Privacy Preservation Scheme of Face Identification with Multiparty Access in Net Banking Environments

Privacy Preservation Scheme of Face Identification with Multiparty Access in Net Banking Environments

... required to input into the banking interface. Smart cards and USB tokens are other security measures employed by banks that work by verifying the user through their possession of a smart card or USB device. The problem ...

6

Title: Security Issues in the Firewall Authentication caused by the Wireshark- A Protocol Analyzer Tool

Title: Security Issues in the Firewall Authentication caused by the Wireshark- A Protocol Analyzer Tool

... proxy authentication for the user name and the password is not secured way to protect our internal network from intrusions or extrusions within the internal ...

6

Multifold node authentication in mobile ad hoc networks

Multifold node authentication in mobile ad hoc networks

... In such circumstances, the decision of whether to use zero knowledge with symmetric or asymmetric key techniques can be determined by timing analysis and therefore node resources. Note that, no consideration was taken ...

16

IRIS BIOMETRIC AUTHENTICATION USING SIFT AND SVM

IRIS BIOMETRIC AUTHENTICATION USING SIFT AND SVM

... Biometric authentication systems verify a person’s claimed identity from behavioral traits (signature, voice) or physiological traits (face, iris, and ear) [1, ...of systems are developed for ...

6

Multimodal Biometric Authentication using ECG and Fingerprint

Multimodal Biometric Authentication using ECG and Fingerprint

... for authentication. Biometric verification system used for authentication purpose is becoming very common in corporate security systems, public security systems, consumer electronics and point ...

7

Cryptography Based Authentication Methods

Cryptography Based Authentication Methods

... password authentication system is the most common used method in authentication ...password authentication is considered very weak, this is because of the software ...password authentication ...

6

Authentication  with  weaker  trust  assumptions  for  voting  systems

Authentication with weaker trust assumptions for voting systems

... voting systems are reliant on external authentication ...voting systems with their own authentication mechanisms, from systems that rely on external authentication ...produces ...

27

Show all 10000 documents...

Related subjects