The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Continuous authentication offers the ability to continuously verify users' identity for accessing to the protected resource. Although current explorations such as face and fingerprint verification have seen varying rates of success, three main problems may limit their applicability in the context of information protection and access control: they can be of low availability in some practical scenarios,...
Wireless networks are used to access many services such as Internet banking, e-commerce, eHealth, and from many more systems that relay sensitive information. To connect to a wireless network a user needs to be authenticated by and be associated with an access point. Management frames and control frames are used for authentication, association and giving a user access to the wireless network. Management...
Now a day's fingerprint database can be stolen. Therefore attacker can track our fingerprints and use them for their purpose. Hence, to provide security to the fingerprints is an important issue. Here, system is designed to provide protection and to maintain the privacy of fingerprints. To provide privacy protection to the fingerprints, system combines two distinct thumbprints into a new virtual Individuality...
Problems of impersonation and other malpractices of various degrees have continued to mar the electronic-assessment (e-assessment) of students at various levels. The use of traditional methods of password and token passing for identity management and control has failed to provide acceptable solution to these problems, due to their susceptibility to theft and various forms of violations. The failure...
Problems of impersonation and other malpractices of various degrees have continued to mar the electronic-assessment (e-assessment) of students at various levels. The use of traditional methods of password and token passing for identity management and control has failed to provide acceptable solution to these problems, due to their susceptibility to theft and various forms of violations. The failure...
There's nothing wrong with having multiple smartphone authentication systems--each adapted to different device capabilities and mobile contexts--as long as they're complementary and don't detract from the user experience.
In this paper, we propose a remote password authentication scheme based on 3-D geometry with biometric value of a user. It is simple and practically useful and also a legal user can freely choose and change his password using smart card that contains some information. The security of the system depends on the points on the diagonal of a cuboid in 3D environment. Using biometric value makes the points...
In the paper we present a novel approach to logical access control to secured repository or container by integration of methods related to cryptography, steganography and biometrics.
Identity authentication is an important component of network security to guarantee the security of the information and service on open network. In this paper, we propose a secure “strong two-factor identity authentication” which stores digital certificate in smart card, and then protects the PIN of smart card with fuzzy fingerprint vault. Only the legal user can release the securely stored PIN to...
Research topic covered was the identification of a characteristic method of authentication based on biometric fingerprint reading to achieve a solution to secure communications. Biometric identification solution based on fingerprint reading was combined with conventional authentication methods to achieve more secure communications and computers better protected.
Most of the currently available intrusion detection systems do not provide any authentication functionality in order to identify the users who access a computer system. In particular, insiders are able to misuse their privileges without being detected. Some intrusion detection systems aim to authenticate legitimate users once they log in to the system, as well as to prevent access to unauthorized...
Biometric recognition systems represent a valid solution to the safety problem of Internet accessibility, even if they do not always provide an environment easily comprehensible by users and operators with a mid-level of competence. This gap can be partially filled if, instead of using the conventional access routines to the authentication system, the user could simply write to the system through...
A new method of realizing fingerprint authentication on Smartcard has been presented. Based on SOC, this method puts the pre-processing algorithm, which is the most time-wasting process, out of card. It not only decreases the complexity of realizing fingerprint authentication on Smartcard, but also ensures the security of fingerprint information due to the original fingerprint image has been transformed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.