The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional deception-based cyber defenses often undertake reactive strategies that utilize decoy systems or services for attack detection and information gathering. Unfortunately, the effectiveness of these defense mechanisms has been largely constrained by the low decoy fidelity, the poor scalability of decoy platform, and the static decoy configurations, which allow the attackers to identify and...
Digital signature is a term that use a key pair of user for sign and verify a document. People can create their digital signature using biometric technology. Biometric technology is a concept that allows people to doing an digitally authentication using their bodies, for example by using their fingerprint. Now, fingerprint biometric technology system was available in some smartphone product, so that...
For over a century, fingerprints (FP) have been considered one of the most highly used methods for human recognition; automated biometric systems have only been available in recent years. FP recognition is becoming indispensable part of many identification systems in the world. This research present a proposed authentication system based on FP as biometric type and some of static credential personal...
Cloud computing is boon in technology field which provide on-demand services in IT enterprises. With storage of data on cloud the challenge of its security and authentication threats occurring. Authentication in cloud computing is a major concerned. The main objective of these technique is to authenticate at client side, server side, or as third party using different method to keep the data in secure...
Cloud computing is an efficient technology to improve the performance of organizations by providing flexibility in architecture and reduction in costs. Dynamic resource pooling, virtualization, on demand service and high availability are some of the advantages provided by cloud computing. However, open and distributed architecture as well as internet access, have caused cloud environments to be risky...
Cloud computing models are built over huge number of self-managed systems. Data owner, User and the Cloud service provider are the basic entities of those models and forms a crypto-cloud. Communication that happens between the entities leads to various security issues. Sensitive data which are on transmission and at rest paves ways for hackers. So, these data should always be kept confidential, should...
Biometric authentication (BA) is becoming more and more popular. Usually, we expect that BA can make various service systems more secure, but in fact it can be more dangerous. For example, fingerprint is one of the popular biometrics for authentication. We say it is dangerous because we cannot change our fingerprints even if they are collected and duplicated by some malicious third parties. This kind...
Multimodal biometric continuous authentication systems allow to improve security, making user identity verification a continuous process rather than a one-time occurrence. Unfortunately, the usability of these systems and their adequacy for working activities are often questioned. This paper presents a usability study for a multimodal biometric continuous authentication system capable of continuously...
To better protect the security of the core site, such as precious material storage or the place to be visited by important figure, and to improve the efficiency of the security system of the core site, this paper proposes an identity authentication scheme based on fingerprint authentication and pulse. According to fingerprint and the dynamic password, and on the condition of the pulse for ensuring...
Identifying users and user devices is as important in web applications as in many other contexts. In web applications, user identification usually involves an authentication process, e.g., providing a username and a password. Identification is also possible without explicit authentication using cookies or device fingerprints. Device fingerprinting is also useful for other purposes, e.g., to serve...
In this research, we propose a secure multi-modal biometric authentication that will have cancellable property. Cloud servers need to have the confidential information mobile and ready in case of cancellation so that the same user can authenticate or identify using the same authentication process when joining to other clouds. However, a cloud server needs to be careful transferring biometric data...
This paper gives an idea about a portable attendance system which will be designed and implemented using Raspberry Pi as an embedded Linux board for the management of attendance mainly in educational institutes. With the help of biometric sensor a unique identity is assigned to each individual student. And this ID is stored in database with the help of Raspberry Pi to show the student is present for...
Smart card based password authentication is one of the efficient and simplest mechanisms to communicate over an insecure channel. Recently, Om et al. have proposed a 3-D geometric triangle based two way authentication scheme, which is an improved version of the Wu et al.'s straight line based remote login authentication. In this paper, we provide the cryptanalysis of the Om et al.'s two-way authentication...
Access control systems have been widely used in physical security to authenticate the passing people and control their entrance. The existing systems can be classified into the fingerprint based system, the proximity card based system, etc. according to the adopted authentication techniques. However, proximity cards are easy to lose, while fingerprints also become less reliable because they can be...
In 2014, Choi proposed a security enhanced anonymous multi-server authenticated key agreement scheme using smart card and biometrics and claimed that their scheme could overcome all of security issues in Chuang-Chen's scheme, such as impersonation attack, smart card loss attack, denial of service attack and perfect forward secrecy. Unfortunately, we discover that Choi's proposed scheme is not only...
In this paper, we propose a remote password authentication scheme based on 3-D geometry with biometric value of a user. It is simple and practically useful and also a legal user can freely choose and change his password using smart card that contains some information. The security of the system depends on the points on the diagonal of a cuboid in 3D environment. Using biometric value makes the points...
The operation of Personal Identification Number (PIN) based Automated Teller Machine (ATM) has continued to experienced challenges currently militating against its acceptance and patronage. The challenges include card swallowing, misplacement, damage or expiration. Several users are also experiencing forgetfulness of PIN and the activities of fraudsters targeted at PIN pilfering for authorized access...
This paper aims at creation of a voting system by providing a cost effective solution to the government along with ensuring non-traceability and integrity of the votes cast while providing great convenience to voters. This system is developed robustly to ensure that all eligible voters having a Universal Identification Number of their country (For Example the Smart Card in USA) is allowed to cast...
In 2008, Khan et al. proposed a remote user authentication scheme on mobile device, using hash-function and fingerprint biometric. In 2010, Chen et al. discussed some security weaknesses of Khan et al.'s scheme and subsequently proposed an improved scheme. Recently, Truong et al. have demonstrated that in Chen et al.'s scheme, an adversary can successfully replay an intercepted login request. They...
In this paper, we have designed a high-security two-way real-time authentication system using dynamic password and multi-biometric to solve the shortages of traditional information system. In order to guarantee the security of fingerprint eigen value and facial feature value, we encrypt them with dynamic password. By the method of two-way authentication, it not only can ensure authentication server...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.