Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Smart-card-based user authentication is a significant security mechanism that allows remote users to be granted access to services and resources in distributed computing environments like clouds. In this paper, we revisit two password authentication schemes with smart cards proposed by Mishra et al. and Wu et al. in 2015, respectively. We demonstrate that: (1) Despite being armed with a formal security...
Cloud computing allows not only to obtain computing resources on-demand but also to store large amounts of data (big data) with a high level of fault tolerance. Nevertheless, data confidentiality for users of hybrid and public clouds is cannot guaranteed in full. Cloud providers have full access to user data, which threatens to compromise the integrity of data. Existing methods of providing security...
MOBA (Multiplayer Online Battle Arena) games are currently one of the most popular online video game genres. This paper discusses implementation of a typical MOBA game prototype for Windows platform in a popular game engine Unity 5. The focus is put on using the built-in Unity components in a MOBA setting, developing additional behaviours using Unity's Scripting API for C# and integrating third party...
Radio-Frequency Identification (RFID) tags have been widely used as a low-cost wireless method for detection of counterfeit product injection in supply chains. In order to adequately perform authentication, current RFID monitoring schemes need to either have a persistent online connection between supply chain partners and the back-end database or have a local database on each partner site. A persistent...
The number of devices that are being connected by the Internet is growing rapidly and hence, safeguarding private information by incorporating hardware and software security measures has become crucial. Physically unclonable functions (PUFs) have been proposed to enable lightweight hardware security which uses the inherent manufacturing variations as a way to generate unique signatures. However, given...
In this paper we describe a unique video database which consists of the real life moments of people and objects, captured under various illumination conditions and camera positions. We have classified all the videos of our database into six categories, out of which four categories are based on the movements of camera and objects (captured by the camera). The remaining categories of the database are...
Rising technologies as wireless technologies, Sensing technologies and Communication technologies transformed the Internet into an integrated network of things termed as Internet-of-Things (IoT). IoT is a network of things connected over by Internet, all the pros and cons of internet are also inherited to IoT applications. Hence, security and privacy of user data is a serious issue in IoT. In this...
Security is a vital issue to be taken care of and to be experienced with different perspectives and preventive measures. In the present time, entire web is coming nearer from content information to mixed media information. One of the real security concerns is the insurance of this sight and sound information. Picture, which covers the most noteworthy rate of the media information, its assurance is...
Username/Password combination is currently the most commonly deployed authentication method for a large number of applications. The databases of stored credentials are a high-profile target for malicious attackers who are performing advanced attacks to break into servers for stealing and cracking password hashes. Consequently, relying on the classical authentication scheme may not be usually an effective...
Digital electronic type of physical unclonable functions (PUFs) are vulnerable to modeling attacks. They also suffer from errors due to temporary environmental variations, such as the variation of the ambient temperature. Motivated by that, we designed a new mixed-signal PUF using 45nm MOSFET technology. The design presents an expanding approach for the number of processed bits. The design generates...
Finger vein patterns are unique biometric features, which differentiate from individual to individual, so they are suitable for authentication applications. Systems based on the use of this feature have numerous advantages such as low cost and high accuracy. A new finger vein authentication approach is proposed, which is based on the efficient detection of the non-vein regions, in order to define...
Text passwords were and still an easy, common, practical and reliable authentication method. To ensure the desired goal of access protection, passwords should be implemented carefully. This study proposes a new mechanism to strengthen passwords through introducing time gaps (delays) between some password characters during the sign-up process. During sign-in, users should not only enter their correct...
Proper identification is important for providing secure facilities and services to user. Cloud computing is involved in our day to day life as it offers several services, storage spaces, applications etc. As the usage increases, vulnerability and security threats arose need to be studied and rectified. As a part of this, proper authentication need to be done before allowing file uploading to cloud...
Authentication that is based on Biometrics traits is more secure for many applications like cryptosystems, therefore; the template of stored biometric members of the biometric authentication system is a dangerous issue, while it can be stolen or breached. We produce in this paper an automatic evaluator depending on the biometric performance measures FAR, FRR and EER by simulating how noise in the...
For over a century, fingerprints (FP) have been considered one of the most highly used methods for human recognition; automated biometric systems have only been available in recent years. FP recognition is becoming indispensable part of many identification systems in the world. This research present a proposed authentication system based on FP as biometric type and some of static credential personal...
User authentication is a very important securitymechanism for accessing the services while roaming in theglobal mobility networks. However, the authentication schemesdesigned are vulnerable to the attacks, hence new requirementsshould be employed while designing a scheme. In 2014 Gopeand Hwang proposed an efficient mutual authentication andkey agreement scheme, in which they stated that the schemeprovides...
Smart Card has complications with validation and transmission process. Therefore, by using peeping attack, the secret code was stolen and secret filming while entering Personal Identification Number at the ATM machine. We intend to develop an authentication system to banks that protects the asset of user's. The data of a user is to be ensured that secure and isolated from the data leakage and other...
Iris recognition is effective biometric technique that gained attention in past 20 years. Over past few years many techniques and algorithms are proposed for effective iris recognition under various constraints. Low constraint IRIS recognition is still an area where considerable work needs to be done and there is huge scope to do. This paper discusses about various techniques proposed, the constraints...
All the real time signals are non-periodic and non-stationary, which gives more information for any signal processing techniques. Electrocardiogram (ECG) signal is an example of real time signal. ECG signal gives electrical activities that are useful information about the functioning of heart. ECG signals helps in diagnosing the complex cardiac diseases. ECG signals are low frequency signals and contain...
The main objective of the democracy is “vote” by which the people can elect the candidates for forming an efficient government to satisfy their needs and requests such that their standard living can be improved. In developing countries like “INDIA” the election commission follows manual voting mechanism which is done by electronic voting machine. This machine is placed in the poll booth centre and...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.