Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, we consider the outsourcing model in which a third-party server provides data integration as a service. Identifying approximately duplicate records in databases is an essential step for the information integration processes. Most existing approaches rely on estimating the similarity of potential duplicates. The service provider returns all records from the outsourced dataset that are...
MySQL database identity authentication uses a CHAP protocol, that is, the challenge/response protocol, which exists the password expressly transmission, one-way authentication, random time can not grasp and other security issues. In this paper, we analyze the security problems of the existing MySQL database authentication protocol, and propose a new type MySQL integrated mutual authentication security...
RFID (Radio frequency identification) technology which uses radio waves to identify objects has been applied widely. The security and privacy of the system is increasingly concerned. In this paper, we design a Trivium-like cipher algorithm without compromising the security and consuming less resource, which is called Enhanced-Trivium. We illustrate a Challenge-Response authentication protocol using...
By analyzing the characteristics of Cookie and introducing the thought of ticket in Kerberos identity authentication, a uniform identity authentication method and its algorithm implementation based on Cookie Ticket are presented in this paper. Regarding identity authentication as a service and applying WCF (Windows Communication Foundation) technology, the uniform identity authentication based on...
RFID (radio frequency identification) is a small electronic device that consists of small chip and an antenna. The biggest challenge for RFID technology is to provide benefits without degrading the secutiry level. This paper proposes a new RFID authentication protocol based on the lightweight stream cipher Enhanced-Bivium. In terms of security we show that the protocol is robust under the attack of...
MD5(message digest algorithm) plays an important role in the digital signature, identity authentication and data encryption on account of its special ability of strong one-way encryption and irreversibility. Consequently, MD5 is widely used in login authentication module in which password is encrypted by MD5 algorithm. The login process is to compare the encrypted password value and the password stored...
Biometrie security depends on its accuracy and efficiency, but is especially vulnerable to spoof attacks. Currently liveness detection has become the standard method of reducing the impact of spoof attacks, however whilst this protects against spoof creation and presentation, it does nothing to detect legitimate users being coerced into accessing systems. This paper looks at this coercion concept,...
Attempts to secure the enterprise network, even when using strong AAA (authentication, authorization and accounting) schemes, meet the user box spoofing and security middle boxes (firewalls and other filtering tools) bypassing problems. Seeking to strengthen the network security level, the names (users, addresses) and user machines must be bound tightly to the unambiguously defined network appliances...
In this paper we focused on authentication on low-cost devices. We proposed a new mutual authentication protocol suitable for implementation on low-cost devices. The proposed protocol is simple and uses only appropriate low-cost Hash functions and Physical unclonable functions (PUFs). The proposed protocol enables secure transmission of information from the one user to the another user. For this purpose...
We propose a Parity-based Data Outsourcing(PDO) model in this paper. This model outsources a set of raw data by associating it with a set of parity data and then distributing both sets of data among a number of cloud servers that are managed independently by different service providers. Users query the servers for the data of their interest and are allowed to perform both authentication and correction...
With the growing popularity of mobile apps, the security issues of mobile apps become critical. Similar to traditional cyber security, mobile security includes authentication, data integrity, and data privacy. Seed-based authentication is a novel approach for mobile systems. The key idea is to extract seeds from files such as images and generate random numbers for authentication. However, in seed-based...
Among the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works...
In the last decade, various types of RFID security schemes have been proposed which have tried to provide all security and privacy requirements of end-users. In this paper, we cryptanalyze two new-found key exchange and key agreement security schemes which are proposed by Zhang et al. and Kim in 2012 and 2013 respectively. We present the reveal secret parameter, tag impersonation and traceability...
This paper gives an idea about a portable attendance system which will be designed and implemented using Raspberry Pi as an embedded Linux board for the management of attendance mainly in educational institutes. With the help of biometric sensor a unique identity is assigned to each individual student. And this ID is stored in database with the help of Raspberry Pi to show the student is present for...
Recognizing the people by their ear shape is upcoming application in the field of biometrics. Ear shape of a person does not change over his life span it is also unique and ear appearance cannot be modified by human efforts. Acquiring ear image not need an individual attention. Considering all these unique characteristics, significance in ear authentication modules has developed extremely over a past...
Recently, Kalra and Sood proposed an authentication scheme for Internet of Things (IoT) and cloud environments. In these comments, we demonstrated that several security weaknesses exist in this scheme, including lack of mutual authentication, anonymity, forward secrecy, and a workable key agreement. Furthermore, this scheme is subject to the replay attacks and the impersonation attacks.
Authentication of digital audio has become indispensable for validating genuine information, especially in very important situations involving legal issues. Study in audio authentication especially for AAC audio is still limited and the conventional authentication techniques are mostly applicable to MP3 audio and uncompressed audio. In this work, we propose an authentication scheme for AAC compressed...
Measuring strength of passwords is important in order to ensure the security of password-based authentication. Since passwords are still the most widely used method for authentication, there has been a considerable research on passwords and password strength. Yet, studies related to password still lack of access to plaintext passwords that are created under a specific password policy. Our research...
This study presents an automated Online Biometric-enabled Class Attendance Register System (OBCARS) prototype. The system design and development is aimed at addressing the challenges of misplaced and/or torn attendance register paper sheets in various classrooms in Higher Educational Institutions. Also, the system is aimed at providing an efficient and effective class attendance tracking method that...
At present, direct comparing the template similarity has the characteristics of low authentication rate and fast running time, but full cyclic rotation metric can get high authentication rate with more running time. Considering the efficiency in running time and authentication rate, a gait authentication method based on acceleration and gyro signal named partial cyclic rotation metric (PCRM) is proposed...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.