The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Problems of impersonation and other malpractices of various degrees have continued to mar the electronic-assessment (e-assessment) of students at various levels. The use of traditional methods of password and token passing for identity management and control has failed to provide acceptable solution to these problems, due to their susceptibility to theft and various forms of violations. The failure...
Problems of impersonation and other malpractices of various degrees have continued to mar the electronic-assessment (e-assessment) of students at various levels. The use of traditional methods of password and token passing for identity management and control has failed to provide acceptable solution to these problems, due to their susceptibility to theft and various forms of violations. The failure...
At CTU FTS we are currently developing BioTest, an authentication system for testing students using state-of-the-art information technology and unambiguous Biometric authentication for each user. We use this system for identification during exams and testing. The BioTest software operates on the basis of a student's face recognition comparing the pattern with data on the student's ID card, while informing...
There's nothing wrong with having multiple smartphone authentication systems--each adapted to different device capabilities and mobile contexts--as long as they're complementary and don't detract from the user experience.
Data windows of keyboard input are analyzed to continually authenticate computer users and verify that they are the authorized ones. Because the focus is on fast intruder detection, the authentication process operates on short bursts of roughly a minute of keystroke input, while the training process can be extensive and use hours of input. The biometric system consists of components for data capture,...
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2010, Chang et al. proposed an improved biometrics-based user authentication scheme without concurrency system which can withstand the forgery attack, the off-line password guessing attack, the replay attack, etc. In this paper, we analyze...
The brain wave is able to present biometric data unconsciously, so that it enables continuous or on-demand authentication which is effective in user management. In this paper, assuming an application to driver authentication, we evaluate verification performance of the brain wave using a simplified driving simulator. In addition, dividing the $\alpha$-$\beta$ band to several partitions, we propose...
In the paper we present a novel approach to logical access control to secured repository or container by integration of methods related to cryptography, steganography and biometrics.
Effective user authentication is critical for protecting information and system safety. The most common computer authentication method is text password. Previous research suggests that text password can be hard to remember and users tend to create simple text password that is unsecure. Various password strategies and alternative authentication applications have been proposed, such as mnemonic password,...
Multi-biometrics makes a big progress for the subject of biometrics. Multi-biometrics usually obtains a higher accuracy and reliability than single biometrics. Multi-biometrics depends on a fusion strategy to achieve this. The feature level and matching score level fusion seem to be two widely used and very effective fusion strategies. In this paper, we propose to combine a feature level and matching...
Ever since, internet banking came into existence it has been a bull's eye for the hackers. Up to date, several cases have been reported by internet banking users for missing money or misuse of their accounts unknowingly. Well designed malwares are written to attack internet banking websites and its customers. Today botnets are emerging as the most significant threat facing online ecosystems. Identity...
Unlike many other biometrics, keystroke authentication does not require any additional hardware. Pressing time of keystrokes is the main source of information and can be extracted continuously during an ongoing session, even after the login time. The relative distance, which is a common measure in this field, is defined based on the relative typing speed of different digraphs. To improve the accuracy...
Research topic covered was the identification of a characteristic method of authentication based on biometric fingerprint reading to achieve a solution to secure communications. Biometric identification solution based on fingerprint reading was combined with conventional authentication methods to achieve more secure communications and computers better protected.
This paper describes a new approach for developing and implementing an advanced authentication method within active directory network services. For advance authentication process a new type of user multi-factor authentication based on the classical three-factor authentication extended by the position information and time is described in this paper. The main objectives of our applied research are extended...
When the network is increasingly becoming a part of people's lives at the same time, network and information security has also become one of the issues of most concern,. This article is based on a brief introduction in terms of information security, several commonly used way of authentication technologies and their advantages and disadvantages. Different levels of security authentication methods are...
The threat of phishing or malicious software (malware)-based attacks is significant and growing, at the same time online banking gets more and more popular. Financial loss may be one of the consequences if credentials get stolen. In many protocols, the transaction information is not secured properly. The proposed Biometric Transaction Authentication Protocol (BTAP) is based on the one hand on the...
In this paper we present a solution to obtain useful and reliable user logs in a learning management system (LMS). Current LMS logs are combined with biometric-based logs that show the student behaviour. Our system models the student behaviour, allowing to know exactly how much time the student spends in front of the computer examining the contents of the LMS. Besides, user verification and face tracking...
Keystroke dynamics-based authentication, KDA, verifies users via their typing patterns. To authenticate users based on their typing samples, it is required to find out the resemblance of a typing sample and the training samples of a user regardless of the text typed. In this paper, a measure is proposed to find the distance between a typing sample and a set of samples of a user. For each digraph,...
This paper will describe a login method for accessing computer systems, using mouse dynamics. The user needs to perform a task with his mouse pointer, and based on the performance of that task, the user is granted or denied access to the computer. Such a system could be a replacement for, or an addition to, the ordinary username/password system. A password based system has in general the disadvantage...
User authentication is an important problem for any restricted access computer system, especially with remote access. Constant spread of Internet makes efficient remote authentication a pressing issue while the distributed nature of interaction introduces additional difficulties. Authentication methods based on most biometrics techniques require dedicated hardware that is unhandy for remote applications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.