The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online signature recognition is one of the important behavioral biometric trait. This signature has information of x, y, z variations, pressure, azimuth of pen tip, altitude of pen tip. This makes online handwritten signature based biometric system more accurate than the static ones. In this paper new set of features are proposed for online or dynamic signature recognition. Geometric centers, Grid...
This paper analyses the effectiveness of random passwords used in South Indian languages in terms of their entropy value with an objective of recommending passwords with mandatory minimum length to enhance the security aspects in relation to their predictability.
Bank websites are secure websites considered high risk, so security is a prime concern. Authentication is extremely important because it serves as the entry point for customers to access their personal and sensitive information. To be considered effective and desirable, a banking website should provide its users with secure and usable authentication mechanisms. Otherwise, the authentication process...
Guest editors M. Angela Sasse and Charles C. Palmer speak with security practitioners about what companies are doing to keep customers secure, and what users can do to stay safe.
Smart card is a widely accepted user authentication tool to ensure only authorized access to resources available via open networks. In 2010, Sood et al. and Song independently examined a smart card based authentication scheme proposed by Xu et al. They showed that in Xu et al.'s scheme an internal user of the system could turn hostile to impersonate other users of the system. Sood et al. and Song...
E-banking services vitally need comprehensive secure and simple authentication methods in order to be universally spread. In this paper, a new method of authentication was proposed and tested. This method uses templates in addition to passwords which are received in registration process. Template provides benefits of one-time passwords in practice, and can thwart common attacks of the context. Template...
Scalable video using Cloud Computing is a potential solution for the distribution of media content to a large number of users. This may occur over a heterogeneous network connected to devices with different capabilities and diverse set of users. Although some of the problems are well known and understood in information and network security, there is still a need to improve the existing solutions to...
The demand for the computer talents with the economic development of Beibu Gulf Economic Area in China is analyzed in this paper, and the problems existing in the present higher education about cultivating computer innovative talents and the probe how to cultivate computer innovative talents are presented. The purpose of this teaching reformation is to train student's technology ability and creative...
With the popularity of Internet technology, remote user authentication is receiving more and more attention than before. Recently, Awasthi et al. analysed weakness of the timestamp-based authentication scheme proposed by Shen et al. and proposed an improved scheme to prevent its forgery attacks. They claimed that their scheme is secure against forged login attack, provides forward secrecy, and has...
An advanced threshold secret sharing scheme to identify cheaters is proposed in this paper by using authentication codes. The performance of the scheme is discussed. The results show that in the scheme the valid shareholders not only can identify the impersonation of an adversary, but also are able to detect cheating of some valid shareholders. In particular one honest shareholder is able to detect...
In recent years, there has been an increasing interest in the authentication process due to the key role that it has in the network security. Port Knocking (PKn) is an authentication method in which data transmits through the closed ports. This method is prone to attacks when attackers sniff the network. This paper proposes a new method which is called “Secure Port Knock-Tunneling” to eliminate both...
This paper describes the Web services security issues. A solution for routing messages based on Axis2 is proposed. The message's efficiency problem in the transmission process is solved by building a middleware. Using the rampart module of Axis2, web service security is realized.
A light-PKI Fast Authentication Model is proposed to improve the speed of communications authentication. In the light-PKI model, the root public key, CRL and canceled certificate are stored safely in terminal. It dose not need the TTP when two terminals authenticate each other. So, this model can enhance the authentication speed of PKI systems.
In enterprises and schools, information systems are heterogeneous customarily in operating system, architecture and program language because created time and requirement is different. The self-governed identity authentication and user management lead to differ identity, redundancy information, self-governed system and bad security. This paper integrates independent user management module and authentication...
In this paper, a support vector machine (SVM) classifier has been used to detect a face in an authentication application. A face candidate is first allocated from the input frame and then normalized to 200×200 pixels images. The textureness of candidates is then measured by the combination of BDIP and BVLC moments and classified into face and non-face ones by a SVM classifier which is known as efficient...
Invoices are the voucher to reimburse for official expenses. However, fake paper invoices spread in our lives. The appearance of electronic invoices can solve the problem of fake invoices. Before the business purchases invoices from Inland Revenue, The Inland Revenue and the business identify the authenticities of each other and generate a temporary session key between them through Key Distribution...
Multi-biometrics makes a big progress for the subject of biometrics. Multi-biometrics usually obtains a higher accuracy and reliability than single biometrics. Multi-biometrics depends on a fusion strategy to achieve this. The feature level and matching score level fusion seem to be two widely used and very effective fusion strategies. In this paper, we propose to combine a feature level and matching...
A semi-infrastructured ad hoc network is a wireless MANET subnetwork connected to a structured backbone network (LAN). This kind of network is becoming popular for low cost implementation and practicability issues. But the security is being considered as the major bottleneck of such semi-infrastructured Ad Hoc network. Uncontrolled access medium, dynamically changing topology, mobility of the hosts...
This paper focused on the issue of computer software vocational education to art and upholstery design undergraduate, discussed CAD skill training curriculum system with fieldwork oriented. The study indicates that CAI and network are the basic of improving CAD teaching effect, and further operational skill training technique such as case-teaching method, workshop exercitation, specialty rule and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.