The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper has presented an approach of vTPM (virtual Trusted Platform Module) Dynamic Trust Extension (DTE) to satisfy the requirements of frequent migrations. With DTE, vTPM is a delegation of the capability of signing attestation data from the underlying pTPM (physical TPM), with one valid time token issued by an Authentication Server (AS). DTE maintains a strong association between vTPM and its...
As mobiles become a ubiquitous, they are used more and more for operations that may involve sensitive data or huge amounts of money. The mobile is also increasingly being used as the tool of preference for browsing and using the Internet. Hence, new security measures must be developed to support increased functionality of these devices, to protect users in the case of any mishap. Authentication using...
Online signature recognition is one of the important behavioral biometric trait. This signature has information of x, y, z variations, pressure, azimuth of pen tip, altitude of pen tip. This makes online handwritten signature based biometric system more accurate than the static ones. In this paper new set of features are proposed for online or dynamic signature recognition. Geometric centers, Grid...
Previous studies on keystroke dynamics confirmed that the use of biometric technologies provides a significantly high level of reliability especially in situations where security is paramount. Most of these studies use genetic algorithms and k-nearest neighbor as their model of computation. In this paper, we explore an algorithmic solution based on an alternative model patterned after the process...
In this paper, we demonstrate a new way to perform continuous authentication using Mouse Dynamics as the behavioural biometric modality. In the proposed scheme, the user will be authenticated per mouse event performed on his/her system. We have used a publicly available mouse dynamics dataset and extracted per event features suitable for the proposed scheme. In this research, we have used the mouse...
In the conventional security protection system, more separated data encryption from user identification authentication, and mainly focused on the former but ignore the latter. In order to address this problem, the dynamic and double encryption system based on two-dimensional image is presented, which combined the identification authentication with file encryption. Our approach is that, in the identification...
Nowadays, user authentication is one of the important topics in information security. Text-based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical authentication has been proposed as a possible alternative solution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.