The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a password security system that allows the host not to store the passwords of its users at its end. Instead it creates and stores a derivative of the password with the help of a bitmap image uploaded by the user during the user creation process. During the login attempts of users, the user is required to enter the password and upload the same image. the proposed system verifies...
Location-based queries have brought challenging privacy issues for mobile users. Having access to data, anytime from anywhere, raises many security concerns. One of these concerns is user's location privacy, where a user must reveal her location to get the desired result. The question is how to benefit from such queries without endangering user's location privacy. This paper presents a new method...
Keystroke Dynamics can be used as an unobtrusive method to enhance password authentication, by checking the typing rhythm of the user. Fixed passwords will give an attacker the possibility to try to learn to mimic the typing behaviour of a victim. In this paper we will investigate the performance of a keystroke dynamic (KD) system when the users have to type given (English) words. Under the assumption...
This paper presents a multi-instance fingerprint authentication system, which is immune to various problems encountered in unimodal systems. During enrolment all available fingerprints are captured and their unique features extracted, processed and stored in a database alongside the bio-data of individual subjects. Unique features of fingerprint were extracted using the crossing number (CN) technique...
According to GJB6600, this paper firstly analyses Interactive Electrical Technical Manual's (IETM) read and use, and puts forward an independent and controllable IETM reader platform framework and software realization technical architecture, which is based on GJB6600 and satisfied national safety and confidentiality requirements. Then design IETM reader platform framework. Some key techniques are...
In recent years, biometric, or "who you are," authentication has grown rapidly in acceptance and use. Biometric authentication offers users the convenience of not having to carry a password, PIN, smartcard, etc. Instead, users will use their inherent biometric traits for authentication and, as a result, risk their biometric information being stolen. The security of users’ biometric...
The current need for large multimodal databases to evaluate automatic biometrics recognition systems has motivated the development of the XJTU multimodal database. The main purpose has been to consider a large scale population, with statistical significance, in a real multimodal procedure, and including several sources of variability that can be found in real environments. The acquisition process,...
This work proposes an off-line handwritten signature identification system using the Histogram of Symbolic Representation (HSR). The HSR is considered as one-class classifier which has the ability to generate a model for each writer using only its own reference signatures. This method allows also modeling the writing style of each writer by taking into account the variability of signatures. To evaluate...
By analyzing AAA service log data of one main ISP in China, we found that the variations of authentication success ratio (ASR) exhibit counter-intuitive behavior. The ASR is actually higher during peak hours than off-peak hours. To account for this paradox and explain ASR variations in general, an analysis mechanism is proposed. It has the ability to separate ASR variations into systemic changes over...
Choosing how to write natural language scenarios is challenging, because stakeholders may over-generalize their descriptions or overlook or be unaware of alternate scenarios. In security, for example, this can result in weak security constraints that are too general, or missing constraints. Another challenge is that analysts are unclear on where to stop generating new scenarios. In this paper, we...
In conditions of information technology growth, systems which are being developed to be used on multiple platforms, gain in importance and popularity. As a rule, such systems have client-server architecture and have strong security requirements for user authentication. In this paper the information technology of user authentication for cross-platform systems has been developed, which is characterized...
The system proposed in this paper is an innovative biometrie authentication platform for access control applications based face recognition. The vision system is based multisensor fusion combining catadioptric sensor (calibrated with a field of view of 360°) and a Pan Tilt Zoom camera (PTZ). It is able to detect and track moving objects with a high zoom level. The recognition process is based on detection...
Personal cloud storage services are gaining popularity, such as SkyDrive, iCloud, Dropbox, etc. All of them provide a certain amount of free storage space for individual users, while the free space is quite limit, and you should upgrade to a paid account to get extra space. Therefore, a new approach is proposed in this paper, that many free personal cloud storage accounts are integrated in order to...
Radio frequency identification (RFID) is one of the key technologies of Internet of Things, which have many security issues in an open environment. In order to solve the communication problem between RFID tags and readers, security protocols has been improved constantly as the first choice. But the form of attack is also changing constantly with the development of technology. In this paper we classify...
With the development of network technology, the design for the automatic generative system of examination papers that is based on web has become a trend. In order to reduce the burden on teachers and avoid duplication of work, we design the system to automatically generate test papers. It is based on a constantly updated examination question bank system, according to the teachers' demands, which can...
Authentication means preserving the systems and information from unwanted unauthorized access, usage, disclosure, disruption, integration, inspection, modification or destruction of the information. The studies have shown that the text passwords are more vulnerable to shoulder surfing, brute force, and dictionary attacks. The password with images are hard to guess and will provide a more secure way...
This paper present a keystroke dynamics Biometrie system using neural network as its classifier to recognize an individual. Biometric scheme are being widely used as their security merits over the earlier authentication system based on their history, that is the records were easily lost, guessed or forget. Biometric is more complex than password and is unique for each individual. Keystroke dynamics,...
Nowadays the most used applications are the web based applications, for instance long range informal communication, shopping, e-learning, banking and social networking are all an examples of web based applications. It is commonly known that these Web applications are publicly available for all users around the world. This leads us to new challenges in securing these applications and exposing them...
With the development of network technology, the design of the automatic generative system of examination papers that is based on the web has become a trend. In order to reduce the burden on teachers and avoid duplication of work, we design the system to automatically generate test papers. It is based on a constantly updated examination question bank system, according to the teachers' demands, which...
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and other related technologies; but it also comes with its...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.