Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
13,739
result(s) for
"Authentication"
Sort by:
Recent Advances in Counterfeit Art, Document, Photo, Hologram, and Currency Detection Using Hyperspectral Imaging
by
Tsao, Yu-Ming
,
Lin, Fen-Chi
,
Wang, Hsiang-Chen
in
Accuracy
,
Algorithms
,
artwork authentication
2022
Forgery and tampering continue to provide unnecessary economic burdens. Although new anti-forgery and counterfeiting technologies arise, they inadvertently lead to the sophistication of forgery techniques over time, to a point where detection is no longer viable without technological aid. Among the various optical techniques, one of the recently used techniques to detect counterfeit products is HSI, which captures a range of electromagnetic data. To aid in the further exploration and eventual application of the technique, this study categorizes and summarizes existing related studies on hyperspectral imaging and creates a mini meta-analysis of this stream of literature. The literature review has been classified based on the product HSI has used in counterfeit documents, photos, holograms, artwork, and currency detection.
Journal Article
Warhol after Warhol
by
Dorment, Richard, author
in
Warhol, Andy, 1928-1987 Appreciation.
,
Simon, Joe Art collections.
,
Andy Warhol Art Authentication Board.
2023
Many years ago, Richard Dorment was approached by Joe Simon, a wealthy American art collector, deeply unhappy that his Warhols had been pronounced as fakes by the mysterious Warhol Authentication Board. Dorment explained to Simon that whatever the rights and wrongs of his case, as neither scholar, auctioneer or gallerist, Dorment could be of no use to him. But Simon would not give up and eventually Dorment agreed to meet with him. To his surprise, Dorment was intrigued both by Simon and the story he had to tell; over the ensuing years, he found himself drawn into a complex story of intrigue and corruption that raised fascinating issues about art, its value, the significance of attribution and how issues of aesthetics and financial worth interact and collide.
A New Quantum Multiparty Simultaneous Identity Authentication Protocol with the Classical Third-Party
by
Li, Xiang
,
Zhao, Xu
,
Zhang, Long
in
Atoms & subatomic particles
,
Authentication
,
Authentication protocols
2022
To guarantee information security in communication, quantum identity authentication plays a key role in politics, economy, finance, daily life and other fields. In this paper, a new quantum multiparty simultaneous identity authentication protocol with Greenberger–Home–Zeilinger (GHZ) state is presented. In this protocol, the authenticator and the certified parties are the participants with quantum ability, whereas the third party is a classical participant. Here, the third-party is honest and the other two parties may be dishonest. With the help of a classical third-party, a quantum authenticator and the multiple certified parties can implement two-way identity authentication at the same time. It reduces the quantum burden of participants and lowers down the trustworthiness, which makes the protocol be feasible in practice. Through further security analysis, the protocol can effectively prevent an illegal dishonest participant from obtaining a legitimate identity. It shows that the protocol is against impersonation attack, intercept-measure-resend attack and entangle-measure attack, etc. In all, the paper provides positive efforts for the subsequent security identity authentication in quantum network.
Journal Article
A Blockchain-Based Multi-Factor Authentication Model for a Cloud-Enabled Internet of Vehicles
by
Awaysheh, Feras M.
,
Ikuesan, Richard A.
,
Alawadi, Sadi A.
in
Access control
,
Access control mechanism
,
Authentication
2021
Continuous and emerging advances in Information and Communication Technology (ICT) have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines and Edge Intelligence-based architectures. Advanced vehicular networks greatly benefit from these architectures due to the implicit functionalities that are focused on realizing the Internet of Vehicle (IoV) vision. However, IoV is susceptible to attacks, where adversaries can easily exploit existing vulnerabilities. Several attacks may succeed due to inadequate or ineffective authentication techniques. Hence, there is a timely need for hardening the authentication process through cutting-edge access control mechanisms. This paper proposes a Blockchain-based Multi-Factor authentication model that uses an embedded Digital Signature (MFBC_eDS) for vehicular clouds and Cloud-enabled IoV. Our proposed MFBC_eDS model consists of a scheme that integrates the Security Assertion Mark-up Language (SAML) to the Single Sign-On (SSO) capabilities for a connected edge to cloud ecosystem. MFBC_eDS draws an essential comparison with the baseline authentication scheme suggested by Karla and Sood. Based on the foundations of Karla and Sood’s scheme, an embedded Probabilistic Polynomial-Time Algorithm (ePPTA) and an additional Hash function for the Pi generated during Karla and Sood’s authentication were proposed and discussed. The preliminary analysis of the proposition shows that the approach is more suitable to counter major adversarial attacks in an IoV-centered environment based on the Dolev–Yao adversarial model while satisfying aspects of the Confidentiality, Integrity, and Availability (CIA) triad.
Journal Article
Lightweight Hash-Based Authentication Protocol for Smart Grids
by
Lee, Youngsook
,
Won, Dongho
,
Kook, Sangjin
in
Authentication protocols
,
Communication
,
Confidentiality
2024
Smart grids integrate information and communications technology into the processes of electricity production, transportation, and consumption, thereby enabling interactions between power suppliers and consumers to increase the efficiency of the power grid. To achieve this, smart meters (SMs) are installed in households or buildings to measure electricity usage and allow power suppliers or consumers to monitor and manage it in real time. However, SMs require a secure service to address malicious attacks during memory protection and communication processes and a lightweight communication protocol suitable for devices with computational and communication constraints. This paper proposes an authentication protocol based on a one-way hash function to address these issues. This protocol includes message authentication functions to address message tampering and uses a changing encryption key for secure communication during each transmission. The security and performance analysis of this protocol shows that it can address existing attacks and provides 105,281.67% better computational efficiency than previous methods.
Journal Article
Integrated Authentication Server Design for Efficient Kerberos–Blockchain VANET Authentication
by
Rahayu, Maya
,
Huda, Samsul
,
Hossain, Md. Biplob
in
Access control
,
Ad hoc networks (Computer networks)
,
Authentication
2025
Vehicular Ad Hoc Network (VANET) is a fundamental component of the intelligent transportation systems (ITS), providing critical road information to users. However, the volatility of VANETs creates significant vulnerabilities from malicious actors. Thus, verifying joining entities is crucial to maintaining the VANET’s communication security. Authentication delays must stay below 100 ms to meet VANET requirements, posing a major challenge for security. Our previous research introduced a Kerberos–Blockchain (KBC) authentication system that contains two main components separately: Authentication Server (AS) and Ticket Granting Server (TGS). However, this KBC architecture required an additional server to accommodate increasing vehicle volumes in urban environments, leading to higher infrastructure costs. This paper presents an integrated authentication server that merges AS and TGS into a Combined Server (CBS) while retaining blockchain security. We evaluate it using OMNeT++ with SUMO for traffic simulation and Ganache for blockchain implementation. Results show that CBS removes the need for an extra server while keeping authentication delays under 100 ms. It also improves throughput by 104% and reduces signaling overhead by 45% compared to KBC. By optimizing authentication without compromising security, the integrated server greatly enhances the cost-effectiveness and efficiency of VANET systems.
Journal Article
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
by
Won, Dongho
,
Choi, Younsung
,
Lee, Donghoon
in
Algorithms
,
Authentication
,
authentication protocol
2014
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.
Journal Article
A security algorithm based on SM9 for interdomain communication
2024
In interdomain communication, confirming member identity and ensuring security is critical, yet identity forgery remains a challenge. Traditional solutions rely on a Certification Authority (CA) to issue authentication certificates and create a trust chain for identity verification. However, different security domains often have incompatible signature mechanisms, complicating certificate management and authentication. We propose a novel ring signature algorithm based on SM9 to address these issues. This algorithm enables member authentication across different domains, ensuring security irrespective of signature mechanisms and certificate versions. With ring signatures, members can authenticate their identities without revealing them to the CA, reducing certificate management burdens and enhancing system flexibility and compatibility. We provide algorithm correctness proofs and conduct security analyses to support practical implementation for identity authentication and communication security.
Journal Article
Innovative passwordless authentication approaches in IoT identity management
2025
A global ecosystem of networked sensors, actuators, and other devices intended for data exchange and interaction is known as the Internet of Things (IoT). Password-based authentication has been a major component of [oT solutions historically, despite its numerous flaws. This survey article provides a thorough analysis of the literature with an emphasis on the implementation of authentication without the use of passwords on the Internet of Things. Ensuring that authorized persons have the correct access to related IT incomes under the correct situations is the core necessity behind enterprise IoT security. Identity managing, the first line of protection in initiative security, is a key component of this project. Traditional passwordbased authentication systems are frequently regarded as \"high friction,\" causing users' problems and lengthy procedures in addition to being vulnerable to different security threats. IoT businesses are investigating password less authentication techniques more frequently in an effort to improve user productivity while preserving strong security assurance in response to these difficulties. A comprehensive analysis of password less authentication mechanisms designed for the Internet of Things is presented in this article.
Journal Article