Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
13,739 result(s) for "Authentication"
Sort by:
Recent Advances in Counterfeit Art, Document, Photo, Hologram, and Currency Detection Using Hyperspectral Imaging
Forgery and tampering continue to provide unnecessary economic burdens. Although new anti-forgery and counterfeiting technologies arise, they inadvertently lead to the sophistication of forgery techniques over time, to a point where detection is no longer viable without technological aid. Among the various optical techniques, one of the recently used techniques to detect counterfeit products is HSI, which captures a range of electromagnetic data. To aid in the further exploration and eventual application of the technique, this study categorizes and summarizes existing related studies on hyperspectral imaging and creates a mini meta-analysis of this stream of literature. The literature review has been classified based on the product HSI has used in counterfeit documents, photos, holograms, artwork, and currency detection.
Warhol after Warhol
Many years ago, Richard Dorment was approached by Joe Simon, a wealthy American art collector, deeply unhappy that his Warhols had been pronounced as fakes by the mysterious Warhol Authentication Board. Dorment explained to Simon that whatever the rights and wrongs of his case, as neither scholar, auctioneer or gallerist, Dorment could be of no use to him. But Simon would not give up and eventually Dorment agreed to meet with him. To his surprise, Dorment was intrigued both by Simon and the story he had to tell; over the ensuing years, he found himself drawn into a complex story of intrigue and corruption that raised fascinating issues about art, its value, the significance of attribution and how issues of aesthetics and financial worth interact and collide.
A New Quantum Multiparty Simultaneous Identity Authentication Protocol with the Classical Third-Party
To guarantee information security in communication, quantum identity authentication plays a key role in politics, economy, finance, daily life and other fields. In this paper, a new quantum multiparty simultaneous identity authentication protocol with Greenberger–Home–Zeilinger (GHZ) state is presented. In this protocol, the authenticator and the certified parties are the participants with quantum ability, whereas the third party is a classical participant. Here, the third-party is honest and the other two parties may be dishonest. With the help of a classical third-party, a quantum authenticator and the multiple certified parties can implement two-way identity authentication at the same time. It reduces the quantum burden of participants and lowers down the trustworthiness, which makes the protocol be feasible in practice. Through further security analysis, the protocol can effectively prevent an illegal dishonest participant from obtaining a legitimate identity. It shows that the protocol is against impersonation attack, intercept-measure-resend attack and entangle-measure attack, etc. In all, the paper provides positive efforts for the subsequent security identity authentication in quantum network.
A Blockchain-Based Multi-Factor Authentication Model for a Cloud-Enabled Internet of Vehicles
Continuous and emerging advances in Information and Communication Technology (ICT) have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines and Edge Intelligence-based architectures. Advanced vehicular networks greatly benefit from these architectures due to the implicit functionalities that are focused on realizing the Internet of Vehicle (IoV) vision. However, IoV is susceptible to attacks, where adversaries can easily exploit existing vulnerabilities. Several attacks may succeed due to inadequate or ineffective authentication techniques. Hence, there is a timely need for hardening the authentication process through cutting-edge access control mechanisms. This paper proposes a Blockchain-based Multi-Factor authentication model that uses an embedded Digital Signature (MFBC_eDS) for vehicular clouds and Cloud-enabled IoV. Our proposed MFBC_eDS model consists of a scheme that integrates the Security Assertion Mark-up Language (SAML) to the Single Sign-On (SSO) capabilities for a connected edge to cloud ecosystem. MFBC_eDS draws an essential comparison with the baseline authentication scheme suggested by Karla and Sood. Based on the foundations of Karla and Sood’s scheme, an embedded Probabilistic Polynomial-Time Algorithm (ePPTA) and an additional Hash function for the Pi generated during Karla and Sood’s authentication were proposed and discussed. The preliminary analysis of the proposition shows that the approach is more suitable to counter major adversarial attacks in an IoV-centered environment based on the Dolev–Yao adversarial model while satisfying aspects of the Confidentiality, Integrity, and Availability (CIA) triad.
Lightweight Hash-Based Authentication Protocol for Smart Grids
Smart grids integrate information and communications technology into the processes of electricity production, transportation, and consumption, thereby enabling interactions between power suppliers and consumers to increase the efficiency of the power grid. To achieve this, smart meters (SMs) are installed in households or buildings to measure electricity usage and allow power suppliers or consumers to monitor and manage it in real time. However, SMs require a secure service to address malicious attacks during memory protection and communication processes and a lightweight communication protocol suitable for devices with computational and communication constraints. This paper proposes an authentication protocol based on a one-way hash function to address these issues. This protocol includes message authentication functions to address message tampering and uses a changing encryption key for secure communication during each transmission. The security and performance analysis of this protocol shows that it can address existing attacks and provides 105,281.67% better computational efficiency than previous methods.
Integrated Authentication Server Design for Efficient Kerberos–Blockchain VANET Authentication
Vehicular Ad Hoc Network (VANET) is a fundamental component of the intelligent transportation systems (ITS), providing critical road information to users. However, the volatility of VANETs creates significant vulnerabilities from malicious actors. Thus, verifying joining entities is crucial to maintaining the VANET’s communication security. Authentication delays must stay below 100 ms to meet VANET requirements, posing a major challenge for security. Our previous research introduced a Kerberos–Blockchain (KBC) authentication system that contains two main components separately: Authentication Server (AS) and Ticket Granting Server (TGS). However, this KBC architecture required an additional server to accommodate increasing vehicle volumes in urban environments, leading to higher infrastructure costs. This paper presents an integrated authentication server that merges AS and TGS into a Combined Server (CBS) while retaining blockchain security. We evaluate it using OMNeT++ with SUMO for traffic simulation and Ganache for blockchain implementation. Results show that CBS removes the need for an extra server while keeping authentication delays under 100 ms. It also improves throughput by 104% and reduces signaling overhead by 45% compared to KBC. By optimizing authentication without compromising security, the integrated server greatly enhances the cost-effectiveness and efficiency of VANET systems.
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.
A security algorithm based on SM9 for interdomain communication
In interdomain communication, confirming member identity and ensuring security is critical, yet identity forgery remains a challenge. Traditional solutions rely on a Certification Authority (CA) to issue authentication certificates and create a trust chain for identity verification. However, different security domains often have incompatible signature mechanisms, complicating certificate management and authentication. We propose a novel ring signature algorithm based on SM9 to address these issues. This algorithm enables member authentication across different domains, ensuring security irrespective of signature mechanisms and certificate versions. With ring signatures, members can authenticate their identities without revealing them to the CA, reducing certificate management burdens and enhancing system flexibility and compatibility. We provide algorithm correctness proofs and conduct security analyses to support practical implementation for identity authentication and communication security.
Innovative passwordless authentication approaches in IoT identity management
A global ecosystem of networked sensors, actuators, and other devices intended for data exchange and interaction is known as the Internet of Things (IoT). Password-based authentication has been a major component of [oT solutions historically, despite its numerous flaws. This survey article provides a thorough analysis of the literature with an emphasis on the implementation of authentication without the use of passwords on the Internet of Things. Ensuring that authorized persons have the correct access to related IT incomes under the correct situations is the core necessity behind enterprise IoT security. Identity managing, the first line of protection in initiative security, is a key component of this project. Traditional passwordbased authentication systems are frequently regarded as \"high friction,\" causing users' problems and lengthy procedures in addition to being vulnerable to different security threats. IoT businesses are investigating password less authentication techniques more frequently in an effort to improve user productivity while preserving strong security assurance in response to these difficulties. A comprehensive analysis of password less authentication mechanisms designed for the Internet of Things is presented in this article.