Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
12,993
result(s) for
"authentication"
Sort by:
Recent Advances in Counterfeit Art, Document, Photo, Hologram, and Currency Detection Using Hyperspectral Imaging
by
Tsao, Yu-Ming
,
Lin, Fen-Chi
,
Wang, Hsiang-Chen
in
Accuracy
,
Algorithms
,
artwork authentication
2022
Forgery and tampering continue to provide unnecessary economic burdens. Although new anti-forgery and counterfeiting technologies arise, they inadvertently lead to the sophistication of forgery techniques over time, to a point where detection is no longer viable without technological aid. Among the various optical techniques, one of the recently used techniques to detect counterfeit products is HSI, which captures a range of electromagnetic data. To aid in the further exploration and eventual application of the technique, this study categorizes and summarizes existing related studies on hyperspectral imaging and creates a mini meta-analysis of this stream of literature. The literature review has been classified based on the product HSI has used in counterfeit documents, photos, holograms, artwork, and currency detection.
Journal Article
Warhol after Warhol
by
Dorment, Richard, author
in
Warhol, Andy, 1928-1987 Appreciation.
,
Simon, Joe Art collections.
,
Andy Warhol Art Authentication Board.
2023
Many years ago, Richard Dorment was approached by Joe Simon, a wealthy American art collector, deeply unhappy that his Warhols had been pronounced as fakes by the mysterious Warhol Authentication Board. Dorment explained to Simon that whatever the rights and wrongs of his case, as neither scholar, auctioneer or gallerist, Dorment could be of no use to him. But Simon would not give up and eventually Dorment agreed to meet with him. To his surprise, Dorment was intrigued both by Simon and the story he had to tell; over the ensuing years, he found himself drawn into a complex story of intrigue and corruption that raised fascinating issues about art, its value, the significance of attribution and how issues of aesthetics and financial worth interact and collide.
A New Quantum Multiparty Simultaneous Identity Authentication Protocol with the Classical Third-Party
by
Li, Xiang
,
Zhao, Xu
,
Zhang, Long
in
Atoms & subatomic particles
,
Authentication
,
Authentication protocols
2022
To guarantee information security in communication, quantum identity authentication plays a key role in politics, economy, finance, daily life and other fields. In this paper, a new quantum multiparty simultaneous identity authentication protocol with Greenberger–Home–Zeilinger (GHZ) state is presented. In this protocol, the authenticator and the certified parties are the participants with quantum ability, whereas the third party is a classical participant. Here, the third-party is honest and the other two parties may be dishonest. With the help of a classical third-party, a quantum authenticator and the multiple certified parties can implement two-way identity authentication at the same time. It reduces the quantum burden of participants and lowers down the trustworthiness, which makes the protocol be feasible in practice. Through further security analysis, the protocol can effectively prevent an illegal dishonest participant from obtaining a legitimate identity. It shows that the protocol is against impersonation attack, intercept-measure-resend attack and entangle-measure attack, etc. In all, the paper provides positive efforts for the subsequent security identity authentication in quantum network.
Journal Article
Lightweight Hash-Based Authentication Protocol for Smart Grids
by
Lee, Youngsook
,
Won, Dongho
,
Kook, Sangjin
in
Authentication protocols
,
Communication
,
Confidentiality
2024
Smart grids integrate information and communications technology into the processes of electricity production, transportation, and consumption, thereby enabling interactions between power suppliers and consumers to increase the efficiency of the power grid. To achieve this, smart meters (SMs) are installed in households or buildings to measure electricity usage and allow power suppliers or consumers to monitor and manage it in real time. However, SMs require a secure service to address malicious attacks during memory protection and communication processes and a lightweight communication protocol suitable for devices with computational and communication constraints. This paper proposes an authentication protocol based on a one-way hash function to address these issues. This protocol includes message authentication functions to address message tampering and uses a changing encryption key for secure communication during each transmission. The security and performance analysis of this protocol shows that it can address existing attacks and provides 105,281.67% better computational efficiency than previous methods.
Journal Article
A Coherent and Privacy-Protecting Biometric Authentication Strategy in Cloud Computing
by
Korra, Seena Naik
,
Yadav, Bonthala Prabhanjan
,
Prasad, Ch. Shiva Sai
in
Authentication
,
Biometrics
,
Cloud computing
2020
The Biometric authentication has become progressively more desired in current years. With this expansion of cloud computing, database holders be influenced to expand this extensive volume of biometric information & detection operations to CLOUD for eradicate of this high-priced storage and result overheads, is still conveys possible dangers to users' seclusion. In this document, we recommend an well-organized, well planned and confidentiality-protecting biometric classification strategy. Particularly, biometric information was encrypted & farmed out for Cloud database. For complete a biometric confirmation, server holder encrypts the inquiry information and proposes that to cloud. The Cloud implements recognition tasks on the encrypted server and sends this conclusion to the server holder. The systematic protection assessment specifies the recommended system is protected still if attackers can fake detection appeals and conspire through the cloud. Evaluated with previous protocols, investigational and new outcomes prove the recommended strategy accomplishes enhanced performance in both preparation and discovery measures.
Journal Article
A Blockchain-Based Multi-Factor Authentication Model for a Cloud-Enabled Internet of Vehicles
by
Awaysheh, Feras M.
,
Ikuesan, Richard A.
,
Alawadi, Sadi A.
in
Access control
,
Access control mechanism
,
Authentication
2021
Continuous and emerging advances in Information and Communication Technology (ICT) have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines and Edge Intelligence-based architectures. Advanced vehicular networks greatly benefit from these architectures due to the implicit functionalities that are focused on realizing the Internet of Vehicle (IoV) vision. However, IoV is susceptible to attacks, where adversaries can easily exploit existing vulnerabilities. Several attacks may succeed due to inadequate or ineffective authentication techniques. Hence, there is a timely need for hardening the authentication process through cutting-edge access control mechanisms. This paper proposes a Blockchain-based Multi-Factor authentication model that uses an embedded Digital Signature (MFBC_eDS) for vehicular clouds and Cloud-enabled IoV. Our proposed MFBC_eDS model consists of a scheme that integrates the Security Assertion Mark-up Language (SAML) to the Single Sign-On (SSO) capabilities for a connected edge to cloud ecosystem. MFBC_eDS draws an essential comparison with the baseline authentication scheme suggested by Karla and Sood. Based on the foundations of Karla and Sood’s scheme, an embedded Probabilistic Polynomial-Time Algorithm (ePPTA) and an additional Hash function for the Pi generated during Karla and Sood’s authentication were proposed and discussed. The preliminary analysis of the proposition shows that the approach is more suitable to counter major adversarial attacks in an IoV-centered environment based on the Dolev–Yao adversarial model while satisfying aspects of the Confidentiality, Integrity, and Availability (CIA) triad.
Journal Article
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
by
Won, Dongho
,
Choi, Younsung
,
Lee, Donghoon
in
Algorithms
,
Authentication
,
authentication protocol
2014
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.
Journal Article
A security algorithm based on SM9 for interdomain communication
2024
In interdomain communication, confirming member identity and ensuring security is critical, yet identity forgery remains a challenge. Traditional solutions rely on a Certification Authority (CA) to issue authentication certificates and create a trust chain for identity verification. However, different security domains often have incompatible signature mechanisms, complicating certificate management and authentication. We propose a novel ring signature algorithm based on SM9 to address these issues. This algorithm enables member authentication across different domains, ensuring security irrespective of signature mechanisms and certificate versions. With ring signatures, members can authenticate their identities without revealing them to the CA, reducing certificate management burdens and enhancing system flexibility and compatibility. We provide algorithm correctness proofs and conduct security analyses to support practical implementation for identity authentication and communication security.
Journal Article
Innovative passwordless authentication approaches in IoT identity management
2025
A global ecosystem of networked sensors, actuators, and other devices intended for data exchange and interaction is known as the Internet of Things (IoT). Password-based authentication has been a major component of [oT solutions historically, despite its numerous flaws. This survey article provides a thorough analysis of the literature with an emphasis on the implementation of authentication without the use of passwords on the Internet of Things. Ensuring that authorized persons have the correct access to related IT incomes under the correct situations is the core necessity behind enterprise IoT security. Identity managing, the first line of protection in initiative security, is a key component of this project. Traditional passwordbased authentication systems are frequently regarded as \"high friction,\" causing users' problems and lengthy procedures in addition to being vulnerable to different security threats. IoT businesses are investigating password less authentication techniques more frequently in an effort to improve user productivity while preserving strong security assurance in response to these difficulties. A comprehensive analysis of password less authentication mechanisms designed for the Internet of Things is presented in this article.
Journal Article