دانلود و نمایش مقالات مرتبط با authentication::صفحه 2
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - authentication

تعداد مقالات یافته شده: 209
ردیف عنوان نوع
11 A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications
مرور طرح‌های امضای کلید عمومی پسا کوانتومی برای ارتباطات امن خودرو-2022
Basic security requirements such as confidentiality, user authentication and data integrity, are assured by using public-key cryptography (PKC). In particular, public-key signature schemes provide non-repudiation, integrity of transmitted messages and authentication. The presence of a large scale quantum computer would be a real threat to break the most widely used public-key cryptographic algorithms in practice, RSA, DSA, ECDSA signature schemes and Diffie-Hellman key exchange. Thus, all security protocols and applications where these public-key cryptographic algorithms are used are vulnerable to quantum-computer attacks. There are five directions of cryptographic primitives secure against a quantum computer: multivariate quadratic equation-based, hash-based, lattice-based, code-based and supersingular isogeny-based cryptography. These primitives could serve as replacements for current public-key cryptographic algorithms to prepare for post-quantum era. It is important to prioritize the fields to be replaced by post-quantum cryptography (PQC) since it is hard to replace the currently deployed PKC with PQC at the same time. The fields directly connected to human life such as vehicular communications should be the primary targets of PQC applications. This survey is dedicated to providing guidelines for adapting the most suitable post-quantum candidates to the requirements of various devices and suggesting efficient and physically secure implementations that can be built into existing embedded applications as easily as traditional PKC. It focuses on the five types of post-quantum signature schemes and investigates their theoretical backgrounds, structures, state-of-the-art constructions and implementation aspects on various platforms raging from resource constrained IoT devices to powerful servers connected to the devices for secure communications in post-quantum era. It offers appropriate solutions to find tradeoffs between key sizes, signature lengths, performance, and security for practical applications.
Index Terms— Implementation attack | post-quantum cryptography | public-key signature scheme | quantum algorithm | Shor algorithm | side-channel attack.
مقاله انگلیسی
12 Adaptive Management of Multimodal Biometrics—A Deep Learning and Metaheuristic Approach
مدیریت تطبیقی بیومتریک چند حالته - یادگیری عمیق و رویکرد فرا مکاشفه ای-2021
This paper introduces the framework for adaptive rank-level biometric fusion: a new approach towards personal authentication. In this work, a novel attempt has been made to identify the optimal design parameters and framework of a multibiometric system, where the chosen biometric traits are subjected to rank-level fusion. Optimal fusion parameters depend upon the security level demanded by a particular biometric application. The proposed framework makes use of a metaheuristic approach towards adaptive fusion in the pursuit of achieving optimal fusion results at varying levels of security. Rank-level fusion rules have been employed to provide optimum performance by making use of Ant Colony Optimization technique. The novelty of the reported work also lies in the fact that the proposed design engages three biometric traits simultaneously for the first time in the domain of adaptive fusion, so as to test the efficacy of the system in selecting the optimal set of biometric traits from a given set. Literature reveals the unique biometric characteristics of the fingernail plate, which have been exploited in this work for the rigorous experimentation conducted. Index, middle and ring fingernail plates have been taken into consideration, and deep learning feature-sets of the three nail plates have been extracted using three customized pre-trained models, AlexNet, ResNet-18 and DenseNet-201. The adaptive multimodal performance of the three nail plates has also been checked using the already existing methods of adaptive fusion designed for addressing fusion at the score-level and decision- level. Exhaustive experiments have been conducted on the MATLAB R2019a platform using the Deep Learning Toolbox. When the cost of false acceptance is 1.9, experimental results obtained from the proposed framework give values of the average of the minimum weighted error rate as low as 0.0115, 0.0097 and 0.0101 for the AlexNet, ResNet-18 and DenseNet-201 based experiments respectively. Results demonstrate that the proposed system is capable of computing the optimal parameters for rank-level fusion for varying security levels, thus contributing towards optimal performance accuracy.© 2021 Elsevier B.V. All rights reserved.
Keywords: Adaptive Biometric Fusion | Ant Colony Optimization | Deep Learning | Fingernail Plate | Multimodal Biometrics | Rank-level Adaptive Fusion
مقاله انگلیسی
13 Trustworthy authorization method for security in Industrial Internet of Things
روش مجوز معتبر برای امنیت در اینترنت اشیا صنعتی-2021
Industrial Internet of Things (IIoT) realizes machine-to-machine communication and human–computer inter- action (HCI) through communication network, which makes industrial production automatic and intelligent. Security is critical in IIoT because of the interconnection of intelligent industrial equipment. In IIoT environment, legitimate human–computer interaction can only be performed by authorized professionals, and unauthorized access is not tolerated. In this paper, a reliable authentication method based on biological information is proposed. Specifically, the complete local binary pattern (CLPB) and the statistical local binary pattern (SLPB) are introduced to describe the local vein texture characteristics. Meanwhile, the contrast energy and frequency domain information are regarded as auxiliary information to interpret the finger vein. The distance between the features of the registration image and the test image is used to recognize the finger vein image, so as to realize identity authentication. The experiments are carried out on SDUMLA-FV database and FV-USM database, and results show that the presented method has achieved high recognition accuracy.
Keywords: Industrial Internet of Things (IIoT) | Human–computer interaction (HCI) | Biometric recognition | Comprehensive texture | Security system
مقاله انگلیسی
14 Efficient biometric-based identity management on the Blockchain for smart industrial applications
مدیریت هویت مبتنی بر بیومتریک کارآمد در Blockchain برای کاربردهای صنعتی هوشمند-2021
In this work, we propose a new Blockchain-based Identity Management system for smart industry. First, we describe an efficient biometric-based anonymous credential scheme, which supports selective disclosure, suspension/thaw and revocation of credentials/entities. Our system provides non-transferability through a freshly computed hidden biometric attribute, which is generated using a secure fuzzy extractor during each authentication. This mechanism combined with offchain storage guarantees GDPR compliance, which is required for protecting user’s data. We define blinded (Brands) DLRep scheme to provide multi-show unlinkability, which is a lacking feature in Brands’ credential based systems. For larger organizations, we re-design the system by replacing the Merkle Tree with an accumulator to improve scalability. The new system enables auditing by adapting the standard Industrial IoT (IIoT) Identity Management Lifecycle to Blockchain. Finally, we show that the new proposal outperforms BASS, i.e. the most recent blockchain-based anonymous credential scheme designed for smart industry. The computational cost at the user-side (can be a weak IoT device) of our scheme is 8-times less than that of BASS. Thus, our system is more suitable for IIoT.© 2020 Elsevier B.V. All rights reserved.
Keywords: Identity management | Smart industry | Blockchain | Non-transferability | Biometrics | DLRep | Multi-show unlinkability | Selective disclosure | Accumulators
مقاله انگلیسی
15 Open code biometric tap pad for smartphones
باز کردن کد ضربه گیر بیومتریک برای تلفن های هوشمند-2021
Poor security practices among smartphone users, such as the use of simple, easily guessed passcodes for logins, are a result of the effort required to memorize stronger ones. In this paper, we devise a concept of ‘‘open code’’ biometric tap pad to authenticate smartphone users, which eliminates the need of memorizing secret codes. A biometric tap pad consists of a grid of buttons each labeled with a unique digit. The user attempting to log into the phone will tap these buttons in a given sequence. He/she will not memorize this tap sequence. Instead, the sequence will be displayed on the screen. The focus here is how the user types the sequence. This typing behavior is used for authentication. An open code biometric tap pad has several advantages, such as(1) users do not need to memorize passcodes, (2) manufacturers do not need to include extra sensors, and (3) onlookers have no chance to practice shoulder-surfing. We designed three tap pads and incorporated them into an Android app. We evaluated the performance of these tap pads by experimenting with three sequence styles and five different fingers: two thumbs, two index fingers, and the ‘‘usual’’ finger. We collected data from 33 participants over two weeks. We tested three machine learning algorithms: Support Vector Machine, Artificial Neural Network, and Random Forest. Experimental results show significant promise of open code biometric tap pads as a solution to the problem of weak smartphone security practices used by a large segment of the population.
Keywords: Smartphone security | Behavioral biometrics | Touchscreen behavior | Open code | Biometric tap pad
مقاله انگلیسی
16 Lossless fuzzy extractor enabled secure authentication using low entropy noisy sources
استخراج کننده فازی بدون تلفات ، احراز هویت ایمن را با استفاده از منابع پر سر و صدا کم آنتروپی فعال کرد-2021
Fuzzy extractor provides a way for key generation from biometrics and other noisy data. It has been widely applied in biometric authentication systems that provides natural and passwordless user authentication. In general, given a random sample, a fuzzy extractor extracts a nearly uniform random string, and subsequently regenerates the string using a different yet similar noisy sample. However, due to error tolerance between the two samples, fuzzy extractor imposes high information loss (entropy) and thus, it only works for an input with high enough entropy. In this work, we propose a lossless fuzzy extractor for a large family of sources. The proposed lossless fuzzy extractor can be adopted for a wider range of random sources to extract an arbitrary number of nearly uniform random strings. Besides, we formally defined a new entropy measurement, named as equal error entropy, to measure the entropy loss in reproducing a bounded number of random strings. When the number of random strings is large enough, the equal error entropy is minimized and necessary for performance evaluation on the authentication using the extracted random strings.
Keywords: Authentication | Biometric | Fuzzy extractor | Secure sketch
مقاله انگلیسی
17 A cancelable biometric authentication system based on feature-adaptive random projection
یک سیستم احراز هویت بیومتریک قابل لغو بر اساس طرح تصادفی سازگار با ویژگی-2021
Biometric template data protection is critical in preventing user privacy and identity from leakage. Random projection based cancelable biometrics is an efficient and effective technique to achieve biometric template protection. However, traditional random projection based cancelable template design suffers from the attack via record multiplicity (ARM), where an adversary obtains multiple transformed templates from different applica- tions and the associated parameter keys so as to assemble them into a full-rank linear equation system, thereby retrieving the original feature vector. To address this issue, in this paper we propose a feature-adaptive random projection based method, in which the projection matrixes, the key to the ARM, are generated from one basic matrix in conjunction with local feature slots. The generated projection matrixes are discarded after use, thus making it difficult for the adversary to launch the ARM. Moreover, the random projection in the proposed method is performed on a local-feature basis. This feature-adaptive random projection can mitigate the negative impact of biometric uncertainty on recognition accuracy, as it limits the error to part of the transformed feature vector rather than the entire vector. The proposed method is evaluated on four public available databases FVC2002 DB1-DB3 and FVC2004 DB2. The experimental results and security analysis show the validity of the proposed method.
Keywords: Biometric authentication | Template protection | Random projection | Cancelable biometrics
مقاله انگلیسی
18 Deep belief network-based hybrid model for multimodal biometric system for futuristic security applications
مدل ترکیبی مبتنی بر باور عمیق برای سیستم بیومتریک چند حالته برای برنامه های امنیتی آینده-2021
Biometrics is the technology to identify humans uniquely based on face, iris, and fingerprints, etc. Biometric authentication allows the person recognition automatically on the basis of behavioral or physiological charac- teristics. Biometrics are broadly employed in several commercial as well as the official identification systems for automatic access control. This paper introduces the model for multimodal biometric recognition based on score level fusion method. The overall procedure of the proposed method involves five steps, such as pre-processing, feature extraction, recognition score using Multi- support vector neural network (Multi-SVNN) for all traits, score level fusion, and recognition using deep belief neural network (DBN). The first step is to input the training images into pre-processing steps. Thus, the pre-processing of three traits, like iris, ear, and finger vein is done. Then, the feature extraction is done for each modality to extract the features. After that, the texture features are extracted from pre-processed images of the ear, iris, and finger vein, and the BiComp features are acquired from individual images using a BiComp mask. Then, the recognition score is computed based on the Multi-SVNN classifier to provide the score individually for all three traits, and the three scores are provided to the DBN. The DBN is trained using the chicken earthworm optimization algorithm (CEWA). The CEWA is the integration of the chicken swarm optimization (CSO), and earthworm optimization algorithm (EWA) for the optimal authentication of the person. The analysis proves that the developed method acquired a maximal accuracy of 95.36%, maximal sensitivity of 95.85%, and specificity of 98.79%, respectively.
Keywords: Multi-modal Bio-metric system | Chicken Swarm Optimization | Earthworm Optimization algorithm | Deep Belief Network | Multi-SVNN
مقاله انگلیسی
19 An efficient biometric-based continuous authentication scheme with HMM prehensile movements modeling
یک طرح احراز هویت مداوم مبتنی بر بیومتریک با مدل سازی حرکات پیش ساخته HMM-2021
Biometric is an emerging technique for user authentication thanks to its efficiency compared to the traditional methods, such as passwords and access-cards. However, most existing biometric authentication systems require the cooperation of users and provide only a login time authentication. To address these drawbacks, we propose in this paper a new, efficient continuous authentication scheme based on the newly biometric trait that still under development: prehensile movements. In this work, we model the movements through Hidden Markov Model-Universal Background Model (HMM-UBM) with continuous observations based on Gaussian Mixture Model (GMM). Unlike the literature, the gravity signal is included. The results of the experiments conducted on a public database HMOG and on a proprietary database, collected under uncontrolled conditions, have shown that prehensile movements are very promising. This new biometric feature will allow users to be authenticated continuously, passively and in real time.
Keywords: Biometric | Authentication | Prehensile movement | HMM-UBM | GMM
مقاله انگلیسی
20 Provably secure biometric-based client–server secure communication over unreliable networks
ارتباطات امن مشتری و سرور مبتنی بر بیومتریک به طور قابل اطمینان در شبکه های غیرقابل اعتماد-2021
Due to rapid advancement in internet technologies, remote client access has become much more comfortable than in previous days. The responsibility of the system does not limit even after providing access to resources. In every system, there is a possibility that an adversary may use the resources of the system without prior authentication. This will create interruption, and the clients of the system will ultimately be affected, so the system must provide some authentication mechanism. Therefore, an authentication scheme needs to be introduced, which provides security against different attacks. Consequently, in this article, we propose a reliable and secure three factor authentication scheme that prevents various security attacks. The provable security of the proposed scheme is proved through a widely used random oracle model. We implemented the cryptographic operations of proposed and related schemes on a desktop system having good specifications to get the experimental results. Moreover, the presented scheme is compared with the existing schemes to compare its performance. The performance evaluation shows that our scheme is lightweight and efficient in terms of computation and communication costs as compared to related competing schemes.
Keywords: Anonymity | Authentication | Impersonation attack | Session key | Smartcard
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 3612 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 3612 :::::::: افراد آنلاین: 68