دانلود و نمایش مقالات مرتبط با authentication::صفحه 3
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - authentication

تعداد مقالات یافته شده: 209
ردیف عنوان نوع
21 ECB2: A novel encryption scheme using face biometrics for signing blockchain transactions
ECB2: یک طرح رمزگذاری جدید با استفاده از بیومتریک چهره برای امضای تراکنش های بلاک چین-2021
Blockchain is the technology on the basis of the recent smart and digital contracts. It ensures at this system the required characteristics to be effectively applied. In this work, we propose a novel encryption scheme specifically built to authorize and sign transactions in digital or smart contracts. The face is used as a biometric key, encoded through the Convolutional Neural Network (CNN), FaceNet. Then, this encoding is fused with an RSA key by using the Hybrid Information Fusion algorithm (BNIF). The results show a combined key that ensures the identity of the user that is executing the transaction by preserving privacy. Experiments reveal that, even in strong heterogeneous acquisition conditions for the biometric trait, the identity of the user is ensured and the contract is properly signed in less than 1.86 s. The proposed ECB2 encryption scheme is also very fast in the user template creation (0.05s) and requires at most four attempts to recognize the user with an accuracy of 94%.
مقاله انگلیسی
22 Secure mobile internet voting system using biometric authentication and wavelet based AES
سیستم رای گیری اینترنتی تلفن همراه با استفاده از احراز هویت بیومتریک و AES مبتنی بر موجک-2021
The number of mobile phone users increases daily, and mobile devices are used for various applications like banking, e-commerce, social media, internet voting, e-mails, etc. This paper presents a secure mobile internet voting system in which a biometric method authenticates the voter. The biometric image can either be encrypted at the mobile device and send to the server or process the biometric image at the mobile device to generate the biometric template and send it to the server. The implementation of biometrics on mobile devices usually requires simplifying the algorithm to adapt to the relatively small CPU processing power and battery charge. This paper proposes a wavelet-based AES algorithm to speed up the encryption process and reduce the mobile device’s CPU utilization. The experimental analysis of three methods(AES encryption, wavelet-based AES encryption, and biometric template generation) exhibits that wavelet-based AES encryption is much better than AES encryption and template generation. The security analysis of three methods shows that AES and wavelet-based AES encryption provides better security than the biometric template’s protection. The study of the proposed internet voting system shows that biometric authentication defeats almost all the mobile-based threats.
Keywords: Internet voting | Fingerprint template | Iris code | AES encryption | Wavelet based AES encryption
مقاله انگلیسی
23 Analysis and enhancement of secure three-factor user authentication using Chebyshev Chaotic Map
تجزیه و تحلیل و افزایش احراز هویت کاربر سه عامل امن با استفاده از نقشه آشفته Chebyshev-2021
The most popular solution for a variety of business applications such as e-banking and e-healthcare is the multi-server environment. The user registration of individual servers is not the primary concern in such an environment. Here, the user can get various services from different servers by registering him/her under one server. To get secure services through this environment, the authenticity of users and servers are crucial. In this observation, the smart card based biometric authentication system is well popular and easy to use. This paper delineates that the security flaws can be found in a trusted authentication scheme proposed by Chatterjee et al. (2018). Besides, this work proposes an enhanced authentication scheme namely, asymmetric encryption based secure user authentication (ASESUA) to eliminate the drawbacks of Chatterjee et al.’s scheme. The formal security analysis of ASESUA has been done with the help of random oracle model and verified by the well popular AVISPA tool. The analysis shows that ASESUA performs better concerning security, communication cost, and computation cost than other related existing schemes.
Keywords: Attack | Authentication | Biometric | Smart card | Security
مقاله انگلیسی
24 An extensive survey on finger and palm vein recognition system
یک بررسی گسترده در مورد سیستم تشخیص ورید انگشت و کف دست-2021
The evolution of the internet drastically increases the utilization of online data, which needs security using unique identification. The traditional methods of security, such as password, personal identification number (PIN), could not reach the user-friendly requirement of the users. There is a necessity to provide high security for the data by using a unique identification system. Today, in many situations, biometrics plays a crucial role in today’s authentication and recognition. Biometrics deals with unique physical and behavioral characteristics. Fingerprint, face recognition, iris/ retinal recognition, voice recognition and vein recognition are some of the biometrics which is used for authentication purpose. In this paper, we highlight different processes that involve finger veins and palm veins recognition and authentication. These finger and palm vein is identified as one of the important unique identifications that can be used for the authentication which provide the security for the important personal data. In this study, we noticed that the advantage of using a vein for the authentication process is that it provides high security because it can be detected even when a finger or palm got injured, and it works only when the person is alive otherwise the authentication fails.© 2021 Elsevier Ltd. All rights reserved. Selection and peer-review under responsibility of the scientific committee of the International Conference on Advances in Materials Research – 2019.
Keywords: Authentication | Biometrics | Finger recognition | Palm vein recognition | Personal identification number
مقاله انگلیسی
25 An efficient biometric based authenticated geographic opportunistic routing for IoT applications using secure wireless sensor network
یک مسیریابی فرصت طلبانه جغرافیایی معتبر مبتنی بر بیومتریک برای برنامه های IoT با استفاده از شبکه حسگر بی سیم امن-2021
The applications of Wireless Sensor Networks (WSNs) are been broadly utilized in the field of Internet of Things (IoT) under communication framework. Notwithstanding services gave by the WSNs, numerous IoT-related applications necessitate reliable and secure delivery of data over unsteady remote connec tions. In-order to ensure secure and reliable delivery of data, many existing paper works accomplish authentication based routing algorithms with numerous forwarders within the Wireless Sensor Networks. Be that as it may; these types of approaches are vulnerable to genuine attacks like Denial of Service (DoS), where countless duplicate data packets are intentionally dispatched to destination node which disturbs the typical activities of wireless sensor networks. So, here we propose a new scheme of security algorithm for the wireless sensor networks. Our method, Biometric based-Authenticated Geographic Opportunistic Routing (BAGOR) algorithm depends on the user biometrics to shield the violation of DoS attacks, in order to meet out the validness requirements and reliability in the network. By examining biometric and statistic state information (SSI) of remote connections, BAGOR uses a trust model as statistic state information to get better proficiency of packet delivery. Dissimilar to past pioneering routing algorithm, BAGOR guarantees data honesty by building up an entropy-deployed selective validation algorithm and can detach DoS aggressors and reduce the computational expense. Thus, the eveloped procedure is assessed and compared with already existing security techniques. The simulations show that BAGOR decreasing system traffic, shielding against Denial of Service attacks, and expanding the lifetime of a sensor node in the network. Thus, the usefulness and execution of the whole system is enhanced.© 2021 Elsevier Ltd. All rights reserved. Selection and peer-review under responsibility of the scientific committee of the Emerging Trends in Materials Science, Technology and Engineering.
Keywords: Biometric authentication | BAGOR algorithm | Denial-of-Service attacks | Geographic opportunistic routing | Statistic state information
مقاله انگلیسی
26 Multifactor door locking systems: A review
سیستم های قفل درب چند عاملی: مروری-2021
Security has become very important, but along with that, people also need a system that is not very expensive and can be customized to meet our needs. As conventional door locks can be easily opened, this makes people vulnerable to security threats. This study attempts a comparative analysis of pre- existing researches, made in the field of security control system developed and improvised over the span of time with multifactor authentication technique’s evolvement. The components, hardware complications, work efficiency and algorithms used in each of the model is drawn as a comparison to other to pro- vide an idea of systematic development in this regard. With each passing day, security systems are advancing and new technology is being developed. Security systems or door locking mechanics have evolved from metallic door locks of primitive type keys, to advanced controlling structure with up to four or five step authentications to ensure utmost safety.© 2021 Elsevier Ltd. All rights reserved. Selection and peer-review under responsibility of the scientific committee of the 3rd International Conference on Materials, Manufacturing and Modelling.
Keywords: Security | Door lock | Multifactor authentication | Biometric verification | Keypad | Gsm lock
مقاله انگلیسی
27 Ear biometric for personal identification using canny edge detection algorithm and contour tracking method
بیومتریک گوش برای شناسایی شخص با استفاده از الگوریتم تشخیص لبه و روش ردیابی کانتور-2021
This paper is based on Human ear recognition in a new biometric technology by attracting the interest of biometrics community. Biometrics involves the programmed investigation of strategies in order to understand individual’s dependent on physical or social characteristics. Finding a decent biometric strat- egy, it has been extensively investigated in an ongoing year. The ear is a steady organ, it does not change with age and feelings, among a few biometric highlights.© 2021 Elsevier Ltd. All rights reserved. Selection and peer-review under responsibility of the scientific committee of the Emerging Trends in Materials Science, Technology and Engineering.
Keywords: Biometric | Ear Authentication | Canny edges Microcontroller | UART (Universal asynchronous receiver/transmitter) | Motor GSM (Global System for Mobile)
مقاله انگلیسی
28 Learning from learning: detecting account takeovers by identifying forgetful users
یادگیری از یادگیری: شناسایی حساب های حساب با شناسایی کاربران فراموش شده-2021
Credential-stuffing attacks are increasing in frequency, allowing threat actors to use data breaches from one source to perpetrate another. While multi-factor authentication remains a crucial preventative measure to protect against credential stuffing, the availability of credential data sets with contact information and the correlation with demographic data can allow threat actors to overcome it through interactive social engineering. Concurrently, alternative defence mechanisms such as network source profiling and device fingerprinting lose effectiveness as privacy-protecting technologies reduce the observable variability between legitimate and fraudulent user sessions.
keywords:
مقاله انگلیسی
29 Development of keyless biometric authenticated vehicles ignition system
توسعه سیستم احتراق خودروهای بیومتریک بدون کلید صحت نگاری شده-2021
The vehicles are started or ignited using manual keys or sensor based keys. In two wheelers after placing keys the bike is started using either button or kicking method. The other vehicles are started using key cranking or key is placed in specific sensor control area and start button is pressed. The existing method makes any one can able to operate the vehicle if they have keys. The proposed method used to operate the vehicles only they are authorized. The authorization key is available in the controller memory. The pro- posed method uses dactylogram scanner to access the vehicles. The scanner scans the finger, if the person is authenticated immediately it allows the person to start the vehicles. The controller is attached with the relay electronic board which controls the ignition part. The proposed method uses ATMEGA 162. The device is able to access the vehicle by 3 persons. Only the specific 3 person finger prints are enrolled in the controller. The system is enabled with GSM access. If unauthenticated person access the finger print scanner, the vehicle is not ignited. The GSM module communicates the unauthenticated access attempt to the owner of the vehicles in the form of SMS. If the device is accessed with authenticated person and the vehicle is successfully started. In the meantime unauthorized person starts access with scanner, immediately message was received in the stored GSM mobile number. The average authentication time to start the vehicle is 3.81 s.© 2021 Elsevier Ltd. All rights reserved. Selection and peer-review under responsibility of the scientific committee of the International Virtual Conference on Sustainable Materials (IVCSM-2k20).
Keywords: GSM | SMS | LCD | Dactylogram Scanner | ATMEGA162
مقاله انگلیسی
30 Finger vein pattern recognition using image processing technique
تشخیص الگوی رگ انگشت با استفاده از تکنیک پردازش تصویر-2021
Human identification based on finger vein pattern is an interesting branch of biometric recognition that is getting attention among the researchers in the recent decade as vein patterns are unique such as iris recognition, face recognition, finger print for authentication and security purposes. The vein pattern uti- lized in this authentication technology refers to the image of vessels within the body which will be seen as a random mesh at the surface of the body. Vein pattern authentication can be applied to almost all people. In the proposed system we have used simple and easy algorithms for processing. The processing steps include image enhancement, thresholding and thinning. The processed images are matched with the images in the database. Thus the proposed biometric system will be effectively used in authentication and security purposes.© 2021 Elsevier Ltd. All rights reserved. Selection and peer-review under responsibility of the scientific committee of the 12th National Conference on Recent Advancements in Biomedical Engineering.
Keywords: Fingerprint | Vein recognition | Pattern matching
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 3891 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 38158 :::::::: افراد آنلاین: 47