نتایج جستجو برای: authentication data structure

تعداد نتایج: 3694940  

Journal: :The Open Cybernetics & Systemics Journal 2014

Journal: :IEEE Transactions on Dependable and Secure Computing 2023

With the advances in deep learning, speaker verification has achieved very high accuracy and is gaining popularity as a type of biometric authentication option many scenes our daily life, especially growing market web services. Compared to traditional passwords, "vocal passwords" are much more convenient they relieve people from memorizing different passwords. However, new machine learning atta...

Journal: :IEEE Transactions on Industrial Informatics 2022

Owing to its unique, concealment and easy customization by combining different wrist hand gestures, high-density surface electromyogram (HD-sEMG) is recognized as a potential solution the next generation biometric authentication, which usually adopts wireless body sensor network (BSN) acquire multi-channel HD-sEMG biosignals from distributed electrode arrays. For more accurate reliable classifi...

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

Journal: Money and Economy 2013
Asadollah Shahbahrami, Mohsen Ebadi Jokandan,

In order to provide different services for the customers, banks embark on a multimedia contact center. Considering that, in this center, where several services such as transferring money, getting statement information and asking for check books are provided, the authentication is of high importance. How to allocate the appropriate authentication method for each customer is one of the challe...

Journal: :ACM transactions on privacy and security 2022

Encrypting data before sending it to the cloud ensures confidentiality but requires compute on encrypted data. Trusted execution environments, such as Intel SGX enclaves, promise provide a secure environment in which can be decrypted and then processed. However, vulnerabilities executed program give attackers ample opportunities execute arbitrary code inside enclave. This modify dataflow of lea...

Journal: :IACR Cryptology ePrint Archive 2016
Jintai Ding Saed Alsayigh Jean Lancrenon Saraswathy RV Michael Snook

Authenticated Key Exchange (AKE) is a cryptographic scheme with the aim to establish a high-entropy and secret session key over a insecure communications network. Password-Authenticated Key Exchange (PAKE) assumes that the parties in play share a simple password, which is cheap and human-memorable and is used to achieve the authentication. PAKEs are practically relevant as these features are ex...

2008
Ulrike Korte Michael Krawczak Johannes Merkle Rainer Plaga Matthias Niesing Carsten Tiemann A. J. Han Vinck Ulrich Martini

We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We present a detailed security analysis based on es­ timates of the entropy of the DNA data and formal security results. The scheme is shown to be robust and efficient by analysing the typical frequency and structure of erro...

Journal: :research journal of pharmacognosy 0
a. hamedi medicinal plants processing research center, shiraz university of medical sciences, shiraz, iran. department of pharmacognosy, school of pharmacy, shiraz university of medical sciences, shiraz, iran. a. sakhteman department of medicinal chemistry, school of pharmacy, shiraz university of medical sciences, shiraz, iran. f. ahmadi department of pharmaceutics, school of pharmacy, shiraz university of medical sciences, shiraz, iran. m. sohrabpour student research committee, shiraz university of medical sciences, shiraz, iran. m.m. zarshenas medicinal plants processing research center, shiraz university of medical sciences, shiraz, iran. department of phytopharmaceuticals (traditional pharmacy), school of pharmacy, shiraz university of medical sciences, shiraz, iran.

background and objectives: traditional polyherbal oils are still in use in persian traditional medicine (ptm). most of these formulations are prepared via traditional procedures such as maceration of herbs in oils or evaporating aqueous herbal extracts in boiling or heating oils as the vehicle. thus, their quality control, standardization and authentication are real challenges due to the lack o...

The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases,   the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید