نتایج جستجو برای: authentication data structure
تعداد نتایج: 3694940 فیلتر نتایج به سال:
With the advances in deep learning, speaker verification has achieved very high accuracy and is gaining popularity as a type of biometric authentication option many scenes our daily life, especially growing market web services. Compared to traditional passwords, "vocal passwords" are much more convenient they relieve people from memorizing different passwords. However, new machine learning atta...
Owing to its unique, concealment and easy customization by combining different wrist hand gestures, high-density surface electromyogram (HD-sEMG) is recognized as a potential solution the next generation biometric authentication, which usually adopts wireless body sensor network (BSN) acquire multi-channel HD-sEMG biosignals from distributed electrode arrays. For more accurate reliable classifi...
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
In order to provide different services for the customers, banks embark on a multimedia contact center. Considering that, in this center, where several services such as transferring money, getting statement information and asking for check books are provided, the authentication is of high importance. How to allocate the appropriate authentication method for each customer is one of the challe...
Encrypting data before sending it to the cloud ensures confidentiality but requires compute on encrypted data. Trusted execution environments, such as Intel SGX enclaves, promise provide a secure environment in which can be decrypted and then processed. However, vulnerabilities executed program give attackers ample opportunities execute arbitrary code inside enclave. This modify dataflow of lea...
Authenticated Key Exchange (AKE) is a cryptographic scheme with the aim to establish a high-entropy and secret session key over a insecure communications network. Password-Authenticated Key Exchange (PAKE) assumes that the parties in play share a simple password, which is cheap and human-memorable and is used to achieve the authentication. PAKEs are practically relevant as these features are ex...
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We present a detailed security analysis based on es timates of the entropy of the DNA data and formal security results. The scheme is shown to be robust and efficient by analysing the typical frequency and structure of erro...
background and objectives: traditional polyherbal oils are still in use in persian traditional medicine (ptm). most of these formulations are prepared via traditional procedures such as maceration of herbs in oils or evaporating aqueous herbal extracts in boiling or heating oils as the vehicle. thus, their quality control, standardization and authentication are real challenges due to the lack o...
The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases, the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید