A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secured Geographic Forwarding in Wireless Multimedia Sensor Networks
2012
Journal of Information Processing
., secure neighbor discovery and route discovery, and propose the SecuTPGF, an extended version of TPGF, which exactly follows the original TPGF protocol's routing mechanism but with enhanced security ...
The effectiveness of SecuTPGF is proved by conducting security analysis and evaluation experiments. ...
An example of executing TPGF to explore multiple paths in a duty cycle based WMSNs is given in Fig. 1 . ...
doi:10.2197/ipsjjip.20.54
fatcat:764uzhxhi5ecxptxlhmztv4bie
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes
[article]
2019
arXiv
pre-print
This motivates us, herein, to provide the first detailed exploration of the integration of a fundamentally different element of defense into the design of web authentication schemes: a mimicry-resistance ...
Many password alternatives for web authentication proposed over the years, despite having different designs and objectives, all predominantly rely on the knowledge of some secret. ...
The third author acknowledges funding from the Natural Sciences and Engineering Research Council of Canada (NSERC) for both his Canada Research Chair in Authentication and Computer Security, and a Discovery ...
arXiv:1708.01706v2
fatcat:sr4d4aidirdi5ljxunihmdcpoe
Potential Biological markers by DNA ‐based tools for determination of Greek PDO geographical origin and authenticity: "Avgotaracho Mesolonghiou" and "Vostizza currant"
2021
JSFA Reports
The aim of this study was to explore whether unique biological markers for two high valuable and popular Greek protected designation of origin (PDO) products could be indicated. ...
Results: Band profiles resulted in molecular techniques, could be used as a "barcode" to certify the origin and authenticity of PDO products. ...
The effort of our study was to optimize an appropriate, rapid and accurate method for these Greek PDO products' traceability and authenticity. ...
doi:10.1002/jsf2.23
fatcat:3kqkruojmrafnlab5t6u3plwua
A new strong user authentication scheme with local certification authority for internet of things based cloud computing services
2019
International Journal of Advanced Technology and Engineering Exploration
This work explores the weakness of conventional authentication methods in cloud environments. An improved strong user authentication scheme has been proposed. ...
This new scheme is based on local certification authority for IoT devices in cloud computing where devices are authenticated using private public key infrastructure (PKI). ...
Conflicts of interest The authors have no conflicts of interest to declare. ...
doi:10.19101/ijatee.2019.650051
fatcat:hiwwszqbfvfq3cecbvexw3e7c4
Fog Computing: Security Challenges and Countermeasures
2020
International Journal of Computer Applications
, location awareness, and geographical distribution applications. ...
One of the considerable difficulties facing fog computing systems is security and privacy challenges. ...
Cooperative authentication between FNs schemes can be used to reduce this latency [24] . ...
doi:10.5120/ijca2020920648
fatcat:44hkdrgeivcnhlroorrl34zcbe
Page 337 of The Geographical Journal Vol. 33, Issue 3
[page]
1909
The Geographical Journal
as the author of a carefully compiled history of Australian exploration, ba.sed on the most authentic records available at the time of its publication (1888). ...
On an ex|iedition which left Champion bay in March of that year he w.asaccumpanie<l by Mr. W. R. ...
Exploring Effect of Location Number on Map-Based Graphical Password Authentication
[chapter]
2017
Lecture Notes in Computer Science
Based on the idea of utilizing an extremely large image, map-based GPs like PassMap and GeoPass have been developed, where users can select their secrets (geographical point) on a world map. ...
Motivated by this, our purpose in this work is to explore the effect of location number between PassMap and GeoPass in terms of users' performance and feedback. ...
Such schemes demand users to select one or more images from an image pool for authentication. For example, Pass-Faces [17] requires users to recognize a set of human faces for authentication. ...
doi:10.1007/978-3-319-59870-3_17
fatcat:bfrhrdd7izgl7ddf73unwglani
Location-assured, multifactor authentication on smartphones via LTE communication
2013
Mobile Multimedia/Image Processing, Security, and Applications 2013
With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using ...
Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about ...
are explored. ...
doi:10.1117/12.2018027
fatcat:55haczoz7bc5dc64xg62npjvfi
The Infrastructure - Availability, Authentication and Access
2020
Zenodo
The project aims to build an infrastructure of content and the paper will discuss this as a two-fold problem, availability and access, technical and procedural (legal, administrative and procedures) to ...
The project will undertake strategic work to plan functionality enhancements in data access and data exploration. ...
A CESSDA Scheme
A Finnish
researcher
Attitudes
towards
immigrants
(a problem area)
A Swiss
researcher
Eurobarometer
(a data collection)
An Irish
researcher
Data on Finland
(a geographic ...
doi:10.5281/zenodo.3782155
fatcat:4kz2hon52rd2dc65jvtx6hk6d4
Password Authentication System using Coordinates & Location
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
It is concerned with including client's geographical location as an important authentication factor to enhance security. ...
Our primary aim is to prevent hacking through all kinds of brute force algorithms. ...
Angelina, SRM Institute of Science and Technology, Ramapuram. ...
doi:10.35940/ijitee.a4384.119119
fatcat:srbzaxitkrgvri3c4lkx3nuxqe
Exploring Message Authentication in Sensor Networks
[chapter]
2005
Lecture Notes in Computer Science
This paper explores the design space for message authentication in sensor networks. ...
Multipath authentication provides an intermediate security level that may be appropriate for many applications of sensor networks, trading energy for security guarantees. ...
Sect. 3 describes the security guarantees delivered by different authentication schemes. We argue in favor of virtual multipath authentication in the context of sensor networks. ...
doi:10.1007/978-3-540-30496-8_3
fatcat:gkbbc5dmjrg5vhvid3x5uuenvm
Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays
[article]
2020
arXiv
pre-print
Thus, authentication becomes critical in AR & VR technology, particularly in shared spaces. ...
In this paper, we propose applying the ZeTA protocol that allows secure authentication even in shared spaces for the AR & VR context. ...
[30] explored the cultural differences in the adoption of mobile AR in South Korea and Ireland. ...
arXiv:2007.11663v2
fatcat:twnmyukuybhzfffbd5wdgb4v74
Identification of Privacy and Security Risks of Internet of Things: An Empirical Investigation
2019
Review of Computer Engineering Research
The implication of the IOT is still challenging in a geographically distributed environment. Particularly, the main challenges are associated with data privacy and security. ...
The results of empirical study revolved that Privacy, Trust building, and Authentication are the most critical risk factors for IOT phenomena. ...
To this, we have conducted an informal literature review and explore the critical risk of IOT security and privacy. ...
doi:10.18488/journal.76.2019.61.35.44
fatcat:tnyylhfelfgdnh4hup2s2zudhe
Evolution of Various Authentication Schemes in Wireless Network over a Decade
2015
International Journal of Computer Applications
It is a way of confirming the genuineness of a party by another party. There is a wide range of authentication schemes that varies according to time period. ...
This paper, focus on the authentication schemes in wireless network that have evolved in last one a decade. ...
So, required an robust authentication schemes. ...
doi:10.5120/ijca2015905516
fatcat:zay3sbwkgvebxk3aol6phbuaea
Page 316 of The London Review of Politics, Society, Literature, Art & Science Vol. 13, Issue 325
[page]
1866
The London Review of Politics, Society, Literature, Art & Science
every scheme of extension. ...
The grand exploits with which the names of all these explorers will ever be inseparably connected will be sufficient to make Sir Roderick Murchison’s tenure of office remarkable so long as the Royal Geographical ...
« Previous
Showing results 1 — 15 out of 41,984 results