Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








41,984 Hits in 3.4 sec

Secured Geographic Forwarding in Wireless Multimedia Sensor Networks

Taye Mulugeta, Lei Shu, Manfred Hauswirth, Zhangbing Zhou, Shojiro Nishio
2012 Journal of Information Processing  
., secure neighbor discovery and route discovery, and propose the SecuTPGF, an extended version of TPGF, which exactly follows the original TPGF protocol's routing mechanism but with enhanced security  ...  The effectiveness of SecuTPGF is proved by conducting security analysis and evaluation experiments.  ...  An example of executing TPGF to explore multiple paths in a duty cycle based WMSNs is given in Fig. 1 .  ... 
doi:10.2197/ipsjjip.20.54 fatcat:764uzhxhi5ecxptxlhmztv4bie

Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes [article]

Furkan Alaca, AbdelRahman Abdou, Paul C. van Oorschot
2019 arXiv   pre-print
This motivates us, herein, to provide the first detailed exploration of the integration of a fundamentally different element of defense into the design of web authentication schemes: a mimicry-resistance  ...  Many password alternatives for web authentication proposed over the years, despite having different designs and objectives, all predominantly rely on the knowledge of some secret.  ...  The third author acknowledges funding from the Natural Sciences and Engineering Research Council of Canada (NSERC) for both his Canada Research Chair in Authentication and Computer Security, and a Discovery  ... 
arXiv:1708.01706v2 fatcat:sr4d4aidirdi5ljxunihmdcpoe

Potential Biological markers by DNA ‐based tools for determination of Greek PDO geographical origin and authenticity: "Avgotaracho Mesolonghiou" and "Vostizza currant"

Maria‐Eleni Dimitrakopoulou, Chrysoula Kotsalou, Maria Koudouna, Eleftheria Katechaki, Apostolos Vantarakis
2021 JSFA Reports  
The aim of this study was to explore whether unique biological markers for two high valuable and popular Greek protected designation of origin (PDO) products could be indicated.  ...  Results: Band profiles resulted in molecular techniques, could be used as a "barcode" to certify the origin and authenticity of PDO products.  ...  The effort of our study was to optimize an appropriate, rapid and accurate method for these Greek PDO products' traceability and authenticity.  ... 
doi:10.1002/jsf2.23 fatcat:3kqkruojmrafnlab5t6u3plwua

A new strong user authentication scheme with local certification authority for internet of things based cloud computing services

Youssefi My Abdelkader, Mouhsen Ahmed
2019 International Journal of Advanced Technology and Engineering Exploration  
This work explores the weakness of conventional authentication methods in cloud environments. An improved strong user authentication scheme has been proposed.  ...  This new scheme is based on local certification authority for IoT devices in cloud computing where devices are authenticated using private public key infrastructure (PKI).  ...  Conflicts of interest The authors have no conflicts of interest to declare.  ... 
doi:10.19101/ijatee.2019.650051 fatcat:hiwwszqbfvfq3cecbvexw3e7c4

Fog Computing: Security Challenges and Countermeasures

Zain Ashi, Mohammad Al-Fawa'reh, Mustafa Al-Fayoumi
2020 International Journal of Computer Applications  
, location awareness, and geographical distribution applications.  ...  One of the considerable difficulties facing fog computing systems is security and privacy challenges.  ...  Cooperative authentication between FNs schemes can be used to reduce this latency [24] .  ... 
doi:10.5120/ijca2020920648 fatcat:44hkdrgeivcnhlroorrl34zcbe

Page 337 of The Geographical Journal Vol. 33, Issue 3 [page]

1909 The Geographical Journal  
as the author of a carefully compiled history of Australian exploration, ba.sed on the most authentic records available at the time of its publication (1888).  ...  On an ex|iedition which left Champion bay in March of that year he w.asaccumpanie<l by Mr. W. R.  ... 

Exploring Effect of Location Number on Map-Based Graphical Password Authentication [chapter]

Weizhi Meng, Wang Hao Lee, Man Ho Au, Zhe Liu
2017 Lecture Notes in Computer Science  
Based on the idea of utilizing an extremely large image, map-based GPs like PassMap and GeoPass have been developed, where users can select their secrets (geographical point) on a world map.  ...  Motivated by this, our purpose in this work is to explore the effect of location number between PassMap and GeoPass in terms of users' performance and feedback.  ...  Such schemes demand users to select one or more images from an image pool for authentication. For example, Pass-Faces [17] requires users to recognize a set of human faces for authentication.  ... 
doi:10.1007/978-3-319-59870-3_17 fatcat:bfrhrdd7izgl7ddf73unwglani

Location-assured, multifactor authentication on smartphones via LTE communication

Torben Kuseler, Ihsan A. Lami, Hisham Al-Assam, Sos S. Agaian, Sabah A. Jassim, Eliza Y. Du
2013 Mobile Multimedia/Image Processing, Security, and Applications 2013  
With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using  ...  Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about  ...  are explored.  ... 
doi:10.1117/12.2018027 fatcat:55haczoz7bc5dc64xg62npjvfi

The Infrastructure - Availability, Authentication and Access

Atle Alvheim, Vigdis Kvalheim
2020 Zenodo  
The project aims to build an infrastructure of content and the paper will discuss this as a two-fold problem, availability and access, technical and procedural (legal, administrative and procedures) to  ...  The project will undertake strategic work to plan functionality enhancements in data access and data exploration.  ...  A CESSDA Scheme A Finnish researcher Attitudes towards immigrants (a problem area) A Swiss researcher Eurobarometer (a data collection) An Irish researcher Data on Finland (a geographic  ... 
doi:10.5281/zenodo.3782155 fatcat:4kz2hon52rd2dc65jvtx6hk6d4

Password Authentication System using Coordinates & Location

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
It is concerned with including client's geographical location as an important authentication factor to enhance security.  ...  Our primary aim is to prevent hacking through all kinds of brute force algorithms.  ...  Angelina, SRM Institute of Science and Technology, Ramapuram.  ... 
doi:10.35940/ijitee.a4384.119119 fatcat:srbzaxitkrgvri3c4lkx3nuxqe

Exploring Message Authentication in Sensor Networks [chapter]

Harald Vogt
2005 Lecture Notes in Computer Science  
This paper explores the design space for message authentication in sensor networks.  ...  Multipath authentication provides an intermediate security level that may be appropriate for many applications of sensor networks, trading energy for security guarantees.  ...  Sect. 3 describes the security guarantees delivered by different authentication schemes. We argue in favor of virtual multipath authentication in the context of sensor networks.  ... 
doi:10.1007/978-3-540-30496-8_3 fatcat:gkbbc5dmjrg5vhvid3x5uuenvm

Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays [article]

Reyhan Duezguen, Peter Mayer, Sanchari Das, Melanie Volkamer
2020 arXiv   pre-print
Thus, authentication becomes critical in AR & VR technology, particularly in shared spaces.  ...  In this paper, we propose applying the ZeTA protocol that allows secure authentication even in shared spaces for the AR & VR context.  ...  [30] explored the cultural differences in the adoption of mobile AR in South Korea and Ireland.  ... 
arXiv:2007.11663v2 fatcat:twnmyukuybhzfffbd5wdgb4v74

Identification of Privacy and Security Risks of Internet of Things: An Empirical Investigation

Muhammad Hamza, Muhammad Azeem Akbar, Muhammad Shafiq, Tahir Kamal, Ali Mahmoud Baddour
2019 Review of Computer Engineering Research  
The implication of the IOT is still challenging in a geographically distributed environment. Particularly, the main challenges are associated with data privacy and security.  ...  The results of empirical study revolved that Privacy, Trust building, and Authentication are the most critical risk factors for IOT phenomena.  ...  To this, we have conducted an informal literature review and explore the critical risk of IOT security and privacy.  ... 
doi:10.18488/journal.76.2019.61.35.44 fatcat:tnyylhfelfgdnh4hup2s2zudhe

Evolution of Various Authentication Schemes in Wireless Network over a Decade

Pratik Singh, Bhawna Mallick
2015 International Journal of Computer Applications  
It is a way of confirming the genuineness of a party by another party. There is a wide range of authentication schemes that varies according to time period.  ...  This paper, focus on the authentication schemes in wireless network that have evolved in last one a decade.  ...  So, required an robust authentication schemes.  ... 
doi:10.5120/ijca2015905516 fatcat:zay3sbwkgvebxk3aol6phbuaea

Page 316 of The London Review of Politics, Society, Literature, Art & Science Vol. 13, Issue 325 [page]

1866 The London Review of Politics, Society, Literature, Art & Science  
every scheme of extension.  ...  The grand exploits with which the names of all these explorers will ever be inseparably connected will be sufficient to make Sir Roderick Murchison’s tenure of office remarkable so long as the Royal Geographical  ... 
« Previous Showing results 1 — 15 out of 41,984 results