Results 31 to 40 of about 118,033 (317)

On the Limits of Cross-Authentication Checks for GNSS Signals [PDF]

open access: yes, 2023
Global navigation satellite systems (GNSSs) are implementing security mechanisms: examples are Galileo open service navigation message authentication (OS-NMA) and GPS chips-message robust authentication (CHIMERA). Each of these mechanisms operates in a single band.
arxiv   +1 more source

Authenticity as authentication

open access: yesPopular Music, 2002
This article argues for the prematurity of any dismissal of the notion of authenticity as meaningful within popular music discourse. It synthesises a range of views as to how authenticity is constructed, and offers a tri-partite typology dependent on asking who, rather than what, is being authenticated.
openaire   +4 more sources

Negotiating Authentic Objects and Authentic Selves [PDF]

open access: yesJournal of Material Culture, 2010
Our understanding of authenticity in the material world is characterized by a problematic dichotomy between materialist and constructivist perspectives. Neither explains why people find the issue of authenticity so compelling, nor how it is experienced and negotiated in practice. There is strong evidence supporting the view that prevailing materialist
openaire   +3 more sources

Authentication and authenticated key exchanges [PDF]

open access: yesDesigns, Codes and Cryptography, 1992
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered,
Michael J. Wiener   +2 more
openaire   +1 more source

Zero-Knowledge Authentication [PDF]

open access: yesarXiv, 2022
In the thesis we focus on designing an authentication system to authenticate users over a network with a username and a password. The system uses the zero-knowledge proof (ZKP) system as a password verification mechanism. The ZKP protocol used is based on the quadratic residuosity problem.
arxiv  

Quantum authentication of classical messages [PDF]

open access: yesPhys.Rev.A64,062309(2001), 2001
Although key distribution is arguably the most studied context on which to apply quantum cryptographic techniques, message authentication, i.e., certifying the identity of the message originator and the integrity of the message sent, can also benefit from the use of quantum resources.
arxiv   +1 more source

Multimodal Personal Ear Authentication Using Smartphones [PDF]

open access: yesarXiv, 2021
In recent years, biometric authentication technology for smartphones has become widespread, with the mainstream methods being fingerprint authentication and face recognition. However, fingerprint authentication cannot be used when hands are wet, and face recognition cannot be used when a person is wearing a mask.
arxiv  

RaiseAuth: a novel bio-behavioral authentication method based on ultra-low-complexity movement

open access: yesComplex & Intelligent Systems, 2023
Authentication plays an important role in maintaining social security. Modern authentication methods often relies on mass data datasets to implement authentication by data-driven. However, an essential question still remains unclear at data level.
Shuo Zhao   +4 more
doaj   +1 more source

IVOA Recommendation: SSO - Single-Sign-On Profile: Authentication Mechanisms Version 2.0 [PDF]

open access: yes, 2017
Approved client-server authentication mechanisms are described for the IVOA single-sign-on profile: No Authentication; HTTP Basic Authentication; TLS with passwords; TLS with client certificates; Cookies; Open Authentication; Security Assertion Markup Language; OpenID.
arxiv   +1 more source

A Multi-Factor Homomorphic Encryption based Method for Authenticated Access to IoT Devices [PDF]

open access: yesarXiv, 2023
Authentication is the first defence mechanism in many electronic systems, including Internet of Things (IoT) applications, as it is essential for other security services such as intrusion detection. As existing authentication solutions proposed for IoT environments do not provide multi-level authentication assurance, particularly for device-to-device ...
arxiv  

Home - About - Disclaimer - Privacy