Results 31 to 40 of about 118,033 (317)
On the Limits of Cross-Authentication Checks for GNSS Signals [PDF]
Global navigation satellite systems (GNSSs) are implementing security mechanisms: examples are Galileo open service navigation message authentication (OS-NMA) and GPS chips-message robust authentication (CHIMERA). Each of these mechanisms operates in a single band.
arxiv +1 more source
Authenticity as authentication
This article argues for the prematurity of any dismissal of the notion of authenticity as meaningful within popular music discourse. It synthesises a range of views as to how authenticity is constructed, and offers a tri-partite typology dependent on asking who, rather than what, is being authenticated.
openaire +4 more sources
Negotiating Authentic Objects and Authentic Selves [PDF]
Our understanding of authenticity in the material world is characterized by a problematic dichotomy between materialist and constructivist perspectives. Neither explains why people find the issue of authenticity so compelling, nor how it is experienced and negotiated in practice. There is strong evidence supporting the view that prevailing materialist
openaire +3 more sources
Authentication and authenticated key exchanges [PDF]
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered,
Michael J. Wiener+2 more
openaire +1 more source
Zero-Knowledge Authentication [PDF]
In the thesis we focus on designing an authentication system to authenticate users over a network with a username and a password. The system uses the zero-knowledge proof (ZKP) system as a password verification mechanism. The ZKP protocol used is based on the quadratic residuosity problem.
arxiv
Quantum authentication of classical messages [PDF]
Although key distribution is arguably the most studied context on which to apply quantum cryptographic techniques, message authentication, i.e., certifying the identity of the message originator and the integrity of the message sent, can also benefit from the use of quantum resources.
arxiv +1 more source
Multimodal Personal Ear Authentication Using Smartphones [PDF]
In recent years, biometric authentication technology for smartphones has become widespread, with the mainstream methods being fingerprint authentication and face recognition. However, fingerprint authentication cannot be used when hands are wet, and face recognition cannot be used when a person is wearing a mask.
arxiv
RaiseAuth: a novel bio-behavioral authentication method based on ultra-low-complexity movement
Authentication plays an important role in maintaining social security. Modern authentication methods often relies on mass data datasets to implement authentication by data-driven. However, an essential question still remains unclear at data level.
Shuo Zhao+4 more
doaj +1 more source
IVOA Recommendation: SSO - Single-Sign-On Profile: Authentication Mechanisms Version 2.0 [PDF]
Approved client-server authentication mechanisms are described for the IVOA single-sign-on profile: No Authentication; HTTP Basic Authentication; TLS with passwords; TLS with client certificates; Cookies; Open Authentication; Security Assertion Markup Language; OpenID.
arxiv +1 more source
A Multi-Factor Homomorphic Encryption based Method for Authenticated Access to IoT Devices [PDF]
Authentication is the first defence mechanism in many electronic systems, including Internet of Things (IoT) applications, as it is essential for other security services such as intrusion detection. As existing authentication solutions proposed for IoT environments do not provide multi-level authentication assurance, particularly for device-to-device ...
arxiv