scholarly journals Biometric User Authentication Method of Mobile Application in Trustable Space

Author(s):  
Tae Kyong Lee ◽  
Yong Hyuk Kim ◽  
Eul Gyu Im
2019 ◽  
Vol 6 (1) ◽  
pp. 34-44 ◽  
Author(s):  
Hamdan Dian Jaya Rozi Hyang Utami ◽  
Riza Arifudin ◽  
Alamsyah Alamsyah

The development of mobile applications is unbalanced with the level of its security which is vulnerable to hacker attacks. Some important things that need to be considered in the security of mobile applications are login and database system. A login system that used the database as user authentication and passwords are very vulnerable to be hacking. In securing data, various ways had been developed including cryptography. Cryptographic algorithms used in securing passwords usually used MD5 encryption. However, MD5 as a broader encryption technique is very risky. Therefore, the level of login system security in an android application is needed to embed the Advanced Encryption Standard (AES) algorithm in its process. The AES algorithm was applied using variations of 3 keys 128-bit, 192-bit, and 256-bit. Security level testing was also conducted by using 40 SQL Injection samples which the system logins without security obtained 27.5% that be able to enter the system compared to the result of login systems that use AES algorithm 128-bit, 192-bit or 256-bit was obtained 100% that cannot enter into the system. The estimation of the average encryption process of AES 128, 192 and 256 bits are 5.8 seconds, 7.74 seconds, and 9.46 seconds.


2019 ◽  
Vol 17 (4) ◽  
pp. 66-73
Author(s):  
A. L. Markhakshinov ◽  
A. A. Tonkhonoeva ◽  
E. R. Urmakshinova

Principles of mobile applications development, requiring no server code, are described. Database, user authentication and notification sending functions are suggested to be implemented by BaaS model (Backend as a Service). Example architecture of serverless mobile application using Google Firebase cloud services is shown. Brief description of basic interactions between serverless architecture components is given.


2021 ◽  
Vol 8 (1) ◽  
pp. 1-11
Author(s):  
Eduardo Takeo Ueda ◽  
Marcelo Moro Da Silva ◽  
Anderson Aparecido Alves Da Silva ◽  
Norisvaldo Ferraz Junior ◽  
Fabio Dacêncio Pereira ◽  
...  

Transparency and security in an electoral process are fundamental to the legitimacy of the results and the confidence of voters. Thus, it is necessary to assess opportunities to improve traditional voting systems. Among the main problems is the lack of transparency, due to the impossibility of a voter checking their vote and the lack of access to the source from which the results are obtained. Another problem is mobility, due to the impossibility of performing remote voting, as traditional voting systems continue to require the physical presence of the voter in an electoral zone. Thus, the objective of this work is to propose a voting system that is functional, transparent, safe, and accessible to everyone. Voters can vote through a mobile application with biometric authentication using fingerprint and password access. In our proposal, votes are registered in an Ethereum Blockchain through a Smart Contract, allowing the voter to check their vote. The results are expected to collaborate with the evolution of studies necessary to improve traditional voting systems, especially in fundamental aspects such as security, transparency, and mobility.


2019 ◽  
Vol 16 (2) ◽  
pp. 227-232 ◽  
Author(s):  
Quyen Q. Tiet ◽  
Heather Duong ◽  
Laila Davis ◽  
Rebecca French ◽  
Christopher L. Smith ◽  
...  

2019 ◽  
Author(s):  
Mengli Yu ◽  
Ronggang Zhou ◽  
Huiwen Wang ◽  
Weihua Zhao

Sign in / Sign up

Export Citation Format

Share Document