information authentication
Recently Published Documents


TOTAL DOCUMENTS

46
(FIVE YEARS 13)

H-INDEX

8
(FIVE YEARS 2)

2021 ◽  
pp. 135-146
Author(s):  
Ningwei Peng ◽  
Xuan Liu ◽  
Shigeng Zhang

Sensors ◽  
2020 ◽  
Vol 21 (1) ◽  
pp. 92
Author(s):  
Luis Hernández-Álvarez ◽  
José María de Fuentes ◽  
Lorena González-Manzano ◽  
Luis Hernández Encinas

Ensuring the confidentiality of private data stored in our technological devices is a fundamental aspect for protecting our personal and professional information. Authentication procedures are among the main methods used to achieve this protection and, typically, are implemented only when accessing the device. Nevertheless, in many occasions it is necessary to carry out user authentication in a continuous manner to guarantee an allowed use of the device while protecting authentication data. In this work, we first review the state of the art of Continuous Authentication (CA), User Profiling (UP), and related biometric databases. Secondly, we summarize the privacy-preserving methods employed to protect the security of sensor-based data used to conduct user authentication, and some practical examples of their utilization. The analysis of the literature of these topics reveals the importance of sensor-based data to protect personal and professional information, as well as the need for exploring a combination of more biometric features with privacy-preserving approaches.


Research ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Fa-Feng Xu ◽  
Zhong-Liang Gong ◽  
Yu-Wu Zhong ◽  
Jiannian Yao ◽  
Yong Sheng Zhao

Information encryption and decryption have attracted particular attention; however, the applications are frequently restricted by limited coding capacity due to the indistinguishable broad photoluminescence band of conventional stimuli-responsive fluorescent materials. Here, we present a concept of confidential information encryption with photoresponsive liquid crystal (LC) lasing materials, which were used to fabricate ordered microlaser arrays through a microtemplate-assisted inkjet printing method. LC microlasers exhibit narrow-bandwidth single-mode emissions, and the wavelength of LC microlasers was reversibly modulated based on the optical isomerization of the chiral dopant in LCs. On this basis, we demonstrate phototunable information authentication on LC microlaser arrays using the wavelength of LC microlasers as primary codes. These results provide enlightenment for the implementation of microlaser-based cryptographic primitives for information encryption and anticounterfeiting applications.


Cloud computing is the front line innovation of the decennium. It empowers users to store enormous collection of information in distributed storage and make use of it as and when they please from any corner of the world, with any sorts of hardware. As this distributive computing is reliant on the internet facility, issues of security like privacy, security of information, authentication and data confidentiality is experienced. So as to dispose of these issues, an assortment of encryption calculations and systems are utilized. Numerous specialists pick what they discovered best and made use of these in different blends to give the security to the information in cloud. Going through a comparable circumstance, we have decided to utilize a mix of validation system and key trade calculation mixed with an encryption calculation. The blend is alluded to as a "Three way mechanism" since it guarantees all three of confirmation, information protection and inspection insurance policies. In this paper, we have proposed to utilize two-factor authentication mixed in (AES) Advanced Encryption Standard encryption calculation that secures the secrecy of information put away within cloud. Without user’s private key that is special to the user, even if the key that is moving is stolen or hijacked the feature of key exchange renders it pointless and is of no use. The given proposed engineering of three way mechanism making it tedious for unauthorized personnel to break this security framework, therefore securing information put away in cloud.


2019 ◽  
Vol 13 (4) ◽  
pp. 410-415
Author(s):  
Xiaolan Xie ◽  
Xiao Zhou ◽  
Yarong Liu

Background: Aiming at the problem of user information security authentication in cloud manufacturing, a user information security authentication model is proposed. The model is introduced in detail. Methods: In the security authentication model, the point set topology group fractal transformation algorithm is combined with the biometric identification technology to acquire the user biometric information to generate the secret key. Combined with the AES (Advanced Encryption Standard) encryption algorithm, the user biometric information is encrypted. Results: It provides a stronger guarantee for the user's security certification. We revised all patents relating to pharmaceutical formulations of applicability in authentication of user information in cloud manufacturing. Conclusion: Experiments show that the research has credibility and practicability, which improves the overall security performance of cloud manufacturing user information authentication and access.


2019 ◽  
pp. 65-72
Author(s):  
E. V. Timoschenko ◽  
A. F. Razhkov

An effective method for solving data security problems is proposed. A new approach to the design of steganographic system based on the three basic methods - the introduction of parts of a shared secret into images with the possibility of further extraction of secret information, authentication of parts of a secret, self-healing of this security system. Such a system provides a greater degree of protection and secure data storage. The Windows application implements the proposed steganographic model, has no analogues and meets all the requirements set for steganographic software.


Sign in / Sign up

Export Citation Format

Share Document