Journal articles on the topic 'Authentication method'

To see the other types of publications on this topic, follow the link: Authentication method.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Authentication method.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Nahtigal, Tomaž, and Andrej Žemva. "Block–wise authentication method for digital images." Journal of Electrical Engineering 63, no. 5 (November 1, 2012): 289–95. http://dx.doi.org/10.2478/v10187-012-0042-6.

Full text
Abstract:
The ability to modify digital images can cause a serious problem in some applications. In this paper we propose a novel method derived from Wong’s authentication scheme that is capable of authenticating JPEG images as well as uncompressed images, but is not a watermarking method. The method offers great flexibility in terms of the size of the authenticator and the time needed to generate the authenticator, thus making it suitable for real-time image processing. We demonstrate this by implementing it in a programmable FPGA circuit.
APA, Harvard, Vancouver, ISO, and other styles
2

Park, Hosung, Seungsoo Nam, and Daeseon Choi. "Address Authentication Method for Sustainable Social Qualification." Sustainability 12, no. 5 (February 25, 2020): 1700. http://dx.doi.org/10.3390/su12051700.

Full text
Abstract:
This paper proposes an address authentication method based on a user’s location history. Address authentication refers to actual residence verification, which can be used in various fields such as personnel qualification, online identification, and public inquiry. In other words, accurate address authentication methods can reduce social cost for actual residence verification. For address authentication, existing studies discover the user’s regular locations, called location of interest (LOI), from the location history by using clustering algorithms. They authenticate an address if the address is contained in one of the LOIs. However, unnecessary LOIs, which are unrelated to the address may lead to false authentications of illegitimate addresses, that is, other users’ addresses or feigned addresses. The proposed method tries to reduce the authentication error rate by eliminating unnecessary LOIs with the distinguishing properties of the addresses. In other words, only few LOIs that satisfy the properties (long duration, high density, and consistency) are kept and utilized for address authentication. Experimental results show that the proposed method decreases the authentication error rate compared with previous approaches using time-based clustering and density-based clustering.
APA, Harvard, Vancouver, ISO, and other styles
3

Loginovskiy, O. V., M. E. Koval, and A. A. Shinkarev. "Using the ideal point method to search the best authentication method in corporate information systems." Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control & Radioelectronics 22, no. 3 (2022): 5–18. http://dx.doi.org/10.14529/ctcr220301.

Full text
Abstract:
Nowadays, various information systems, including enterprise ones, are becoming increasingly popular. Many of these systems store sensitive data of their users. Basically, this data is protected only by a login and a password, which today can no longer provide a high level of security and guarantee the safety of the data. Along with the development of information systems, methods and tools that attackers can use to get hold of confidential information are also evolving. It is not uncommon to hear news that some of the large companies have leaked its users' personal data. So, in order to minimize the risk of compromising user data, it is worth taking a more careful approach to selecting a method of authenticating users in the system. Aim. To determine the most appropriate method of authentication in enterprise information systems with the help of a mathematical approach and taking into account certain criteria. Materials and methods. The following types of authentication were considered: reusable password authentication, TOTP (Time-based one-time password authentication), SMS-based authentication, biometric authentication, OpenID, SAML (Security Assertion Markup Language). The Pareto set method and the ideal point method were used to determine the most preferable authentication method to implement. Results. In the article, the authors describe the authentication methods considered, the algorithm of their work, and diagrams of their interaction. Using the ideal point method, SAML was determined to be the most appropriate authentication method.
APA, Harvard, Vancouver, ISO, and other styles
4

Yakovlev, V. "Method for Authentication of Diffie ‒ Hellman Values Based on Pre-Distributed Random Sequences and Wegman ‒ Carter One-Time Pad Algorithm." Proceedings of Telecommunication Universities 7, no. 3 (October 6, 2021): 79–90. http://dx.doi.org/10.31854/1813-324x-2021-7-3-79-90.

Full text
Abstract:
A method of authentication of keys generated by the Diffie-Hellman method is investigated in the context of the use of a man-in-the-middle attack by an attacker. It is assumed that the users Alice and Bob, who form the key, have pre-distributed random bit strings a and b, respectively, obtained either from some source or generated by themselves based on data obtained from magnetometers or accelerometers from mobile devices. The attacker has no access to these chains. A method for authenticating Diffie ‒ Hellman values (DH values) is proposed. For this purpose, the message (DH-value) is divided by Alice into N blocks. For each block, an authenticator is calculated using the Wegman ‒ Carter algorithm with a one-time pad keys, which are sequences a and b. The DH-value and authenticators are transmitted over the channel to Bob, who calculates authenticators from the received DH-value and compares them with the authenticators received from the channel. If the number of unauthenticated blocks does not exceed the set threshold, then DH-value authentication is considered successful. But the drawback of this method is a little disagreement between authenticating strings of different users. The formulas for probabilities of the undetected deception and the false alarm (due to the mismatch of chains a and b) are proved. The optimization of the method parameters (the number of blocks and the length of the authenticator) is carried out, at which the consumption of the authentication key (chains a and b) is minimized when the specified requirements for the probability of the undetected deception and the false alarm are met. Examples of the choice of authentication parameters for a 256-bit DH-value are given.
APA, Harvard, Vancouver, ISO, and other styles
5

Pagnin, Elena, and Aikaterini Mitrokotsa. "Privacy-Preserving Biometric Authentication: Challenges and Directions." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/7129505.

Full text
Abstract:
An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a means of authenticating people due to the wide range of advantages that they provide with respect to classical authentication methods (e.g., password-based authentication). The most characteristic feature of this authentication method is the naturally strong bond between a user and her biometric credentials. This very same advantageous property, however, raises serious security and privacy concerns in case the biometric trait gets compromised. In this article, we present the most challenging issues that need to be taken into consideration when designing secure and privacy-preserving biometric authentication protocols. More precisely, we describe the main threats against privacy-preserving biometric authentication systems and give directions on possible countermeasures in order to design secure and privacy-preserving biometric authentication protocols.
APA, Harvard, Vancouver, ISO, and other styles
6

Song, Yubo, Bing Chen, Tianqi Wu, Tianyu Zheng, Hongyuan Chen, and Junbo Wang. "Enhancing Packet-Level Wi-Fi Device Authentication Protocol Leveraging Channel State Information." Wireless Communications and Mobile Computing 2021 (November 17, 2021): 1–12. http://dx.doi.org/10.1155/2021/2993019.

Full text
Abstract:
Wi-Fi device authentication is crucial for defending against impersonation attacks and information forgery attacks. Most of the existing authentication technologies rely on complex cryptographic algorithms. However, they cannot be supported well on the devices with limited hardware resources. A fine-grained device authentication technology based on channel state information (CSI) provides a noncryptographic method, which uses the CSI fingerprints for authentication since CSI can uniquely identify the devices. But long-term authentication based on CSI fingerprints is a challenging work. First, the CSI fingerprints are environment-sensitive, which means that the local authenticator should be updated to adapt to the changing channel state. Second, the local authenticator trained with old CSI fingerprints is outdated when users reconnect to the network after being offline for a long time, thus, it needs to be retrained in the access phase with new fingerprints. To tackle these challenges, we propose a CSI-based enhancing Wi-Fi device authentication protocol and an authentication framework. The protocol helps to collect new CSI fingerprints for authenticator’s training in access phase and performs the fingerprints’ dispersion analysis for authentication. In the association phase, it provides packet-level authentication and updates the authenticator with valid CSI fingerprints. The authenticator consists of an ensemble of small-scale autoencoders, which has high enough time efficiency for packet-level authentication and authenticator’s update. Experiments show that the accuracy of the framework is up to 98.7%, and the authenticator updating method can help the framework maintains high accuracy.
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Jing, Rongchao Liu, and Yingxu Lai. "Risk-Based Dynamic Identity Authentication Method Based on the UCON Model." Security and Communication Networks 2022 (March 31, 2022): 1–13. http://dx.doi.org/10.1155/2022/2509267.

Full text
Abstract:
With the continuous progress of computer technology, static identity authentication technology has encountered challenges in practical applications; in addition, it has deficiencies in continuity and mutability. For these reasons, we propose a risk-based dynamic identity authentication method based on the Usage Control (UCON) model. When authenticating a user, we consider their access rights based on the degree of risk, except in case of password authentication. We propose a risk assessment method, and blockchain technology is used in the scheme to provide a reliable process for risk assessment and authorization. Our scheme represents an improvement in traditional identity authentication, resulting in higher continuity and mutability. We also prove that the scheme has high security and scalability.
APA, Harvard, Vancouver, ISO, and other styles
8

Putri, Marsha Chikita Intania, Parman Sukarno, and Aulia Arif Wardana. "Two factor authentication framework based on ethereum blockchain with dApp as token generation system instead of third-party on web application." Register: Jurnal Ilmiah Teknologi Sistem Informasi 6, no. 2 (June 3, 2020): 74. http://dx.doi.org/10.26594/register.v6i2.1932.

Full text
Abstract:
Authentication is a method for securing an account by verifying the user identity by inputting email with a password. Two factor authentications is an authentication system that combines the first-factor authentication with the second factor. General two factor authentication by entering an email or username with a password are similar. However, two factor authentication requires additional information that must be inputted by the user. Additional information can be in the form of tokens or one-time passwords (OTP). Two factor authentications generally still uses third-party services to generate token or OTP still have vulnerable because can attacked from tokens steal through MITM and found that the generated tokens with the same value. Therefore, we propose a two-factor authentication framework based on ethereum blockchain with dApp as token generation system. Firstly, outcome from the analysis of the system, next succeeded in creating a two-factor authentication system without using third-parties. Second, token system generate up to 3164 different tokens in one second and has been collisions tested. Third, security method to protect token from MITM attack. The attacker unable to get access caused all the checking are done by dApp user authentication.
APA, Harvard, Vancouver, ISO, and other styles
9

Lipton, David. "Logical authentication method." ACM SIGSAC Review 4, no. 2 (April 1986): 9–20. http://dx.doi.org/10.1145/15842.15845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hwang, Ho Bin, Hyeokchan Kwon, Byungho Chung, Jongshill Lee, and In Young Kim. "ECG Authentication Based on Non-Linear Normalization under Various Physiological Conditions." Sensors 21, no. 21 (October 20, 2021): 6966. http://dx.doi.org/10.3390/s21216966.

Full text
Abstract:
The development and use of wearable devices require high levels of security and have sparked interest in biometric authentication research. Among the available approaches, electrocardiogram (ECG) technology is attracting attention because of its strengths in spoofing. However, morphological changes of ECG, which are affected by physical and psychological factors, can make authentication difficult. In this paper, we propose authentication using non-linear normalization of ECG beats that is robust to changes in ECG waveforms according to heart rate fluctuations in various daily activities. We performed a non-linear normalization method through the analysis of ECG alongside heart rate, evaluating similarities and authenticating the performance of our new method compared to existing methods. Compared with beats before normalization, the average similarity of the proposed method increased 23.7% in the resting state and 43% in the non-resting state. After learning in the resting state, authentication performance reached 99.05% accuracy for the resting state and 88.14% for the non-resting state. The proposed method can be applicable to an ECG-based authentication system under various physiological conditions.
APA, Harvard, Vancouver, ISO, and other styles
11

Putra, Kurnia Prima, Marwan Ramdhany Edy, M. Syahid Nur Wahid, Muhammad Fajar B, and Fadhlirrahman Baso. "FEATURES SIMPLIFICATION USING CUBIC BEZIER PROPERTIES FOR GAIT RECOGNITION ON SMARTPHONE." Journal of Embedded Systems, Security and Intelligent Systems 3, no. 1 (June 1, 2022): 11. http://dx.doi.org/10.26858/jessi.v3i1.33716.

Full text
Abstract:
Smartphone is widely used around the world. It’s user authentication usually used pin code, pattern code, fingerprint and conventional login authentication. This kinds of authentication mechanism is intrusive because those mechanisms requires users to give exclusive interaction for user authentication during the process. One of authentication method which is non-intrusive during data collection is authentication by using gait. This mechanism classified as non-intrusive because this mechanism could gather biometric data without being noticed by the authentication subjects. Since it is non-intrusive, this mechanism allows re-authentications without bothering the authentication subjects. One of the recent gait recognition is using accelerometer on smartphone to measure and capture acceleration data on gait. This method extract step cycles in various length, map and interpolate the data into higher sample count, and then use each of mapped and interpolated data as feature using recognition. Regardless the classification or recognition method, using each mapped and interpolated data as features would result in high processing time during classification or recognition due to high feature count. In this research, we try to simplify the features of gait data with minimum data loss so it might give robust result with less latency by aligning cubic Bezier curve to step cycle data and extracting the Bezier properties.
APA, Harvard, Vancouver, ISO, and other styles
12

Gupta, Brij B., and Shaifali Narayan. "A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server." Journal of Organizational and End User Computing 33, no. 2 (July 2021): 1–16. http://dx.doi.org/10.4018/joeuc.20210301.oa1.

Full text
Abstract:
This paper presents a framework for mutual authentication between a user device and a point of sale (POS) machine using magnetic secure transmission (MST) to prevent the wormhole attack in Samsung pay. The primary attribute of this method is authenticating the POS terminals by an authentication server to bind the generated token to a single POS machine. To secure the system from eavesdropping attack, the data transmitted between the user device and the machine is encrypted by using the Elgamal encryption method. The keys used in the method are dynamic in nature. Furthermore, comparison and security analysis are presented with previously proposed systems.
APA, Harvard, Vancouver, ISO, and other styles
13

Ariyama, Hirotaka. "A Personal Authentication Method." IEEJ Transactions on Electronics, Information and Systems 107, no. 1 (1987): 62–66. http://dx.doi.org/10.1541/ieejeiss1987.107.1_62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Yakovlev, Viktor. "Authentication of Keys Distributed by the Diffie-Hellman Method for Mobile Devices based on Authentication Codes and Magnetometric Data." SPIIRAS Proceedings 18, no. 3 (June 5, 2019): 706–41. http://dx.doi.org/10.15622/sp.2019.18.3.705-740.

Full text
Abstract:
The wide distribution of mobile wireless devices (smartphones, tablets, etc.) warrants cryptographic protection of information transmitted by these devices, which requires supplying these devices with keys and providing their authentication. Recently, research on key authentication methods within scenarios of pairing mobile devices, has been increasingly relevant. In these conditions, mobile devices are located close to each other, up to the physical contact, and an additional key sharing authenticated channel protected from interception is established for purposes of key authentication. The analysis of additional channel versions: visual, acoustic, vibration, tactile, and magnetometric shows advantages of the latter one in terms of speed and reliability of authentication, as well as easer se of this channel compared to other methods. A magnetometer channel forms if there are magnetometers in mobile devices that measure the Earth’s magnetic field. Random fluctuations of the magnetic field at the measurement point allow to generate in a pair of mobile devices random sequences that coincide with a high probability and which can be used to authenticate session keys. The “Magparing” protocol of mobile devices keys authentication, which are distributed by Diffie-Hellman method is studied. his protocol is based on the magnetometer data measuring. We demonstrate that the protocol is succeptible to “man-in-the-middle” attack. This fact is confirmed also by software AVISPA simulation. A new key authentication method based on the use of authenticating code (A-code) is proposed. Authenticators for Diffie-Hellman values are generated based on A-code blocks and random sequences obtained by the reading of magnetometer’s values. An approach for A-code parameters optimization, that conforms to the requirements for authentication key length and both to the probabilities of false key removal and false key deception, is investigated. We present an example of code parameters for key authentication with the length of 256 bits, providing the probability of a false key agreement of not greater than 10-9 and a probability of false rejection of a true key equal to –10–6, which shows viability of the proposed authentication method.
APA, Harvard, Vancouver, ISO, and other styles
15

Hirakawa, Yutaka, Fumiya Hirose, and Isao Sasano. "PVRotate: An Improved Vibration-Based User Authentication Method." International Journal of Future Computer and Communication 8, no. 2 (June 2019): 50–54. http://dx.doi.org/10.18178/ijfcc.2019.8.2.539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Wu, Miqi, Lin You, Gengran Hu, Liang Li, and Chengtang Cao. "A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture." Security and Communication Networks 2021 (April 22, 2021): 1–20. http://dx.doi.org/10.1155/2021/5592119.

Full text
Abstract:
In a multiserver architecture, authentication schemes play an important role in the secure communication of the system. In many multiserver authentication schemes, the security of the mutual authentications among the participants is based on the security of the registration center’s private key. This centralized architecture can create security risks due to the leakage of the registration center’s private key. Blockchain technology, with its decentralized, tamper-proof, and distributed features, can provide a new solution for multiserver authentication schemes. In a lot of multiserver authentication schemes, users’ permission is generally controlled by the registration center (RC), but these permission control methods cannot be applied in the decentralized blockchain system. In this paper, a blockchain-based authentication scheme for multiserver architecture is proposed. Our scheme provides a hierarchical authentication method to solve the problems of user permission control and user revocation caused by no registration center. The security of our scheme is formally proved under the random oracle model. According to our analysis, our scheme is resistant to attacks such as impersonation attacks and man-in-the-middle attacks. In addition, our performance analysis shows that the proposed scheme has less computation overhead.
APA, Harvard, Vancouver, ISO, and other styles
17

Shtennikov, Dmitry Gennadevich, Kirill Sergeevich Kuzmin, and Nikolay Evgenevich Letov. "DEVELOPMENT AND ANALYSIS OF AUTHENTICATION METHOD FOR IOT DEVICES SOFTWARE ON THE NETWORK USING BLOCKCHAIN TECHNOLOGIES." ENVIRONMENT. TECHNOLOGIES. RESOURCES. Proceedings of the International Scientific and Practical Conference 2 (June 20, 2019): 126. http://dx.doi.org/10.17770/etr2019vol2.4066.

Full text
Abstract:
Currently, there is an unsolved problem of IoT device authentication in networks to ensure their security. Due to low performance, work with traditional methods of protection is complicated and therefore a different approach is required. The article proposes a method for authenticating IoT devices (devices and software) by verifying their data and then entering it into the data storage. The implementation of a data storage using blockchain technology and the comparison of its efficiency with a classical database are considered. The aim of research is evelopment of the IoT device authentication method, analysis of the effectiveness and applicability of the developed method and comparison of various technological approaches to solving the problem. Obtained results is evaluation parameters of the resulting system and methods for constructing systems based on this method.
APA, Harvard, Vancouver, ISO, and other styles
18

Pranata, Sunderi, Hargyo Tri Nugroho, and Hirofumi Yamaki. "Analisis dan Implementasi Protokol Otentikasi FIDO U2F." Jurnal ULTIMA Computing 9, no. 1 (June 16, 2017): 30–35. http://dx.doi.org/10.31937/sk.v9i1.571.

Full text
Abstract:
It is known that password itself is not enough for formidable authentication method since it has a lot of vulnerabilities. Multi factor authentication (MFA) is introduced for the next generation for good authentication to address that issue. MFA combines two or more of three principles of good security, “something you know”, “something you have”, and “something you are”. Most MFA mechanisms work as one time passwords (OTP). However, they can still be vulnerable to phishing and MiTM attack. On top of that, OTP can be hard to use as it requires user to input another password given by the device (SMS, token, authenticator). Implemented in small USB U2F device, FIDO U2F delivers easier yet stronger security on authentication process which implements public key cryptography, challenge-response protocol, and phishing and MitM protection. Index Terms— Authentication protocol, FIDO U2F, Multi factor authentication, OTP
APA, Harvard, Vancouver, ISO, and other styles
19

Inoue, Minori, and Takefumi Ogawa. "TapOnce: a novel authentication method on smartphones." International Journal of Pervasive Computing and Communications 14, no. 1 (April 3, 2018): 33–48. http://dx.doi.org/10.1108/ijpcc-d-18-00006.

Full text
Abstract:
Purpose Security technology on mobile devices is increasingly more important as smartphones are becoming more versatile and, thus, store more sensitive information. Among the three indispensable factors of owner authentication technologies on mobile devices, security, usability and system efficiency, usability is considered the key factor. This paper aims to challenge the limits of usability on mobile device authentication technology with respect to input size. Design/methodology/approach This paper introduces one tap authentication as a novel authentication method on mobile devices. A user just has to tap the screen of a smartphone once, and he or she will be authenticated. Findings One tap authentication is proven possible in this paper. The average equal error rate among 10 owners against 25 unauthorized users is as low as 3.8. Research limitations/implications This paper focuses on verifying the possibility on one tap authentication. However, the application to various environments, such as when standing or walking or on a train, is not explored. Originality/value This research explores tap authentication with a single tap for the first time in the field. To the best of the authors’ knowledge, the minimum number of taps required in tap authentication has been 4.
APA, Harvard, Vancouver, ISO, and other styles
20

Yein, Alan Dahgwo, Chih-Hsueh Lin, Yu-Hsiu Huang, Wen-Shyong Hsieh, Chung-Nan Lee, and Pin-Chun Kuo. "A novel message authentication method for VANET without RSU." Engineering Computations 33, no. 8 (November 7, 2016): 2288–301. http://dx.doi.org/10.1108/ec-08-2015-0255.

Full text
Abstract:
Purpose Riding on the wave of intelligent transportation systems, the vehicular ad hoc network (VANET) is becoming a popular research topic. VANET is designed to build an environment where the vehicles can exchange information about the traffic conditions or vehicle situation to help the vehicles avoid traffic accidents or traffic jams. In order to keep the privacy of vehicles, the vehicles must be anonymous and the routing must be untraceable while still being able to be verified as legal entities. The paper aims to discuss these issues. Design/methodology/approach The exchanged messages must be authenticated to be genuine and verified that they were sent by a legal vehicle. The vehicles also can mutually trust and communicate confidentially. In VANETs, road-side units (RSUs) are installed to help the vehicles to obtain message authentication or communicate confidentially. However, the coverage of RSUs is limited due to the high cost of wide area installation. Therefore the vehicles must be able to obtain message authentication by themselves – without an RSU. Findings The authors take the concept of random key pre-distribution used in wireless sensor networks, modify it into a random secret pre-distribution, and integrate it with identity-based cryptography to make anonymous message authentication and private communication easier and safer. The authors construct a two-tier structure. The tier 1, trust authority, assigns n anonymous identities and embeds n secrets into these identities to be the private secret keys for the tier 2, registered vehicles. At any time, the vehicles can randomly choose one of n anonymous identities to obtain message authentication or communicate confidentially with other vehicles. Originality/value The processes of building neighbor set, setting pairing value, and message authenticating are proposed in this paper. The proposed method can protect against the attacks of compromising, masquerading, forging, and replying, and can also achieve the security requirements of VANET in message authentication, confidential communication, anonymity, and un-traceability. The performance of the proposed method is superior to the related works.
APA, Harvard, Vancouver, ISO, and other styles
21

Jia, Li. "Unified Login Authentication Method Based on Cloud Computing." Advanced Materials Research 926-930 (May 2014): 2245–48. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2245.

Full text
Abstract:
According to the single sign-on authentication mode, cloud computing unified login authentication method was put forward, and point set topology changing method was used for generating fractal random key, improved login authentication safety grade. Firstly, analyzed cloud computing login authentication system structure, and then used network public databases of fingerprint image as an example do fractal changes ring operation, generated a pseudo-random sequence, then the sequence encrypted and sent to the server for authentication through UDP. Lastly, made a simulation example.
APA, Harvard, Vancouver, ISO, and other styles
22

Viddin, Irsandy Maulana Satya, Antonius Cahya Prihandoko, and Diksy Media Firmansyah. "An authentication alternative using histogram shifting steganography method." Jurnal Teknologi dan Sistem Komputer 9, no. 2 (February 26, 2021): 106–12. http://dx.doi.org/10.14710/jtsiskom.2021.13931.

Full text
Abstract:
This study aims to develop an authentication alternative by applying the Histogram shifting steganography method. The media used for authentication is image media. Histogram shifting utilizes the histogram of an image to insert a secret message. The developed authentication has implemented the Histogram shifting to insert user credentials into the carrier image. Users can use the steganographic image to log into their accounts. The method extracts the credentials from the image during the login. PSNR test of the steganographic images produces an average value of 52.52 dB. The extraction capability test shows that the method can extract all test images correctly. In addition, this authentication method is also more resistant to attacks common to password authentication.
APA, Harvard, Vancouver, ISO, and other styles
23

Wu, Da-Chun, and Yu-Tsung Hsu. "Authentication of LINE Chat History Files by Information Hiding." ACM Transactions on Multimedia Computing, Communications, and Applications 18, no. 1 (January 31, 2022): 1–23. http://dx.doi.org/10.1145/3474225.

Full text
Abstract:
With the prevalence of smartphones, message exchanges via mobile chatting programs like LINE have become popular. The messages in the form of chat records in a LINE chat history, after being downloaded for legal uses, might be tampered with illicitly. A novel method for authenticating the chat history against such attacks is proposed. The signal used for authenticating each chat-record segment is created by concatenating the ID label of the segment and a digest yielded by hashing the segment content. The signal is then encoded by three types of spacing code, namely half space, full space, and tab, and embedded into the blank-space areas created by the tab codes in the chat records of the segment. Authentication of a history file is accomplished by extracting the authentication signals embedded in the file and comparing them with the original signals computed directly from the file. The embedded signals are invisible, arousing no suspicion from the hacker. The signals are fragile, because any modification of the records can be detected by the authentication process. Experiments for testing four types of tampering with text files of four languages have been conducted, yielding correct authentication results that show the feasibility of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
24

Kang, Hyeok, Keun-Ho Lee, and Gui-Jung Kim. "Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authentication." Cluster Computing 22, S1 (November 22, 2017): 2017–26. http://dx.doi.org/10.1007/s10586-017-1234-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Malenko, Dmytro. "Comparison of the NFC authentication method with the methods available in Android." Journal of Computer Sciences Institute 15 (June 30, 2020): 121–25. http://dx.doi.org/10.35784/jcsi.2041.

Full text
Abstract:
Most multi-user applications need an access system so that users can log in from different devices. To identify a user, at least one authentication method must be used. The article presents a comparison of the authentication method using NFC technology with other methods that are available for Android devices and differ in both implementation and specific usage.
APA, Harvard, Vancouver, ISO, and other styles
26

Lee, Min-Gu, Dong-Wan Kim, and Jin-Soo Sohn. "Active Authentication Method using NFC." Journal of Korea Information and Communications Society 37, no. 2C (February 29, 2012): 140–56. http://dx.doi.org/10.7840/kics.2012.37c.2.140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

KONISHI, Kazuya, and Akihiro UMEMURA. "Authentication method for document images." Journal of Information Processing and Management 41, no. 9 (1998): 667–77. http://dx.doi.org/10.1241/johokanri.41.667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Qingqin Fu, Qingqin Fu, Zhengquan Ang Qingqin Fu, Ling Yi Zhengquan Ang, Pingjiang Xu Ling Yi, Jia Liu Pingjiang Xu, Zhaoqing Liang Jia Liu, Lili Fu Zhaoqing Liang, Chaobin Yang Lili Fu, and Gaolin Fan Chaobin Yang. "A New Terminal and Electric Meter Legality Authentication Method." 電腦學刊 32, no. 6 (December 2021): 176–82. http://dx.doi.org/10.53106/199115992021123206015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Rajasingh, J. Paul, and D. Sai Yaswanth. "Fingerprint Authentication." International Journal of Engineering and Advanced Technology 10, no. 5 (June 30, 2021): 87–89. http://dx.doi.org/10.35940/ijeat.e2651.0610521.

Full text
Abstract:
Biometrics refers to the automatic identification of a living person based on physiological or behavioural characteristics for authentication purpose. Among the existing biometric technologies are the face recognisation, fingerprint recognition, finger-geometry, hand geometry, iris recognition, vein recognition, voice recognition and signature recognition, Biometric method requires the physical presence of the person to be identified. This emphasizes its preference over the traditional method of identifying what you have such as, the use of password, a smartcard etc. Also, it potentially prevents unauthorized admittance to access control systems or fraudulent use of ATMs, Time Attendance Systems, cellular phones, smart cards, desktop PCs, Workstations, vehicles and computer networks. Biometric recognition systems offer greater security and convenience than traditional methods of personal recognition.
APA, Harvard, Vancouver, ISO, and other styles
30

Shdefat, Ahmed Younes, Moon-Il Joo, Sung-Hoon Choi, and Hee-Cheol Kim. "Utilizing ECG Waveform Features as New Biometric Authentication Method." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 2 (April 1, 2018): 658. http://dx.doi.org/10.11591/ijece.v8i2.pp658-665.

Full text
Abstract:
<p>In this study, we are proposing a practical way for human identification based on a new biometric method. The new method is built on the use of the electrocardiogram (ECG) signal waveform features, which are produced from the process of acquiring electrical activities of the heart by using electrodes placed on the body. This process is launched over a period of time by using a recording device to read and store the ECG signal. On the contrary of other biometrics method like voice, fingerprint and iris scan, ECG signal cannot be copied or manipulated. The first operation for our system is to record a portion of 30 seconds out of whole ECG signal of a certain user in order to register it as user template in the system. Then the system will take 7 to 9 seconds in authenticating the template using template matching techniques. 44 subjects‟ raw ECG data were downloaded from Physionet website repository. We used a template matching technique for the authentication process and Linear SVM algorithm for the classification task. The accuracy rate was 97.2% for the authentication process and 98.6% for the classification task; with false acceptance rate 1.21%.</p>
APA, Harvard, Vancouver, ISO, and other styles
31

Chen, Wen, Wu, Xu, Jiang, Song, and Chen. "Radio Frequency Fingerprint-Based Intelligent Mobile Edge Computing for Internet of Things Authentication." Sensors 19, no. 16 (August 19, 2019): 3610. http://dx.doi.org/10.3390/s19163610.

Full text
Abstract:
In this paper, a light-weight radio frequency fingerprinting identification (RFFID) scheme that combines with a two-layer model is proposed to realize authentications for a large number of resource-constrained terminals under the mobile edge computing (MEC) scenario without relying on encryption-based methods. In the first layer, signal collection, extraction of RF fingerprint features, dynamic feature database storage, and access authentication decision are carried out by the MEC devices. In the second layer, learning features, generating decision models, and implementing machine learning algorithms for recognition are performed by the remote cloud. By this means, the authentication rate can be improved by taking advantage of the machine-learning training methods and computing resource support of the cloud. Extensive simulations are performed under the IoT application scenario. The results show that the novel method can achieve higher recognition rate than that of traditional RFFID method by using wavelet feature effectively, which demonstrates the efficiency of our proposed method.
APA, Harvard, Vancouver, ISO, and other styles
32

Li, Min Song. "A Kind of Copyright Protection Method Based on Computer Fingerprint." Advanced Materials Research 181-182 (January 2011): 825–29. http://dx.doi.org/10.4028/www.scientific.net/amr.181-182.825.

Full text
Abstract:
This paper advances a kind of method based on binding of computer Fingerprint and Related registration information of software, it can encapsulate digital content with encryption algorithm in order to authenticating the legal registered users by employing authentication technology and plug-in technology on the base of cooperation of Server and Client. The method of realizing the collection of machine fingerprint by using interruption technology is explained in detail and the encryption algorithm adopted is described detailedly.
APA, Harvard, Vancouver, ISO, and other styles
33

Lavanya, D. L., R. Ramaprabha, and K. Gunaseelan. "Privacy Preserving Physical Layer Authentication Scheme for LBS based Wireless Networks." Defence Science Journal 71, no. 2 (March 10, 2021): 241–47. http://dx.doi.org/10.14429/dsj.71.15355.

Full text
Abstract:
With the fast development in services related to localisation, location-based service (LBS) gains more importance amongst all the mobile wireless services. To avail the service in the LBS system, information about the location and identity of the user has to be provided to the service provider. The service provider authenticates the user based on their identity and location before providing services. In general, sharing location information and preserving the user’s privacy is a highly challenging task in conventional authentication techniques. To resolve these challenges in authenticating the users, retaining users’ privacy, a new SVD (singular value decomposition) based Privacy Preserved Location Authentication Scheme (SPPLAS) has been proposed. In this proposed method, physical layer signatures such as channel state information (CSI) and carrier frequency offset (CFO) are used for generating secret key required for encrypting the user’s location and identity information, and thus encrypted user’s information is sent to service provider for authentication. Secret key is generated by applying SVD on CSI vector. The proposed scheme aids in authenticating the user through location information while protecting the user’s privacy. The performance of the proposed method is evaluated in terms of bit mismatch, leakage and bit error rate performance of receiver and adversary. The simulation results show that the proposed scheme achieves better robustness and security than the existing location-based authentication techniques.
APA, Harvard, Vancouver, ISO, and other styles
34

Park, Hyun, and TaeGuen Kim. "User Authentication Method via Speaker Recognition and Speech Synthesis Detection." Security and Communication Networks 2022 (January 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/5755785.

Full text
Abstract:
As the Internet has been developed, various online services such as social media services are introduced and widely used by many people. Traditionally, many online services utilize self-certification methods that are made using public certificates or resident registration numbers, but it is found that the existing methods pose the risk of recent personal information leakage accidents. The most popular authentication method to compensate for these problems is biometric authentication technology. The biometric authentication techniques are considered relatively safe from risks like personal information theft, forgery, etc. Among many biometric-based methods, we studied the speaker recognition method, which is considered suitable to be used as a user authentication method of the social media service usually accessed in the smartphone environment. In this paper, we first propose a speaker recognition-based authentication method that identifies and authenticates individual voice patterns, and we also present a synthesis speech detection method that is used to prevent a masquerading attack using synthetic voices.
APA, Harvard, Vancouver, ISO, and other styles
35

Shrivastava, Khusboo, and Harish Sahu. "To Survey Graphical Password Verification Method." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 247–51. http://dx.doi.org/10.22214/ijraset.2022.47855.

Full text
Abstract:
Abstract: In this present time, authentication is the way of giving persons access to system object based on user's uniqueness. If the codes match, the process will be succeed and user will get the consent to access the system. Text based password scheme follows the guidelines such as at least 8 characters long, should combine upper-case and lower-case and digit. user have problem to remember their complicated password over time due to the limitation of human brain, user tend to forget about their password. User tend to use the same password for all type of account. So if one account is hacked, the possibility for other account to be hack is a high. Graphical password can be used as alternative to solve the issue related to the text-based authentication based on the fact that humans can tend to remember pictures batter then text. Now a day’s many computer system, Network and internet based environment are trying to use of graphical authentication technique in this paper we make a survey of the basic authentication and its technique and also presents a comprehensive study of graphical password authentication method and graphical password system.
APA, Harvard, Vancouver, ISO, and other styles
36

Guo, Wen Zhuo. "An Optimized RFID Unidirectional Authentication Method." Applied Mechanics and Materials 490-491 (January 2014): 1734–38. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1734.

Full text
Abstract:
To solve the problems of consumers security and privacy, an optimized RFID unidirectional authentication method is proposed, comparing with other asymmetric cryptography, this method has stronger security, shorter key length, less computation and so on. This method achieves one-way authentication between tag and reader-writer, and allow the labels to automatically update the key to improve the performance of RFID authentication, and also can enhance security through updating keys. This method allows the label to update its own name and private key, so can prevent attackers tracking them, so as to solve the privacy problem of the tags.
APA, Harvard, Vancouver, ISO, and other styles
37

Zhang, LiMing, and XinGang Zhang. "New Authentication Method for Vector Geographic Data Based on Perceptual Hash." Abstracts of the ICA 1 (July 15, 2019): 1–2. http://dx.doi.org/10.5194/ica-abs-1-431-2019.

Full text
Abstract:
<p><strong>Abstract.</strong> In the Internet era, vector data can conveniently be stored, distributed and disseminated. This make it convenience for people to use them, and also make it easier for people to edit or modify them, which can reduce the credibility of Geo-information. Traditionally, authentication is done by using a hash function to generate a digital signature for data authentication. However, this method is very sensitive for change even one bit and it is appropriate for accurate authentication such as text. For geographic data, it may experience lossy compression, filtering distortion, geometric transformation, noise pollution, etc. during transmission and application, but it is consistent with the original data perception. Therefore, the traditional cryptography authentication method is not applicable to the robust authentication of geographic data.</p><p>Among various authentication techniques, perceptual hashing is a promising solution. Perceptual hashing is a type of unidirectional mapping of multimedia data sets to perceptual digest sets, that is, a multimedia digital representation with the same perceptual content is uniquely mapped into a piece of digital digest, and satisfies perceptual robustness and security. Since a perceptual hash value is a compact representation of the original content, it can be used for robust content authentication of vector geographic data. The advantage of perceptual hashing algorithms over traditional cryptographic hashing algorithms is that they can tolerate differences in quality and format. The same content is always mapped to the same hash value. This is very effective for robust authentication of geographic data.</p><p>In this work, we focus on vector geographic data content authentication by perceptual hash algorithms. In the research of vector geographic data authentication, there are usually some authentication methods based on statistics, rough representation of images and extraction of mutation points based on wavelet transform. However, these methods are more or less sensitive to geometric transformation, poor anti-aggression, high complexity, and poor robustness. In order to avoid the shortcomings of traditional authentication algorithms, this paper proposes a vector geographic data authentication algorithm combining DCT and perceptual hashing. The algorithm has high robustness and security against attack, translation, rotation and two types of collusion attacks.</p>
APA, Harvard, Vancouver, ISO, and other styles
38

Li, Qiang, Wenlong Su, Peng Zhang, Xinzhou Cheng, Mingxin Li, and Yuanni Liu. "Blockchain-Based Method for Pre-Authentication and Handover Authentication of IoV Vehicles." Electronics 12, no. 1 (December 28, 2022): 139. http://dx.doi.org/10.3390/electronics12010139.

Full text
Abstract:
The Internet of Vehicles (IoV) is an important supporting technology for intelligent transportation systems that connects traffic participants, such as vehicles, pedestrians, and roads, through wireless networks and enables information exchange to enhance traffic safety and improve traffic efficiency. The IoV is a unique network that involves many network security risks, which must be controlled through authentication, encryption, and other protective measures. To solve problems, such as high computing overhead and low handover authentication efficiency of the existing vehicle access authentication of the IoV, a compact consensus pre-authentication and handover authentication method was designed based on blockchain features such as decentralization and security. The proposed method is based on ensuring authentication security and reduces the consensus time, saves computing resources, and effectively solves the problems of high computing cost and high communication cost arising from frequent vehicle authentication handovers. A performance and security analysis demonstrates that our approach can reduce the computational overhead by up to 88.14% for a vehicle and by more than 60% for a roadside unit (RSU). The overall communication overhead of the solution is reduced by up to 71.31%. The data illustrate that the proposed method can safely and significantly improve the efficiency of vehicle handover authentication.
APA, Harvard, Vancouver, ISO, and other styles
39

Gerami Moghaddam, Saman, Amin Nasiri, and Mohsen Sharifi. "ECCO Mnemonic Authentication—Two-Factor Authentication Method with Ease-of-Use." International Journal of Computer Network and Information Security 6, no. 7 (June 8, 2014): 11–18. http://dx.doi.org/10.5815/ijcnis.2014.07.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Noratiqah Md Ariffin, Siti, Mohd Fadzil Abdul Kadir, Ahmad Nazari Mohd Rose, Mohamad Afendee Mohamed, and Abd Rasid Mamat. "User Authentication Using Grid Based Method." International Journal of Engineering & Technology 7, no. 2.14 (April 6, 2018): 97. http://dx.doi.org/10.14419/ijet.v7i2.14.11442.

Full text
Abstract:
Grid recognition authentication is a method of securing user logins. This project is based on user authentication in Smartphone using grid, images, and pattern. It is an innovation from the existing security lock that used in the Smartphone. A smartphone usually consists the authentication techniques such as draw a pattern or inserting a password. But nowadays, those techniques are not completely secure because it is very easy to break through different type of attack like brute force, dictionary attack or key logger. In this project, a tool based Grid Based Method will be developed which is important to increase the security of the smartphone that using an iOS platform. By using this tool, the codes are difficult to break because the grids are hidden behind the image. Users can identify the cells that were selected in a grid during the registration stage.
APA, Harvard, Vancouver, ISO, and other styles
41

Evwiekpaefe, A. E., and V. O. Eyinla. "Implementing fingerprint authentication in computer-based tests." Nigerian Journal of Technology 40, no. 2 (October 18, 2021): 284–91. http://dx.doi.org/10.4314/njt.v40i2.14.

Full text
Abstract:
The use of computers to conduct examinations is more effective than traditional paper-based examinations in terms of immediate availability of results and long term cost effectiveness. This however is faced with identifying and authenticating the real identities of the examinees so as to reduce impersonation. The study examined the existing authentication method available on the Computer-based test system of Air Force Institute of Technology (AFIT), Kaduna, Nigeria and proposed the fingerprint biometric technique as an additional method to authenticate the examinees. The fingerprint biometric authentication was developed using FlexCode SDK and implemented on DigitalPersona 4500 fingerprint reader – the recommended scanner by JAMB for fingerprint enrollment. The system was developed using PHP scripting language on XAMPP local server and MySQL database system. The results obtained showed that there is no need for a middleware to link the authentication module with the CBT because of the Single Sign-On technique implemented. This result thus improved the level of authentication and access to the CBT. This will therefore reduce impersonation and increase the level of awareness of CBT by academic stakeholders.
APA, Harvard, Vancouver, ISO, and other styles
42

Bao, Song De. "A Security Authentication Method of Mobile RFID." Advanced Materials Research 268-270 (July 2011): 1077–81. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1077.

Full text
Abstract:
As the internet technology develops, the application of mobile RFID becomes more and more common. Since mobile RFID label is easier to be read and attacked by hacker, personal information of the users is leaked. Present authentication mechanisms in application are either made into RFID hardware with complex design or with weaker security protection ability. The paper proposes a new security authentication mechanism and the test result shows that the authentication mechanism may effectively prevent various attack behaviors of hack with the base of low cost so as to reach the objective of protecting personal privacy of card holder.
APA, Harvard, Vancouver, ISO, and other styles
43

Divakaran, J., S. K. Prashanth, Gouse Baig Mohammad, Dr Shitharth, Sachi Nandan Mohanty, C. Arvind, K. Srihari, Yasir Abdullah R., and Venkatesa Prabhu Sundramurthy. "Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications." Journal of Healthcare Engineering 2022 (January 7, 2022): 1–8. http://dx.doi.org/10.1155/2022/2500377.

Full text
Abstract:
Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in health-related services. In this paper, we model an evolutionary model that uses a fuzzy evolutionary model in maintaining the handover and key management to improve the performance of authentication in nanocore technology-based 5G networks. The model is designed in such a way that it minimizes the delays and complexity while authenticating the networks in 5G networks. The attacks are mitigated using an evolutionary model when it is trained with the relevant attack datasets, and the model is validated to mitigate the attacks. The simulation is conducted to test the efficacy of the model, and the results of simulation show that the proposed method is effective in improving the handling and authentication and mitigation against various types of attacks in mobile health applications.
APA, Harvard, Vancouver, ISO, and other styles
44

Patel, Subhash Chandra, Sumit Jaiswal, Ravi Shankar Singh, and Jyoti Chauhan. "Access Control Framework Using Multi-Factor Authentication in Cloud Computing." International Journal of Green Computing 9, no. 2 (July 2018): 1–15. http://dx.doi.org/10.4018/ijgc.2018070101.

Full text
Abstract:
The most challenging issues in cloud computing are access control and data security because users of the cloud outsource sensitive data and information to cloud provider servers, which are not within the same trusted domain as the data owner. Within cloud computing, various services and resources need protection from unauthorized use as a part of the security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authentication is the commonly used method to determine the identity of the remote client. In this article, the authors have proposed a systematic method for authenticating clients, namely by using a password, biometrics, and out-of-band-based access control mechanisms that are suitable for access control. The proposed system involves user ID/password, biometrics characteristics, and a mobile phone as a software token for one-time password generation.
APA, Harvard, Vancouver, ISO, and other styles
45

Moon, Soo Young, and Tae Ho Cho. "A Routing Path Construction Method for Key Dissemination Messages in Sensor Networks." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/185156.

Full text
Abstract:
Authentication is an important security mechanism for detecting forged messages in a sensor network. Each cluster head (CH) in dynamic key distribution schemes forwards a key dissemination message that contains encrypted authentication keys within its cluster to next-hop nodes for the purpose of authentication. The forwarding path of the key dissemination message strongly affects the number of nodes to which the authentication keys in the message are actually distributed. We propose a routing method for the key dissemination messages to increase the number of nodes that obtain the authentication keys. In the proposed method, each node selects next-hop nodes to which the key dissemination message will be forwarded based on secret key indexes, the distance to the sink node, and the energy consumption of its neighbor nodes. The experimental results show that the proposed method can increase by 50–70% the number of nodes to which authentication keys in each cluster are distributed compared to geographic and energy-aware routing (GEAR). In addition, the proposed method can detect false reports earlier by using the distributed authentication keys, and it consumes less energy than GEAR when the false traffic ratio (FTR) is ≥10%.
APA, Harvard, Vancouver, ISO, and other styles
46

kumar, N. Shantha, and Dr Hareesh K. "A Primitive Proposal of an Algorithm for IP and Mac Based Data Aggregation and message authentication in Wireless Sensor Networks." International Journal of Soft Computing and Engineering 9, no. 4 (November 5, 2019): 14–17. http://dx.doi.org/10.35940/ijsce.c3322.109119.

Full text
Abstract:
In wireless sensor networks(WSN) ,authentication of messages is the highly important function in preventing threats from un wanted , un authorized and corrupt messages from being sent. There are various message verification and authentication methods have been proposed as well as developed based on cryptography technology such as symmetric key cryptographic systems or public-key cryptographic systems. Also there are many different techniques available based on polynomial-based schemes, elliptic curve cryptography (ECC) and so on. All the above said methods have its own merits and demerits. In this research work a new method of authenticating the message by its IP and MAC address (together encrypting) and analysing the encrypted message to find the authenticity of the message and the node which has sent the message at collecting node will be carried out.
APA, Harvard, Vancouver, ISO, and other styles
47

Vasin, N. N., and R. W. Chigir. "Devices authentication method for sensor networks." Infokommunikacionnye tehnologii 15, no. 3 (September 2017): 268–73. http://dx.doi.org/10.18469/ikt.2017.15.3.09.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Hirakawa, Yutaka, Ayaka Shimoda, Isao Sasano, and Kazuo Ohzeki. "Improvements in a Puzzle Authentication Method." Journal of Computer and Communications 06, no. 01 (2018): 12–20. http://dx.doi.org/10.4236/jcc.2018.61002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Seo, Hwa-Jeong, and Ho-Won Kim. "User Authentication Method on VANET Environment." Journal of Korean Institute of Communications and Information Sciences 37, no. 7C (July 31, 2012): 576–83. http://dx.doi.org/10.7840/kics.2012.37.7c.576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

NAKANO, Ken, Jun HYODO, and Tomoya TATEISHI. "Biometric Authentication Method using Tactile Information." Transactions of the Japan Society of Mechanical Engineers Series C 71, no. 709 (2005): 2769–75. http://dx.doi.org/10.1299/kikaic.71.2769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography