4,701 research outputs found
BIOMETRIC CRYPTOGRAPHY AND NETWORK AUTHENTICATION
In this paper we will present some schemes for strengthening network authentification over insecure channels with biometric concepts or how to securely transfer or use biometric characteristics as cryptographic keys. We will show why some current authentification schemes are insufficient and we will present our concepts of biometric hashes and authentification that rely on unimodal and multimodal biometrics. Our concept can be applied on any biometric authentification scheme and is universal for all systems
Improving the capacity of the ping-pong protocol
We present a quantum communication protocol which keeps all the properties of
the ping-pong protocol [Phys. Rev. Lett. 89, 187902 (2002)] but improves the
capacity doubly as the ping-pong protocol. Alice and Bob can use the variable
measurement basises in control mode to detect Eve's eavesdropping attack. In
message mode, Alice can use one unitary operations to encode two bits
information. Bob only needs to perform a Bell type measurement to decode
Alice's information. A classical message authentification method can protect
this protocol against the eavesdropping hiding in the quantum channel losses
and the denial-of-service (DoS) attack.Comment: 3page; PACS:03.67.Hk, 03.65.U
Анализ технологии предварительной обработки данных при аутентификации пользователей компьютерных систем по клавиатурному и рукописному почеркам
In this article the stages of formation of a database of educational
samples at the authentification on keyboard handwriting and at the authentification on
hand-written handwriting are submitted. The stages of preprocessing of analyzable
analyzed data at the specified two kinds of authentification are stated. The necessity of
such processing is argued
A Formal TLS Handshake Model in LNT
Testing of network services represents one of the biggest challenges in cyber
security. Because new vulnerabilities are detected on a regular basis, more
research is needed. These faults have their roots in the software development
cycle or because of intrinsic leaks in the system specification. Conformance
testing checks whether a system behaves according to its specification. Here
model-based testing provides several methods for automated detection of
shortcomings. The formal specification of a system behavior represents the
starting point of the testing process. In this paper, a widely used
cryptographic protocol is specified and tested for conformance with a test
execution framework. The first empirical results are presented and discussed.Comment: In Proceedings MARS/VPT 2018, arXiv:1803.0866
R behind the scenes: Using S the (un)usual way
R is not only a program for analyzing and visualizing data, it is an
open and programmable software environment. It can not only easily
access other programs written in a wide variety of languages, but also
be accessed itself from other programs. As such, it can be seen as the
computational Swiss army knife of statistics. Connecting a program to
R can be surprisingly simple, and once the connection is established,
the perhaps largest existing collection of statistical methodology is
available through a unified interface. Embedding R can save a lot of
human time by automating routine tasks, but more importantly, it often
gives a simple way of making our methods accessible to a much wider
audience
A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification
For practical automatic speaker verification (ASV) systems, replay attack
poses a true risk. By replaying a pre-recorded speech signal of the genuine
speaker, ASV systems tend to be easily fooled. An effective replay detection
method is therefore highly desirable. In this study, we investigate a major
difficulty in replay detection: the over-fitting problem caused by variability
factors in speech signal. An F-ratio probing tool is proposed and three
variability factors are investigated using this tool: speaker identity, speech
content and playback & recording device. The analysis shows that device is the
most influential factor that contributes the highest over-fitting risk. A
frequency warping approach is studied to alleviate the over-fitting problem, as
verified on the ASV-spoof 2017 database
Chosing method of the keystroking data segmentation for increasing authentification accuracy
Chosing method of the keystroking data segmentation for increasing authentification accurac
Mobile payments: moving towards a wallet in the cloud?
This article deals with mobile payments in developed countries. Even though it only accounts for a relatively small share of the market (between 10% and 20%), mobile payment merits in-depth analysis in developed countries as there are many economic and technological issues that still need to be addressed.mobile payments, NFC
- …