19,079 research outputs found
Some remarks on authentication systems
Brickell, Simmons and others have discussed doubly perfect authentication systems in which an opponent\u27s chance of deceiving the receiver is a minimum for a given number of encoding rules. Brickell has shown that in some instances to achieve this minimum the system needs to have splitting. Such a system uses a larger message space. Motivated by Brickell\u27s ideas we consider authentication systems with splitting and the problems of reducing the message space
Roadmap on optical security
Postprint (author's final draft
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes
With their increasing popularity in cryptosystems, biometrics have attracted more and more attention from the information security community. However, how to handle the relevant privacy concerns remains to be troublesome. In this paper, we propose a novel security model to formalize the privacy concerns in biometric-based remote authentication schemes. Our security model covers a number of practical privacy concerns such as identity privacy and transaction anonymity, which have not been formally considered in the literature. In addition, we propose a general biometric-based remote authentication scheme and prove its security in our security model
A survey on subjecting electronic product code and non-ID objects to IP identification
Over the last decade, both research on the Internet of Things (IoT) and
real-world IoT applications have grown exponentially. The IoT provides us with
smarter cities, intelligent homes, and generally more comfortable lives.
However, the introduction of these devices has led to several new challenges
that must be addressed. One of the critical challenges facing interacting with
IoT devices is to address billions of devices (things) around the world,
including computers, tablets, smartphones, wearable devices, sensors, and
embedded computers, and so on. This article provides a survey on subjecting
Electronic Product Code and non-ID objects to IP identification for IoT
devices, including their advantages and disadvantages thereof. Different
metrics are here proposed and used for evaluating these methods. In particular,
the main methods are evaluated in terms of their: (i) computational overhead,
(ii) scalability, (iii) adaptability, (iv) implementation cost, and (v) whether
applicable to already ID-based objects and presented in tabular format.
Finally, the article proves that this field of research will still be ongoing,
but any new technique must favorably offer the mentioned five evaluative
parameters.Comment: 112 references, 8 figures, 6 tables, Journal of Engineering Reports,
Wiley, 2020 (Open Access
Recommended from our members
A two‐step authentication framework for Mobile ad hoc networks
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to determine if its peer nodes can be trusted. An additional concern in such an environment is with whether a peer node is merely relaying a message or if it is the originator of the message. In this paper, we propose an authentication approach for protecting nodes in mobile ad hoc networks. The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using several authentication protocols are analyzed. Protocols based on zero knowledge and challenge response techniques are presented and their performance is evaluated through analysis and simulation
Architectural Adequacy and Evolutionary Adequacy as Characteristics of a Candidate Informational Money
For money-like informational commodities the notions of architectural
adequacy and evolutionary adequacy are proposed as the first two stages of a
moneyness maturity hierarchy. Then three classes of informational commodities
are distinguished: exclusively informational commodities, strictly
informational commodities, and ownable informational commodities. For each
class money-like instances of that commodity class, as well as monies of that
class may exist.
With the help of these classifications and making use of previous assessments
of Bitcoin, it is argued that at this stage Bitcoin is unlikely ever to evolve
into a money. Assessing the evolutionary adequacy of Bitcoin is perceived in
terms of a search through its design hull for superior design alternatives.
An extensive comparison is made between the search for superior design
alternatives to Bitcoin and the search for design alternatives to a specific
and unconventional view on the definition of fractions.Comment: 25 page
- …