49 research outputs found

    Secure Improved Cloud-Based RFID Authentication Protocol

    Get PDF

    Genetic characterization of Barbari goats using microsatellite markers

    Get PDF
    Genetic variation in Barbari goats, a highly prolific breed distributed widely in the northern part of India, known for better milk and meat quality, was studied as a part of genetic characterization and conservation. The genomic DNA from 50 unrelated Barbari goats were amplified via PCR with a panel of 21 microsatellite markers, and resolved through 6 per cent denaturing polyacrylamide gel electrophoresis followed by silver staining. The number of alleles ranged from 4 to 11, with allele sizes ranging from 88 to 220 bp. The distribution of allele frequencies was between 0.0104 and 0.5208. Polymorphism information content varied from 0.5563 to 0.8348. The population was not in Hardy-Weinberg equilibrium for all except two microsatellite loci (ILSTS044 and ILSTS060). The observed heterozygosity ranged from 0.8478 to 1.0000 while the expected heterozygosity ranged from 0.6208 to 0.8509. Based on the results of the present study, there is a good scope for exploiting the genetic variability in the Barbari goats for further improvement of performance

    Private and Secure Public-Key Distance Bounding: Application to NFC Payment

    Get PDF
    Distance-Bounding is used to defeat relay attacks. For wireless payment systems, the payment terminal is not always online. So, the protocol must rely on a public key for the prover (payer). We propose a generic transformation of a (weakly secure) symmetric distance bounding protocol which has no post-verification into wide-strong-private and secure public-key distance bounding

    A Forward Privacy Model for RFID Authentication Protocols

    No full text
    Part 3: Smart Cards and Embedded DevicesInternational audienceIn this paper, we propose a new variant of indistinguishability-based security model for the RFID authentication protocol, which allows an adversary to obtain an authentication result and secret key of a target tag. Ng et al. showed that symmetric-key based RFID authentication protocols cannot be resilient to the above information leakage simultaneously in the Paise-Vaudenay security model. We review the existing result and extend the Juels-Weis security model to satisfy these properties by using a suitable restriction. Moreover, we give two example protocols that satisfy the modified security model

    Tailoring the Optical Bandgap of Pulse Electrodeposited CoFe2O4 Thin Films

    No full text
    International audienc

    Secure Improved Cloud-Based RFID Authentication Protocol

    No full text

    Chemical composition and antioxidant activity of extracts from Moroccan fresh fava beans pods (Vicia Faba L.).

    No full text
    Background. In Morocco, fava beans are widely used as a main meal or as an ingredient in various traditional recipes, in the form of fresh ripe seeds or dry seeds. In the past, the tender skin of bean pods was also used in certain specific dishes, thus diversifying the diet. However, the peels of the tender bean pods are currently less or not used and considered waste. In Moroccan, fava bean pods peels, traditionally used in food in the past, are today considered as waste. The valorization of fresh fava bean pods could revitalize the use of the specific dishes and diversify the diet. For this reason, the research aimed to assess the nutritional values and biological compounds of the whole fresh fava bean pods (Vicia faba L.). Objective. Evaluate the content of nutrients, total phenolic, flavonoids and tannin contents and antioxidant activity in different extracts of the tender pods of the fava bean (Vicia faba L.). Material and methods. The proximate composition and minerals were determined using AOAC methods. The total phenolic compounds by the Folin-Ciocalteu reagent, the total flavonoids were analyzed using aluminum chloride colorimetric method, the tannins by method of vanillin in an acidic medium and the antioxidant activity was evaluated by DPPH method. Results. The results show that the fresh fava bean pods have a moisture content of 87.31 ± 0.25%, ash 4.67 ± 1.03, and protein 29.11 ± 3.20 g/100 g. The legume samples also contain potassium (1946.8±4.61), phosphorus (483.8 ± 3.14), and calcium (399.6 ±2.25) mg/100 g of dry matter representing at last 40-50% of the RDI. The content of the different extracts of (Vicia faba L) varied from 49.5 to 594.4 mg GAE/ g for the total phenols, from 0.7 mg to 3.4 mg QE/g for flavonoids, and from 4.9 mg to 73.91 mg TAE/g dry weight for tannins. The evaluation of the antioxidant activity in the various extracts revealed a better activity in the methanolic extract (IC50=491.2 μg/mL) compared to others extracts: the MeOH/water extract (IC50=606.61 μg/mL), DCM/ MeOH extract (IC50 = 642.67 μg/mL) and DCM extract below of 50%. Conclusions. This study shows that fava bean pods, traditionally used in food, are rich in macro and micronutrients and bioactive substances, which demonstrates their potential contribution to human food and nutritional security

    Face antispoofing based on frame difference and multilevel representation

    No full text
    Abstract Due to advances in technology, today’s biometric systems become vulnerable to spoof attacks made by fake faces. These attacks occur when an intruder attempts to fool an established face-based recognition system by presenting a fake face (e.g., print photo or replay attacks) in front of the camera instead of the intruder’s genuine face. For this purpose, face antispoofing has become a hot topic in face analysis literature, where several applications with antispoofing task have emerged recently. We propose a solution for distinguishing between real faces and fake ones. Our approach is based on extracting features from the difference between successive frames instead of individual frames. We also used a multilevel representation that divides the frame difference into multiple multiblocks. Different texture descriptors (local binary patterns, local phase quantization, and binarized statistical image features) have then been applied to each block. After the feature extraction step, a Fisher score is applied to sort the features in ascending order according to the associated weights. Finally, a support vector machine is used to differentiate between real and fake faces. We tested our approach on three publicly available databases: CASIA Face Antispoofing database, Replay-Attack database, and MSU Mobile Face Spoofing database. The proposed approach outperforms the other state-of-the-art methods in different media and quality metrics
    corecore