Authentication

View this topic in
Authentication is the act of confirming the truth of an attribute of a datum or entity. (Wikipedia.org)






Conferences related to Authentication

Back to Top

2016 IEEE International Conference on Image Processing (ICIP)

Signal processing, image processing, biomedical imaging, multimedia, video, multidemensional.


2015 IEEE Wireless Communications and Networking Conference (WCNC)

IEEE WCNC is the premier wireless event for researchers, industry professionals, and academics interested in the latest development and design of wireless systems and networks. Sponsored by the IEEE Communications Society, IEEE WCNC has a long history of bringing together industry, academia, and regulatory bodies.


2014 IEEE Symposium on Security and Privacy (SP)

IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)


2013 15th International Conference on Advanced Communication Technology (ICACT)

Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.


2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)

The conference covers theory, design and application of computer networks and distributed computing and information systems.


More Conferences

Periodicals related to Authentication

Back to Top

Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Selected Areas in Communications, IEEE Journal on

All telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space, and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; communication theory; and wireless communications.


Systems Journal, IEEE

This publication provides a systems-level, focused forum for application-oriented manuscripts that address complex systems and system-of-systems of national and global significance.


Wireless Communications, IEEE Transactions on



Most published Xplore authors for Authentication

Back to Top

Xplore Articles related to Authentication

Back to Top

Content-Adaptive Semi-Fragile Watermarking for Image Authentication

Mohammed E. Al-Mualla 2007 14th IEEE International Conference on Electronics, Circuits and Systems, 2007

This paper presents a content-adaptive semi-fragile watermarking method for image authentication. The method is based on the semi-fragile watermark of Lin, Podilchuk, and Delp. However, the proposed method adapts the strength of the watermark and the detector type according to the content features of the image. Simulation results show that the proposed method outperforms the original method providing lower false ...


Performance Improvement of Face Recognition System by Decomposition of Local Features Using Discrete Wavelet Transforms

Neelamma K. Patil; S. Vasudha; Lokesh R. Boregowda 2013 International Symposium on Electronic System Design, 2013

As one of the most sought after applications of image analysis, face recognition has received significant attention, especially during the past two decades. Automatic human face recognition has received substantial attention in the recent few years, from researchers in biometrics, pattern recognition and computer vision communities, owing to the high demand for advanced security and authentication needs. Although the existing ...


Efficient detection of failure modes in electronic commerce protocols

S. Gurgens; J. Lopez; R. Peralta Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99, 1999

The design of key distribution and authentication protocols has been shown to be error-prone. These protocols constitute the part of more complex protocols used for electronic commerce transactions. Consequently, these new protocols are likely to contain flaws that are even more difficult to find. In this paper, we present a search method for detecting potential security flaws in such protocols. ...


Defining the framework for wireless-AMI security in smart grid

Rajiv. K. Bhatia; Varsha Bodade 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), 2014

In smart grid, critical data like monitoring data, usage data, state estimation, billing data etc are regularly being talked among its elements. So, security of such a system, if violated, results in massive losses and damages. By compromising with security aspect of such a system is as good as committing suicide. Thus in this paper, we have proposed security mechanism ...


A keypoint descriptor for alignment-free fingerprint matching

Ravi Garg; Shantanu Rane 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, 2013

Secure fingerprint authentication via encrypted-domain processing imposes constraints on the underlying feature extraction method: Firstly, it requires fixed-length feature vectors to be amenable to computing distances or correlations. Secondly, extra information must be stored in the clear so that the fingerprints can be aligned prior to feature extraction and secure comparison. These constraints potentially restrict the flexibility, increase computational complexity, ...


More Xplore Articles

Educational Resources on Authentication

Back to Top

eLearning

Content-Adaptive Semi-Fragile Watermarking for Image Authentication

Mohammed E. Al-Mualla 2007 14th IEEE International Conference on Electronics, Circuits and Systems, 2007

This paper presents a content-adaptive semi-fragile watermarking method for image authentication. The method is based on the semi-fragile watermark of Lin, Podilchuk, and Delp. However, the proposed method adapts the strength of the watermark and the detector type according to the content features of the image. Simulation results show that the proposed method outperforms the original method providing lower false ...


Performance Improvement of Face Recognition System by Decomposition of Local Features Using Discrete Wavelet Transforms

Neelamma K. Patil; S. Vasudha; Lokesh R. Boregowda 2013 International Symposium on Electronic System Design, 2013

As one of the most sought after applications of image analysis, face recognition has received significant attention, especially during the past two decades. Automatic human face recognition has received substantial attention in the recent few years, from researchers in biometrics, pattern recognition and computer vision communities, owing to the high demand for advanced security and authentication needs. Although the existing ...


Efficient detection of failure modes in electronic commerce protocols

S. Gurgens; J. Lopez; R. Peralta Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99, 1999

The design of key distribution and authentication protocols has been shown to be error-prone. These protocols constitute the part of more complex protocols used for electronic commerce transactions. Consequently, these new protocols are likely to contain flaws that are even more difficult to find. In this paper, we present a search method for detecting potential security flaws in such protocols. ...


Defining the framework for wireless-AMI security in smart grid

Rajiv. K. Bhatia; Varsha Bodade 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), 2014

In smart grid, critical data like monitoring data, usage data, state estimation, billing data etc are regularly being talked among its elements. So, security of such a system, if violated, results in massive losses and damages. By compromising with security aspect of such a system is as good as committing suicide. Thus in this paper, we have proposed security mechanism ...


A keypoint descriptor for alignment-free fingerprint matching

Ravi Garg; Shantanu Rane 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, 2013

Secure fingerprint authentication via encrypted-domain processing imposes constraints on the underlying feature extraction method: Firstly, it requires fixed-length feature vectors to be amenable to computing distances or correlations. Secondly, extra information must be stored in the clear so that the fingerprints can be aligned prior to feature extraction and secure comparison. These constraints potentially restrict the flexibility, increase computational complexity, ...


More eLearning Resources

IEEE-USA E-Books

  • Understanding the Use of a Campus Wireless Network

    Like many organizations, the University of Saskatchewan is deploying wireless access technology across the organization. Rather than complete coverage we have opted for incremental deployment, with our placement strategy driven by the demands of our users. Analysis of user behaviour is critical to our approach. We present the details of our methodology and results from our analysis to date. Authentication server logs and packet traces were gathered throughout the 2003/04 academic year and were analyzed to answer questions of where, when, how much, and for what our wireless network is used. We compare our current results to earlier measurements in order to show how a wireless network grows and usage changes over time. Such information is applicable to the evaluation of the wireless network design, the validation of simulation models and the planning of future network expansion, on our campus and others.

  • Distributed Access Control in Cloud Computing Systems

    With the tremendous increase in the number of distributed applications, the issue of distributed access control has become an important research topic for both academia and industry. In distributed computing environments like cloud computing or service computing, authentication and authorization are the two important functions to be performed, to make sure that unauthorized users do not access distributed system components. An effective access control mechanism is an essential security component as far as protecting the confidentiality, integrity, and availability (CIA) of information hosted in the cloud is concerned. An effective access control mechanism implemented in the cloud domain should be scalable, reliable, and robust and it should provide required features and procedures for identity provisioning, deprovisioning, authentication, authorization, accounting, and auditing. In this chapter, we discuss the issue of distributed access control, major features and functionalities, access control policies and models, distributed access control architecture for multicloud environments, trust, and identity management in cloud computing environments. Related work shows some of the major research activities in the area of distributed access control considering the advantages and disadvantages of the approaches that have been adopted. We conclude this chapter by discussing a few research issues in the area of distributed access control in the cloud environment.

  • Fast Handover Authentication Based on Mobility Prediction

    This chapter discusses the characteristics of VANETs and how vehicles are moving on the road. It presents a fast handover authentication scheme based on a vehicle's mobility prediction. First, the chapter introduces a two-layer network architecture based on WiMax and 802.11p, in which broadband wireless Internet access supports both vehicles' safety-related applications and general mobile users' entertainment-related applications. Next, it briefly talks about the multilayer perceptron (MLP) classifier. The proposed seamless authentication scheme is composed of the following four phases: initial vehicle authentication phase, movement prediction phase, preauthentication phase, and handover phase. The chapter analyzes the security properties of the proposed scheme. In particular, it shows how the scheme can effectively resist replay attack and provide forward secrecy. The chapter concludes with a discussion on the performance of the proposed preauthentication scheme.

  • Trust among the Algorithms: Ownership, Identity, and the Collaborative Stewardship of Information

    This chapter contains sections titled: Introduction, A Peculiar Anthropology, Identity, Authentication, and Anonymity, Crypto, Insider Threats and Collaborative Stewardship, Digital Rights Management and Its Discontents, Conclusion, Notes, References

  • IP Security

    This chapter contains sections titled: Introduction Security of Telecommunications Services Security Objectives OSI Model for Cryptographic Security Message Confidentiality Data Integrity Identification of Participants Authentication of Participants Access Control Nonrepudiation Secure Management of Cryptographic Keys Exchange of Secret Keys: Kerberos Exchange of Public Keys Certificate Management Applications for Network Management Encryption Cracks Summary Appendix I: Areas Related to Security Policies Appendix II: Principles of Symmetric Encryption AII.1 Modes of Algorithm Utilization for Block Encryption AII.2 Examples of Symmetric Block Encryption Algorithms Appendix III: Principles of Public Key Encryption AIII.1 RSA AIII.2 Public Key Cryptography Standards AIII.3 Pretty Good Privacy AIII.4 Elliptic Curve Cryptography Appendix IV: Principles of the Digital Signature Algorithm References

  • No title

    As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools -- are unable to protect data from attacks posed by those working on an organization's "inside." These "insiders" usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter One introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter Two covers authentication and access control techniques, and Chapter Three show how these general security techniques can be extended and used in the context of protection from insider threats. Chapter Four addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter Five. These tools aim at collecting, analyzing, and correlating -- in real-time -- any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter Six goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches hav been proposed for implementing SoD in systems. In Chapter Seven, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges -- such as a DBA in database management systems. Finally, in Chapter Eight, the book concludes with a few remarks and additional research directions. Table of Contents: Introduction / Authentication / Access Control / Anomaly Detection / Security Information and Event Management and Auditing / Separation of Duty / Case Study: Oracle Database Vault / Conclusion

  • ECPP: Efficient Conditional Privacy Preservation Protocol

    This chapter proposes the use of the novel Efficient Conditional Privacy Preservation (ECPP) protocol for secure vehicular communications. The proposed protocol gains merits in the rapid verification of safety messages and provides an efficient conditional privacy-tracking mechanism. The chapter also focuses on conditional privacy preservation, in which the two security issues, Efficient Safety Message Anonymous Authentication and Efficient Tracking on the Source of a Disputed Safety Message are addressed. The proposed ECPP protocol consists of four parts: system initialization, onboard units (OBU) short-time anonymous key generation, OBU safety message generation and sending, and OBU fast tracking algorithm. In analyzing the conditional privacy preservation of the ECPP protocol, the focus is mainly on the unlinkability, i.e., the moving tracking attack on OBUs' location. The proposed ECPP protocol can achieve much better efficiency than its counterparts group signature technique based (GSB) and huge anonymous keys based (HAB).

  • Broadband IP Core Networks

    This chapter contains sections titled: User Authentication and Log-In Provisioning Fixed- and Mobile-Converged Services Over a Unified Packet Network Fixed Broadband Wireless Networks

  • No title

    This book deals with "crypto-biometrics", a relatively new and multi- disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto- biometrics, including review, cancelable biometrics, cryptographic key generation from biometrics, and crypto-biometric key sharing protocols. Because of the thorough treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy. Table of Contents: Introduction / Cancelable Biometric System / Cryptographic Key Regeneration Using Biome rics / Biometrics-Based Secure Authentication Protocols / Concluding Remarks

  • Memory

    This chapter contains sections titled: Memory Systems, Basic Model for Memory Use, Naming, Mapping, Authentication, Positioning in the Hierarchy, Why Locality Is Fundamental, Conclusions



Standards related to Authentication

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard for Media Management System (MMS) Session Security, Authentication, Initialization Protocol (SSAIP)

Specify the protocol used to identify, authenticate and establish an initial connection between the software components of the IEEE Media Management System. Details of components of the Media Management System are specified by companion standards.


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


More Standards

Jobs related to Authentication

Back to Top