Authentication

View this topic in
Authentication is the act of confirming the truth of an attribute of a datum or entity. (Wikipedia.org)






Conferences related to Authentication

Back to Top

2020 IEEE/PES Transmission and Distribution Conference and Exposition (T&D)

Bi-Annual IEEE PES T&D conference. Largest T&D conference in North America.


2019 56th ACM/IEEE Design Automation Conference (DAC)

EDA (Electronics Design Automation) is becoming ever more important with the continuous scaling of semiconductor devices and the growing complexities of their use in circuits and systems. Demands for lower-power, higher-reliability and more agile electronic systems raise new challenges to both design and design automation of such systems. For the past five decades, the primary focus of research track at DAC has been to showcase leading-edge research and practice in tools and methodologies for the design of circuits and systems.

  • 2022 59th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2021 58th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2020 57th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2018 55th ACM//IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC Description for TMRF The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading

  • 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 session on design methodologies and EDA tool developments, keynotes, panels, plus User Track presentations. A diverse worldwide community representing more than 1,000 organization attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2012 49th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers

  • 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference is the world s leading technical conference and tradeshow on electronic design and design automation. DAC is where the IC Design and EDA ecosystem learns, networks, and does business.

  • 2010 47th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers.

  • 2009 46th ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC is the premier event for the electronic design community. DAC offers the industry s most prestigious technical conference in combination with the biggest exhibition, bringing together design, design automation and manufacturing market influencers.

  • 2008 45th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 250 of the leading electronics design suppliers.

  • 2007 44th ACM/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier Electronic Design Automation (EDA) and silicon solution event. DAC features over 50 technical sessions covering the latest in design methodologies and EDA tool developments and an Exhibition and Demo Suite area with over 250 of the leading EDA, silicon and IP Providers.

  • 2006 43rd ACM/IEEE Design Automation Conference (DAC)

  • 2005 42nd ACM/IEEE Design Automation Conference (DAC)

  • 2004 41st ACM/IEEE Design Automation Conference (DAC)

  • 2003 40th ACM/IEEE Design Automation Conference (DAC)

  • 2002 39th ACM/IEEE Design Automation Conference (DAC)

  • 2001 38th ACM/IEEE Design Automation Conference (DAC)

  • 2000 37th ACM/IEEE Design Automation Conference (DAC)

  • 1999 36th ACM/IEEE Design Automation Conference (DAC)

  • 1998 35th ACM/IEEE Design Automation Conference (DAC)

  • 1997 34th ACM/IEEE Design Automation Conference (DAC)

  • 1996 33rd ACM/IEEE Design Automation Conference (DAC)


2019 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2019, the 26th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


ICC 2019 - 2019 IEEE International Conference on Communications (ICC)

The 2019 IEEE International Conference on Communications (ICC) will be held from 20-24 May 2019 at Shanghai International Convention Center, China,conveniently located in the East Coast of China, the region home to many of the world’s largest ICT industries and research labs. Themed“Smart Communications”, this flagship conference of IEEE Communications Society will feature a comprehensive Technical Program including16 Symposia and a number of Tutorials and Workshops. IEEE ICC 2019 will also include an attractive Industry Forum & Exhibition Program featuringkeynote speakers, business and industry pan


SoutheastCon 2019

The annual IEEE SoutheastCon conferences promote all aspects of theories and applications of engineering disciplines. Sponsored by the IEEE Region-3 and IEEE Huntsville Section, this event will attract researchers, professionals, and students from the Southeastern region of the U.S. SoutheastCon 2019 will feature tutorial sessions, workshops, Technical Programs, and student Hardware, Software, Ethics, Paper, Web competitions.

  • SoutheastCon 2018

    SoutheastCon is a annual conference held in Region 3 and covers a Professional Track, Student Track and Regional Track.

  • SoutheastCon 2017

    Broad scope professional paper conference, region 3 annual meeting, region 3 annual student conference

  • SoutheastCon 2016

    Annual Region 3 Trifecta of Student competitions, Technical papers and volunteer training and administration.

  • SoutheastCon 2015

    Horizontal Technical Conference with all topics; students compete in multiple competions; Region 3 training meetings.

  • SOUTHEASTCON 2014

    Horizontal Technical Conference with all topics; students compete in multiple competions; Region 3 training meetings.

  • IEEE SOUTHEASTCON 2013

    Region 3 Meeting, Technical papers, student competitions.

  • SOUTHEASTCON 2012

    The annual IEEE SoutheastCon conferences promote all aspects of the theories and applications of the engineering disciplines. Sponsored by the IEEE Region 03, this event attracts researchers, professionals, and students from the Southeast region of the U.S and beyond. SoutheastCon 2012 will be held in Orlando, Florida.

  • SOUTHEASTCON 2011

    IEEE SoutheastCon2011 is the annual IEEE Region 3 technical, professional, and student conference, invites conference refereed and non-refereed technical paper presentations and tutorials that advance the work and careers of conference attendees in the areas of interest for the conference.

  • SOUTHEASTCON 2010

    SoutheastCon 2010 is the Region 3 event which includes a student conference, a technical conference, and the Region 3 business meeting.

  • SOUTHEASTCON 2009

    It is the annual IEEE Region 3 Technical, Professional, and Student Conference. As the premier conference for the IEEE Region 3, it brings together electrical, computer and other engineering and science professionals, faculty and students to share the latest information through technical sessions, tutorials and exhibits. The conference schedule includes: a technical program with seminars, tutorials, and workshops; exhibits; a student program with student competitions; and IEEE regional meetings.

  • SOUTHEASTCON 2008

    SoutheastCon is the Southeastern USA Region of the IEEE's premier conference. It contains three main sections: a technical program, student competitions and regional meetings. SouthEastCon features technical papers, tutorials and exhibits.

  • SOUTHEASTCON 2007

  • SOUTHEASTCON 2006

  • SOUTHEASTCON 2005

  • SOUTHEASTCON 2004

  • SOUTHEASTCON 2003

  • SOUTHEASTCON 2002

  • SOUTHEASTCON 2001

  • SOUTHEASTCON 2000

  • SOUTHEASTCON '99

  • SOUTHEASTCON '98

  • SOUTHEASTCON '97

  • SOUTHEASTCON '96


More Conferences

Periodicals related to Authentication

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Circuits and Systems Magazine, IEEE


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


More Periodicals

Most published Xplore authors for Authentication

Back to Top

Xplore Articles related to Authentication

Back to Top

A lightweight identity-based authentication protocol

[{u'author_order': 1, u'affiliation': u'Beijing Municipal Institute of Science & Technology Information, Beijing Key Laboratory of Network Cryptography Authentication, Beijing, China', u'full_name': u'Ying Li'}, {u'author_order': 2, u'affiliation': u'Beijing Municipal Institute of Science & Technology Information, Beijing Key Laboratory of Network Cryptography Authentication, Beijing, China', u'full_name': u'Liping Du'}, {u'author_order': 3, u'affiliation': u'Beijing Municipal Institute of Science & Technology Information, Beijing Key Laboratory of Network Cryptography Authentication, Beijing, China', u'full_name': u'Guifen Zhao'}, {u'author_order': 4, u'affiliation': u'Beijing Municipal Institute of Science & Technology Information, Beijing Key Laboratory of Network Cryptography Authentication, Beijing, China', u'full_name': u'Jianwei Guo'}] 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013), 2013

To ensure the Legality of access nodes in WSNs, a lightweight authentication protocol based on identity is proposed. In the protocol, key pools with node identity are prestored on both side of the authentication. By special authentication token generation algorithm and key pool, a onetime authentication code containing identity information is produced to confirm the identity of authenticated node in ...


General authentication scheme in user-centric IdM

[{u'author_order': 1, u'affiliation': u'Authentication Research Section, Electronics and Telecommunication Research Institute, Daejeon, Republic of Korea', u'authorUrl': u'https://ieeexplore.ieee.org/author/37291917000', u'full_name': u'Seung-Hyun Kim', u'id': 37291917000}, {u'author_order': 2, u'affiliation': u'Authentication Research Section, Electronics and Telecommunication Research Institute, Daejeon, Republic of Korea', u'authorUrl': u'https://ieeexplore.ieee.org/author/38183945100', u'full_name': u'Soo-Hyung Kim', u'id': 38183945100}] 2016 18th International Conference on Advanced Communication Technology (ICACT), 2016

This paper presents a general authentication scheme for User-Centric IdM. To satisfy the authentication framework's requirements of User-Centric IdM such as consistent user experience, simple message format, and the user's participation, the proposed scheme provides a negotiation service of authentication level and a multiple authentication service in user's point of view. The proposed scheme extends the traditional general authentication framework ...


Two-Level QR Code for Private Message Sharing and Document Authentication

[{u'author_order': 1, u'affiliation': u'Laboratory of Informatics, Robotics and Microelectronics of Montpellier, Montpellier, France', u'authorUrl': u'https://ieeexplore.ieee.org/author/37085551328', u'full_name': u'Iuliia Tkachenko', u'id': 37085551328}, {u'author_order': 2, u'affiliation': u'Laboratory of Informatics, Robotics and Microelectronics of Montpellier, Centre National de la Recherche Scientifique, University of Montpellier, Montpellier, France', u'authorUrl': u'https://ieeexplore.ieee.org/author/37298427400', u'full_name': u'William Puech', u'id': 37298427400}, {u'author_order': 3, u'affiliation': u'Authentication Industries, Montpellier, France', u'authorUrl': u'https://ieeexplore.ieee.org/author/37085418129', u'full_name': u'Christophe Destruel', u'id': 37085418129}, {u'author_order': 4, u'affiliation': u'Laboratory of Informatics, Robotics and Microelectronics of Montpellier, Centre National de la Recherche Scientifique, University of Montpellier, Montpellier, France', u'authorUrl': u'https://ieeexplore.ieee.org/author/37327035000', u'full_name': u'Olivier Strauss', u'id': 37327035000}, {u'author_order': 5, u'affiliation': u'Authentication Industries, Montpellier, France', u'authorUrl': u'https://ieeexplore.ieee.org/author/37085414353', u'full_name': u'Jean-Marc Gaudin', u'id': 37085414353}, {u'author_order': 6, u'affiliation': u'Authentication Industries, Montpellier, France', u'authorUrl': u'https://ieeexplore.ieee.org/author/37085413213', u'full_name': u'Christian Guichard', u'id': 37085413213}] IEEE Transactions on Information Forensics and Security, 2016

The quick response (QR) code was designed for storage information and high- speed reading applications. In this paper, we present a new rich QR code that has two storage levels and can be used for document authentication. This new rich QR code, named two-level QR code, has public and private storage levels. The public level is the same as the ...


Multi-level authentication technique for accessing cloud services

[{u'author_order': 1, u'affiliation': u'CORI Bangalore, Karnataka', u'authorUrl': u'https://ieeexplore.ieee.org/author/37085914745', u'full_name': u'H A Dinesha', u'id': 37085914745}, {u'author_order': 2, u'affiliation': u'CORI Bangalore, Karnataka', u'authorUrl': u'https://ieeexplore.ieee.org/author/37085468645', u'full_name': u'V K Agrawal', u'id': 37085468645}] 2012 International Conference on Computing, Communication and Applications, 2012

Cloud computing is an emerging, on-demand and internet-based technology. It provides variety of services over internet such as, software, hardware, data storage and infrastructure. This technology has been used by worldwide customers to improve their business performance. However, to utilize these services by authorized customer, it is necessary to have strict authentication check. At present, authentication is done in several ...


Strong password authentication with AKA authentication mechanism

[{u'author_order': 1, u'affiliation': u'Department of Computer Science and Engineering, University of West Bohemia, Pilsen, Czech Republic', u'authorUrl': u'https://ieeexplore.ieee.org/author/37085676121', u'full_name': u'Libor Dostalek', u'id': 37085676121}, {u'author_order': 2, u'affiliation': u'Department of Computer Science and Engineering, University of West Bohemia, Pilsen, Czech Republic', u'authorUrl': u'https://ieeexplore.ieee.org/author/37272091200', u'full_name': u'Jiri Safarik', u'id': 37272091200}] 2017 International Conference on Applied Electronics (AE), 2017

This contribution discusses algorithms for strong authentication of applications in mobile devices. The current LTE and IMS networks provide strong authentication using USIM smart cards based on AKA algorithm. The problem of this authentication is that this authentication is under the sole control of Telco operators. We can expect that more applications will be placed into the IMS environment in ...


More Xplore Articles

Educational Resources on Authentication

Back to Top

eLearning

No eLearning Articles are currently tagged "Authentication"

IEEE-USA E-Books

  • Introduction

    This chapter contains sections titled:Authenticated Key AgreementThe Challenge in Authenticated Key AgreementHow to Read this Book?Reference

  • Combinatorial Designs for Authentication and Secrecy Codes

    Combinatorial Designs for Authentication and Secrecy Codes is a succinct in- depth review and tutorial of a subject that promises to lead to major advances in computer and communication security. This monograph provides a tutorial on combinatorial designs, which gives an overview of the theory. Furthermore, the application of combinatorial designs to authentication and secrecy codes is described in depth. This close relationship of designs with cryptography and information security was first revealed in Shannon's seminal paper on secrecy systems. We bring together in one source foundational and current contributions concerning design-theoretic constructions and characterizations of authentication and secrecy codes.

  • Universal Authentication and Billing Architecture for Wireless MANs

    This chapter contains sections titled:IntroductionPreliminaries and BackgroundDescription of the Universal Authentication and Billing ArchitectureSecurity AnalysisPerformance EvaluationDiscussionsConclusionsReferences

  • Classical Approaches to Authentication and Key Agreement

    This chapter contains sections titled:Existing Mobile Security SolutionsGeneral‐Purpose Approaches to Authentication and Key ManagementRequirements for GAAReferences

  • Generic Authentication Architecture

    This chapter contains sections titled:Overview of Generic Authentication ArchitectureFoundations of GAAVariations of the Generic Bootstrapping ArchitectureBuilding Blocks of GAAOther Architectural IssuesOverview of 3GPP GAA SpecificationsReferences

  • Applications Using Generic Authentication Architecture

    This chapter contains sections titled:Standardized Usage ScenariosAdditional Usage ScenariosReferences

  • Query Answer Authentication

    In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties. Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / Conclusion

  • Future Trends

    This chapter contains sections titled:Standardization OutlookOutlook for GAAReferences

  • Mutual Authentication

    The authentication uses the 802.1x access control mechanism that defines the following three components: the supplicant is the device wishing to access the Ethernet or Wi‐Fi network, the authenticator is the device that controls the supplicant's access to the local area network (LAN), and the authentication server is the device that authenticates the supplicant and authorizes access to the LAN. Extensible authentication protocol (EAP) over LAN (EAPOL) protocol ensures the transport of EAP/EAP‐Method messages, which enable authentication of the supplicant, and possibly of the authentication server. When a security association is established after successful authentication, temporary keys are created: pairwise transient key and group transient key. The authentication and key agreement (AKA) mechanism has been defined for the attachment of the mobile to the 4G mobile network, and it allows mutual authentication of third parties and the distribution of keys.

  • Hash Function, Message Digest, and Message Authentication Code

    In e‐commerce, it is often necessary for communication parties to verify each other's identity. One practical way to do this is with the use of cryptographic authentication protocols employing a one‐way hash function. Appropriate padding is needed to force the message to divide conveniently into certain fixed lengths. Several algorithms are introduced in order to compute message digests by employing several hash functions. The hash functions dealt with in this chapter are DES‐like Message Digest Computation (DMDC) (1994), MD5 Message‐Digest Algorithm (1992), and Secure Hash Algorithm (SHA‐1) (1995). The keyed‐hashed Message Authentication Code (HMAC) is a key‐dependent one‐way hash function which provides both data integrity and data origin authentication for files sent between two users.



Standards related to Authentication

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control

For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802ᆴ Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AEル MAC Security. c) Facilitates the use of industry ...


IEEE Standard for Media Management System (MMS) Session Security, Authentication, Initialization Protocol (SSAIP)

Specify the protocol used to identify, authenticate and establish an initial connection between the software components of the IEEE Media Management System. Details of components of the Media Management System are specified by companion standards.


More Standards