Authentication

View this topic in
Authentication is the act of confirming the truth of an attribute of a datum or entity. (Wikipedia.org)






Conferences related to Authentication

Back to Top

2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA)

Industrial Informatics, Computational Intelligence, Control and Systems, Cyber-physicalSystems, Energy and Environment, Mechatronics, Power Electronics, Signal and InformationProcessing, Network and Communication Technologies


2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


2018 17th International Conference on Information Technology Based Higher Education and Training (ITHET)

The convergence of current technologies provides the infrastructure for transmitting and storing information faster and cheaper. For information to be used in gaining knowledge, however, environments for collecting, storing, disseminating, sharing and constructing knowledge are needed. Such environments, knowledge media, brings together telecommunication, computer and networking technologies, learning theories and cognitive sciences to form meaningful environments that provides for a variety of learner needs. ITHET 2018 will continue with the traditional themes of previous events. However, our special theme for this year is a fundamental one. We have previously had MOOCs as our special theme, but now they are just infrastructure. Even “Blended Learning” is what we all do anyway. In a time of the unprecedented access to knowledge through IT, it is time for us to revisit the fundamental purpose of our educational system. It is certainly not about knowledge anymore.


2018 20th International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2018 24th International Conference on Pattern Recognition (ICPR)

ICPR will be an international forum for discussions on recent advances in the fields of Pattern Recognition, Machine Learning and Computer Vision, and on applications of these technologies in various fields

  • 2016 23rd International Conference on Pattern Recognition (ICPR)

    ICPR'2016 will be an international forum for discussions on recent advances in the fields of Pattern Recognition, Machine Learning and Computer Vision, and on applications of these technologies in various fields.

  • 2014 22nd International Conference on Pattern Recognition (ICPR)

    ICPR 2014 will be an international forum for discussions on recent advances in the fields of Pattern Recognition; Machine Learning and Computer Vision; and on applications of these technologies in various fields.

  • 2012 21st International Conference on Pattern Recognition (ICPR)

    ICPR is the largest international conference which covers pattern recognition, computer vision, signal processing, and machine learning and their applications. This has been organized every two years by main sponsorship of IAPR, and has recently been with the technical sponsorship of IEEE-CS. The related research fields are also covered by many societies of IEEE including IEEE-CS, therefore the technical sponsorship of IEEE-CS will provide huge benefit to a lot of members of IEEE. Archiving into IEEE Xplore will also provide significant benefit to the all members of IEEE.

  • 2010 20th International Conference on Pattern Recognition (ICPR)

    ICPR 2010 will be an international forum for discussions on recent advances in the fields of Computer Vision; Pattern Recognition and Machine Learning; Signal, Speech, Image and Video Processing; Biometrics and Human Computer Interaction; Multimedia and Document Analysis, Processing and Retrieval; Medical Imaging and Visualization.

  • 2008 19th International Conferences on Pattern Recognition (ICPR)

    The ICPR 2008 will be an international forum for discussions on recent advances in the fields of Computer vision, Pattern recognition (theory, methods and algorithms), Image, speech and signal analysis, Multimedia and video analysis, Biometrics, Document analysis, and Bioinformatics and biomedical applications.

  • 2002 16th International Conference on Pattern Recognition


More Conferences

Periodicals related to Authentication

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Circuits and Systems Magazine, IEEE


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


More Periodicals

Most published Xplore authors for Authentication

Back to Top

Xplore Articles related to Authentication

Back to Top

An Improved Uniform Identity Authentication Method Based on SAML in Cloud Environment

[{u'author_order': 1, u'full_name': u'Du Jing'}, {u'author_order': 2, u'full_name': u'Jie Yan'}, {u'author_order': 3, u'full_name': u'Ao Fujiang'}, {u'author_order': 4, u'full_name': u'Zhou Ying'}] 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), None

Considering the problems for the common identity authentication methods in cloud environment at present, an improved uniform identity authentication method based on SAML in cloud environment is designed. The security analysis for identity authentication protocol in the designed uniform identity authentication method shows that it can realize the bidirectional authentication between the user and the Identity Provider, it can also ...


BlockCAM: A Blockchain-Based Cross-Domain Authentication Model

[{u'author_order': 1, u'full_name': u'Wentong Wang'}, {u'author_order': 2, u'full_name': u'Ning Hu'}, {u'author_order': 3, u'full_name': u'Xin Liu'}] 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), None

In a distributed network environment, companies and institutions have their own sharing resource. To prevent unauthorized users to access these shared resources, cross-domain authentication is necessary. For ensuring the safety and efficiency to access resources in different domain, we propose a blockchain-based cross-domain authentication model called BlockCAM and designed the cross-domain authentication protocol. BlockCAM employs consortium blockchain technology to construct ...


Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks

[{u'author_order': 1, u'affiliation': u'University of Oxford, Oxford, United Kingdom.', u'full_name': u'Pardeep Kumar'}, {u'author_order': 2, u'affiliation': u'Linkoping University, Sweden and ITMO University.', u'full_name': u'Andrei Gurtov'}, {u'author_order': 3, u'affiliation': u'Dongseo University, South Korea.', u'full_name': u'Mangal Sain'}, {u'author_order': 4, u'affiliation': u'University of Oxford, Oxford, United Kingdom.', u'full_name': u'Andrew Martin'}, {u'author_order': 5, u'affiliation': u'Arctic University of Norway, Norway.', u'full_name': u'Phuong H. Ha'}] IEEE Transactions on Smart Grid, None

Smart meters are considered as foundational part of the smart metering infrastructure (SMI) in smart energy networks. Smart meter is a digital device that makes use of two-way communication between consumer and utility to exchange, manage and control energy consumptions within a home. However, despite all the features, a smart meter raises several security-related concerns. For instance, how to exchange ...


Authentication of Multiple-User Spatial Keywords Queries

[{u'author_order': 1, u'full_name': u'Isaac Amankona Obiri'}, {u'author_order': 2, u'full_name': u'Yong Wang'}, {u'author_order': 3, u'full_name': u'Raphael Elimeli Nuhoho'}, {u'author_order': 4, u'full_name': u'Erick Owiyo'}] 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), None

A top-k Multiple-user Spatial Keywords (MUSK) query takes a location and a set of keywords as arguments and returns the k best point of interests (POIs) that satisfy multiple-user's happiness. In the database outsourcing paradigm, data owner (DO) delegates the role of answering user's queries to a cloud service provider(CSP). Since either the CSP or an intruder can falsify the ...


Securing offline delivery services by using Kerberos authentication

[{u'author_order': 1, u'affiliation': u'Department of Computer Science and Technology, Beijing University of Chemical Technology, Beijing 100029, China.', u'full_name': u'Hui Li'}, {u'author_order': 2, u'affiliation': u'China National Publications Import and Export (Group) Corporation, Beijing 100020, China.', u'full_name': u'Yi Niu'}, {u'author_order': 3, u'affiliation': u'Department of Computer Science and Technology, Beijing University of Chemical Technology, Beijing 100029, China.', u'full_name': u'Junkai Yi'}, {u'author_order': 4, u'affiliation': u'Department of Computer Science and Technology, Beijing University of Chemical Technology, Beijing 100029, China.', u'full_name': u'Hongyu Li'}] IEEE Access, None

With the rise of crowdsourcing economies, the home delivery business is now undergoing rapid development. The authentication schemes that are currently used in the home delivery business remain unanalyzed from the provable authenticity perspective. In this paper, we generalize the "crossrealm authentication path" of the Kerberos protocol and apply it to the online ordering and offline delivery business.We design a ...


More Xplore Articles

Educational Resources on Authentication

Back to Top

eLearning

No eLearning Articles are currently tagged "Authentication"

IEEE-USA E-Books

  • Combinatorial Designs for Authentication and Secrecy Codes

    Combinatorial Designs for Authentication and Secrecy Codes is a succinct in- depth review and tutorial of a subject that promises to lead to major advances in computer and communication security. This monograph provides a tutorial on combinatorial designs, which gives an overview of the theory. Furthermore, the application of combinatorial designs to authentication and secrecy codes is described in depth. This close relationship of designs with cryptography and information security was first revealed in Shannon's seminal paper on secrecy systems. We bring together in one source foundational and current contributions concerning design-theoretic constructions and characterizations of authentication and secrecy codes.

  • Hash Function, Message Digest, and Message Authentication Code

    In e‐commerce, it is often necessary for communication parties to verify each other's identity. One practical way to do this is with the use of cryptographic authentication protocols employing a one‐way hash function. Appropriate padding is needed to force the message to divide conveniently into certain fixed lengths. Several algorithms are introduced in order to compute message digests by employing several hash functions. The hash functions dealt with in this chapter are DES‐like Message Digest Computation (DMDC) (1994), MD5 Message‐Digest Algorithm (1992), and Secure Hash Algorithm (SHA‐1) (1995). The keyed‐hashed Message Authentication Code (HMAC) is a key‐dependent one‐way hash function which provides both data integrity and data origin authentication for files sent between two users.

  • Privacy and Authentication

    This chapter contains sections titled: Introduction Terminology Privacy and Authentication Confidence‐based Privacy‐preserving Authentication Example The Role of SIM Continuous Authentication Identity and Confidence Conclusion Bibliography

  • Classical Approaches to Authentication and Key Agreement

    This chapter contains sections titled: Existing Mobile Security Solutions General‐Purpose Approaches to Authentication and Key Management Requirements for GAA References

  • Generic Authentication Architecture

    This chapter contains sections titled: Overview of Generic Authentication Architecture Foundations of GAA Variations of the Generic Bootstrapping Architecture Building Blocks of GAA Other Architectural Issues Overview of 3GPP GAA Specifications References

  • Universal Authentication and Billing Architecture for Wireless MANs

    This chapter contains sections titled: Introduction Preliminaries and Background Description of the Universal Authentication and Billing Architecture Security Analysis Performance Evaluation Discussions Conclusions References

  • Applications Using Generic Authentication Architecture

    This chapter contains sections titled: Standardized Usage Scenarios Additional Usage Scenarios References

  • EPS Authentication and Key Agreement

    **A concise, updated guide to LTE Security **  This is a welcome Second Edition of the successful book on LTE Security (2010) addressing the security architecture for LTE as specified by 3GPP. Since 2010, LTE has established itself as the unrivalled mobile broadband technology of the fourth generation (4G), with significant commercial deployments around the world and a fast growing market.The subject of this book is hence even more relevant than it has been at the time of the first edition.  The authors explain in detail the security mechanisms employed in LTE and give an overview of the ones in GSM and 3G, which LTE security substantially extends. The specifications generated by standardization bodies inform how to implement the system (and this only to the extent required for interoperability), but almost never inform readers about why things are done the way they are. Furthermore, specifications tend to be readable only for a smal group of experts and lack the context of the broader picture. LTE Security Second Edition describes the essential elements of LTE Security, written by leading experts who participated in decisively shaping LTE security in the relevant standardization body, 3GPP, and explains the rationale behind the standards specifications giving readers a broader understanding of the context to these specifications. * Includes two new chapters covering 3GPP work on Relay Node Security and on system enhancements for Machine-type Communication (MTC), plus application layer security in ETSI TC M2M and embedded smart card in ETSI SCP  * Updates existing chapters , including Voice over LTE, Home base stations, and New Cryptographic Algorithms.

  • AUTHENTICATION OF SUBJECTS

    Authentication is a core security service. This chapter considers various approaches for authentication between nonhuman subjects (machines and applications) and also human identity verification to information systems. The approaches used to secure authentications over networks between machines are based on the concept of key distribution centers (KDCs), and the combined use of digital signatures, digital certificates, and public-key infrastructures (PKIs). The chapter compares the advantages and shortcomings of each approach. It discusses a number of authentication protocols: Kerberos (based on shared secret keys), PKIs (secure approach for disseminating public keys within X.509 digital certificates), remote authentication dial-in user service (RADIUS) (a flexible authentication and authorization mechanism), Diameter (a potential future replacement for RADIUS), and secure electronic transaction (SET) (a mechanism that could eliminate fraud in electronic commerce). Identity management attempts to address the problem of new applications necessitating the creation of new user profiles (including credentials).

  • Forensic Authentication of Digital Audio and Video Files

    Requests of a forensic laboratory to conduct authenticity examinations of digital audio and video files are usually based on one or more of the following reasons: legal, investigative or administrative. This chapter discusses the types of common recording devices, digital file formats and evidence requirements. Next, it talks about the physical laboratory facility, and requisite software and equipment. The chapter explains the protocols for conducting scientific authenticity examinations of digital audio and video files, including critical listening and visual reviews, data analysis and temporal/frequency analyses. The protocol used when conducting forensic authenticity examinations of digital audio and video files is based on a number of different analysis steps, as applicable, which are generally categorized as follows: hashing and cloning; playback and conversion optimization; digital data analysis; audio analyses; video analyses; and preparation of work notes. The chapter also talks about the importance of expert testimony, and provides some case examples.



Standards related to Authentication

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control

For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802ᆴ Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AEル MAC Security. c) Facilitates the use of industry ...


IEEE Standard for Media Management System (MMS) Session Security, Authentication, Initialization Protocol (SSAIP)

Specify the protocol used to identify, authenticate and establish an initial connection between the software components of the IEEE Media Management System. Details of components of the Media Management System are specified by companion standards.


More Standards