Authentication

View this topic in
Authentication is the act of confirming the truth of an attribute of a datum or entity. (Wikipedia.org)






Conferences related to Authentication

Back to Top

2016 IEEE International Conference on Image Processing (ICIP)

Signal processing, image processing, biomedical imaging, multimedia, video, multidemensional.


2015 IEEE Wireless Communications and Networking Conference (WCNC)

IEEE WCNC is the premier wireless event for researchers, industry professionals, and academics interested in the latest development and design of wireless systems and networks. Sponsored by the IEEE Communications Society, IEEE WCNC has a long history of bringing together industry, academia, and regulatory bodies.


2014 IEEE Symposium on Security and Privacy (SP)

IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)


2013 15th International Conference on Advanced Communication Technology (ICACT)

Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.


2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)

The conference covers theory, design and application of computer networks and distributed computing and information systems.


More Conferences

Periodicals related to Authentication

Back to Top

Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Selected Areas in Communications, IEEE Journal on

All telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space, and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; communication theory; and wireless communications.


Systems Journal, IEEE

This publication provides a systems-level, focused forum for application-oriented manuscripts that address complex systems and system-of-systems of national and global significance.


Wireless Communications, IEEE Transactions on



Most published Xplore authors for Authentication

Back to Top

Xplore Articles related to Authentication

Back to Top

Corporate network security

R. Oppliger; D. Hogrefe Networks, 1993. International Conference on Information Engineering '93. 'Communications and Networks for the Year 2000', Proceedings of IEEE Singapore International Conference on, 1993

The current, widespread use of computer networks has led to increased concerns about security. This paper deals with network security in general, and concentrates on corporate networks in particular. Passive and active attacks are outlined. Counter-measures to prevent corporate networks from being attacked are discussed. The security architecture for OSI networks is introduced. This architecture might be of interest for ...


Entropy based occlusion removal with DTCWT and DCT as feature extractor for iris recognition

L. Likitha; Diksha Gupta; K. Manikantan 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2015

The iris pattern of human eye is considered to be unique and distinct that it plays an important role as reliable biometric system for authentication purposes. Iris recognition has become a challenging issue under varying lighting or contrast conditions and due to occlusions such as eyelashes. Therefore, in this paper we have proposed a novel technique for eliminating the eyelashes, ...


Asynchronous examination security system using Ear Visual Biometric for college students

Bernie S. Fabito TENCON 2015 - 2015 IEEE Region 10 Conference, 2015

This study explores the use of an Ear Visual Biometric as a security measure to at least minimize identity theft in asynchronous examination. With the aid of the system, users make use of ear biometrics for user identification and password for user authentication. Users are identified based on the uniqueness of their ear structure thus limiting the chance of identity ...


Design and Implementation of government-affair-transparent System

Liyan Chen; Fei Duan; Jia Lin; Hui Hu 2014 9th International Conference on Computer Science & Education, 2014

This paper designs and implements government-affair-transparent system according to features of government affair. This paper first introduces designing thought and related technology which includes J2EE, MVC and B/S structure. It then does requirement analysis and works out functional requirement and performance requirement. Furthermore, it implements the construction of system using J2EE and MVC, which is based on the overall structure, ...


Efficient message authentication for spread spectrum wireless communications

Shengkuan Xiao; D. Carman; C. Boncelet MILCOM 2005 - 2005 IEEE Military Communications Conference, 2005

In this paper, we present a new scheme to reduce the communications requirements to send message authentication tags (MAC's), by sending the MAC's over direct sequence spread spectrum wireless channels. We greatly reduce the number of chips required by considering the chip sequence as a whole. In one example, based on the IS-95 CDMA digital cellular standard, we reduce the ...


More Xplore Articles

Educational Resources on Authentication

Back to Top

eLearning

Corporate network security

R. Oppliger; D. Hogrefe Networks, 1993. International Conference on Information Engineering '93. 'Communications and Networks for the Year 2000', Proceedings of IEEE Singapore International Conference on, 1993

The current, widespread use of computer networks has led to increased concerns about security. This paper deals with network security in general, and concentrates on corporate networks in particular. Passive and active attacks are outlined. Counter-measures to prevent corporate networks from being attacked are discussed. The security architecture for OSI networks is introduced. This architecture might be of interest for ...


Entropy based occlusion removal with DTCWT and DCT as feature extractor for iris recognition

L. Likitha; Diksha Gupta; K. Manikantan 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2015

The iris pattern of human eye is considered to be unique and distinct that it plays an important role as reliable biometric system for authentication purposes. Iris recognition has become a challenging issue under varying lighting or contrast conditions and due to occlusions such as eyelashes. Therefore, in this paper we have proposed a novel technique for eliminating the eyelashes, ...


Asynchronous examination security system using Ear Visual Biometric for college students

Bernie S. Fabito TENCON 2015 - 2015 IEEE Region 10 Conference, 2015

This study explores the use of an Ear Visual Biometric as a security measure to at least minimize identity theft in asynchronous examination. With the aid of the system, users make use of ear biometrics for user identification and password for user authentication. Users are identified based on the uniqueness of their ear structure thus limiting the chance of identity ...


Design and Implementation of government-affair-transparent System

Liyan Chen; Fei Duan; Jia Lin; Hui Hu 2014 9th International Conference on Computer Science & Education, 2014

This paper designs and implements government-affair-transparent system according to features of government affair. This paper first introduces designing thought and related technology which includes J2EE, MVC and B/S structure. It then does requirement analysis and works out functional requirement and performance requirement. Furthermore, it implements the construction of system using J2EE and MVC, which is based on the overall structure, ...


Efficient message authentication for spread spectrum wireless communications

Shengkuan Xiao; D. Carman; C. Boncelet MILCOM 2005 - 2005 IEEE Military Communications Conference, 2005

In this paper, we present a new scheme to reduce the communications requirements to send message authentication tags (MAC's), by sending the MAC's over direct sequence spread spectrum wireless channels. We greatly reduce the number of chips required by considering the chip sequence as a whole. In one example, based on the IS-95 CDMA digital cellular standard, we reduce the ...


More eLearning Resources

IEEE-USA E-Books

  • GENERAL COMPUTER SECURITY ARCHITECTURE

    This chapter considers security capabilities within computing and communications devices. It considers the software that resides next to the hardware and controls the use of system resources by applications. The networking subsystem supported by the element software is responsible for the confidentiality and integrity of information transferred among elements, for the authentication of elements to one another, and for user authentication and access control in distributed systems. The chapter focuses on the element security software components, primarily for the kernel, security contexts, security-critical functions, and operating system (OS) implementations. OS implementations structured to use the common kernel interface to obtain basic services should be able to be closely controlled from an authorization perspective relatively easily since most hardware dependencies will be visible only in the kernel and the device drivers. Physical and administrative security mechanisms are the first lines of defense used to achieve security objectives.

  • Analysis of Mobility Protocols for Multimedia

    This chapter provides comprehensive analysis of several generations of mobility protocols (e.g., 1G, 2G, 3G, and 4G) in order to extrapolate the common abstract functions during a mobility event. It describes how discovery, configuration, authentication, security association, and media routing functions associated with a mobile's handoff are performed for each of the cellular and IP-based mobility protocols and then maps the respective network parameters for these mobility protocols to each of the common mobility functions. A comparative analysis and extrapolation of the abstract primitives can help to design an optimized mobility system with a given resource constraints and build the optimization mechanisms for each these mobility functions.

  • Authentication of Subjects

    This chapter contains sections titled: Authentication Systems Human Authentication Chapter Summary Further Reading and Resources Questions Exercises

  • Memory

    This chapter contains sections titled: Memory Systems, Basic Model for Memory Use, Naming, Mapping, Authentication, Positioning in the Hierarchy, Why Locality Is Fundamental, Conclusions

  • Network Security

    This chapter contains sections titled: Introduction Energy Cost of Embedded Security for Wireless Sensor Networks Increasing Authentication and Communication Confidentiality in Wireless Sensor Networks Efficient Pairwise Authentication Protocols for Sensor and Ad Hoc Networks Fast and Scalable Key Establishment in Sensor Networks Weil Pairing-Based Round, Efficient, and Fault-Tolerant Group Key Agreement Protocol for Sensor Networks References

  • Security

    This chapter contains sections titled: Introduction Potential Attacks to Computer Systems Cryptography Authentication Access Control Digital Signatures Design Principles Case Study: DCE Security Service Summary This chapter contains sections titled: Exercises Bibliography Pointers to Bibliographies on the Internet

  • Introduction

    The dedicated short-range communication (DSRC) protocol is one of short-range wireless protocols, which is specifically designed for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications to enhance the safety and productivity of the transportation system, which is also referred to as an intelligent transportation system (ITS). In vehicular ad hoc networks (VANETs), roadside units (RSUs) can provide assistance in finding a facility such as a restaurant or gas station, and broadcast traffic-related messages such as maximum curve turning speed notifications to give drivers a heads-up. VANETs open up new avenues to create conveniences and safer lifestyles. In order to protect VANET against security and privacy threats, the security mechanisms employed in VANETs should satisfy the following security requirements: authentication, integrity, nonrepudiation, access control and privacy. The following security primitives help securing VANET: primitives for confidentiality, primitives for data integrity and authentication, primitives for nonrepudiation and primitives for privacy.

  • Basic Security Mechanisms

    This chapter contains sections titled: Hashing Encryption Digital Signatures Certificates Access Control Mechanisms Diffie-Hellman Key Exchange Authentication Protocols Mapping Security Services to Security Mechanisms

  • Index

    Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and interpreted for use in a court of law. These two fields are finding increasing importance in law enforcement and the investigation of cybercrime as the ubiquity of personal computing and the internet becomes ever-more apparent. Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics focusing on evidence extracted from both normal computer systems and special multimedia devices, such as digital cameras.&nbsp_place_holder; This book focuses on the interface between digital forensics and multimedia forensics, bringing two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation. Both fields are expertly attended to by contributions from researchers and forensic practitioners specializ ng in diverse topics such as forensic authentication, forensic triage, forensic photogrammetry, biometric forensics, multimedia device identification, and image forgery detection among many others. Key features: - Brings digital and multimedia forensics together with contributions from academia, law enforcement, and the digital forensics industry for extensive coverage of all the major aspects of digital forensics of multimedia data and devices - Provides comprehensive and authoritative coverage of digital forensics of multimedia data and devices - Offers not only explanations of techniques but also real-world and simulated case studies to illustrate how digital and multimedia forensics techniques work - Includes a companion website hosting continually updated supplementary materials ranging from extended and updated coverage of standards to best practice guides, test datasets and more case studies

  • Security in Sensor Networks

    In this chapter we survey the current state of the art in sensor network security. We first explain the differences between sensor networks and ad-hoc networks on account of which the solutions to the security problems in sensor networks have to be different. We then focus on some important problems in sensor networks such as data encryption and authentication, key management, intrusion detection, routing and aggregation and explain the various proposals to address these problems.



Standards related to Authentication

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard for Media Management System (MMS) Session Security, Authentication, Initialization Protocol (SSAIP)

Specify the protocol used to identify, authenticate and establish an initial connection between the software components of the IEEE Media Management System. Details of components of the Media Management System are specified by companion standards.


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


More Standards

Jobs related to Authentication

Back to Top