Authentication

View this topic in
Authentication is the act of confirming the truth of an attribute of a datum or entity. (Wikipedia.org)






Conferences related to Authentication

Back to Top

2016 IEEE International Conference on Image Processing (ICIP)

Signal processing, image processing, biomedical imaging, multimedia, video, multidemensional.


2015 IEEE Wireless Communications and Networking Conference (WCNC)

IEEE WCNC is the premier wireless event for researchers, industry professionals, and academics interested in the latest development and design of wireless systems and networks. Sponsored by the IEEE Communications Society, IEEE WCNC has a long history of bringing together industry, academia, and regulatory bodies.


2014 IEEE Symposium on Security and Privacy (SP)

IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)


2013 15th International Conference on Advanced Communication Technology (ICACT)

Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.


2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)

The conference covers theory, design and application of computer networks and distributed computing and information systems.


More Conferences

Periodicals related to Authentication

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on

Methods, algorithms, and human-machine interfaces for physical and logical design, including: planning, synthesis, partitioning, modeling, simulation, layout, verification, testing, and documentation of integrated-circuit and systems designs of all complexities. Practical applications of aids resulting in producible analog, digital, optical, or microwave integrated circuits are emphasized.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


More Periodicals

Most published Xplore authors for Authentication

Back to Top

Xplore Articles related to Authentication

Back to Top

A Fast Watermarking Algorithm for Image Authentication

Jian-Ping Huang 2008 International Conference on Cyberworlds, 2008

Digital watermarking technique provides an effective way to protect the image. A novel watermarking authentication algorithm based on ridge let transform is proposed in this paper. Compared with traditional algorithm, it is not only easy and fast, but can distinguish the distortions caused by common image processing with the malicious tempering. Experimental results show that the proposed algorithm is sensitive ...


A security mechanism of Smart Grid AMI network through smart device mutual authentication

Sangji Lee; Jinsuk Bong; Sunhee Shin; Yongtae Shin The International Conference on Information Networking 2014 (ICOIN2014), 2014

AMI (Advanced Meter Infrastructure), vital component to build next generation electricity grid, is an informatization service infrastructure for electricity between consumers and electricity companies. To manage the quantity of electricity consumed, AMI is composed with bidirectional communication Smart Devices. Authentication mechanism is necessary to have the access control of Smart Devices in Smart Grid communication environment. However, current ID- based ...


Semi-fragile watermarking for image content authentication

Liu Tong; Hu Xiangyi; Dai Yiqi Signal Processing, 2004. Proceedings. ICSP '04. 2004 7th International Conference on, 2004

In this paper, we propose a quantization-based semi-fragile watermarking algorithm for content authentication. The watermark can be blindly extracted. The formulation of judge threshold is given from the point of probability theory. The tempered areas of watermarked image can be distinguished by the predefined threshold. Our scheme is robust to incidental manipulations while fragile to malicious distortions, and can distinguish ...


A secure remote user mutual authentication scheme using smart cards

Xiong Li; Junguo Liao; Jiao Zhang; Jianwei Niu; Saru Kumari 2014 IEEE Computers, Communications and IT Applications Conference, 2014

Recently, Yang et al. Proposed a remote user authentication scheme using smart card. Through careful cryptanalysis, we find that Yang et al.'s scheme is not repairable, and cannot achieve mutual authentication and session key agreement. To overcome these security flaws, we propose a new remote user authentication scheme with smart card. In the proposed scheme, the user can choose his/her ...


Revolutionizing the “DULL” Passport

S. Ghatak; P. Nayak; T. Sindhura 2013 International Conference on Recent Trends in Information Technology (ICRTIT), 2013

In the proposed technique, the first idea of a novel elucidation has been proposed to shelter dull Passport. The contemporary state of dull Passport be defeated by proper Passport verification along with Passport owner authentication. The proposed solution space ensures security against these two which is candidly adoptable in the current milieu of India. As Verification and Authentication are two ...


More Xplore Articles

Educational Resources on Authentication

Back to Top

eLearning

A Fast Watermarking Algorithm for Image Authentication

Jian-Ping Huang 2008 International Conference on Cyberworlds, 2008

Digital watermarking technique provides an effective way to protect the image. A novel watermarking authentication algorithm based on ridge let transform is proposed in this paper. Compared with traditional algorithm, it is not only easy and fast, but can distinguish the distortions caused by common image processing with the malicious tempering. Experimental results show that the proposed algorithm is sensitive ...


A security mechanism of Smart Grid AMI network through smart device mutual authentication

Sangji Lee; Jinsuk Bong; Sunhee Shin; Yongtae Shin The International Conference on Information Networking 2014 (ICOIN2014), 2014

AMI (Advanced Meter Infrastructure), vital component to build next generation electricity grid, is an informatization service infrastructure for electricity between consumers and electricity companies. To manage the quantity of electricity consumed, AMI is composed with bidirectional communication Smart Devices. Authentication mechanism is necessary to have the access control of Smart Devices in Smart Grid communication environment. However, current ID- based ...


Semi-fragile watermarking for image content authentication

Liu Tong; Hu Xiangyi; Dai Yiqi Signal Processing, 2004. Proceedings. ICSP '04. 2004 7th International Conference on, 2004

In this paper, we propose a quantization-based semi-fragile watermarking algorithm for content authentication. The watermark can be blindly extracted. The formulation of judge threshold is given from the point of probability theory. The tempered areas of watermarked image can be distinguished by the predefined threshold. Our scheme is robust to incidental manipulations while fragile to malicious distortions, and can distinguish ...


A secure remote user mutual authentication scheme using smart cards

Xiong Li; Junguo Liao; Jiao Zhang; Jianwei Niu; Saru Kumari 2014 IEEE Computers, Communications and IT Applications Conference, 2014

Recently, Yang et al. Proposed a remote user authentication scheme using smart card. Through careful cryptanalysis, we find that Yang et al.'s scheme is not repairable, and cannot achieve mutual authentication and session key agreement. To overcome these security flaws, we propose a new remote user authentication scheme with smart card. In the proposed scheme, the user can choose his/her ...


Revolutionizing the “DULL” Passport

S. Ghatak; P. Nayak; T. Sindhura 2013 International Conference on Recent Trends in Information Technology (ICRTIT), 2013

In the proposed technique, the first idea of a novel elucidation has been proposed to shelter dull Passport. The contemporary state of dull Passport be defeated by proper Passport verification along with Passport owner authentication. The proposed solution space ensures security against these two which is candidly adoptable in the current milieu of India. As Verification and Authentication are two ...


More eLearning Resources

IEEE-USA E-Books

  • Security

    This chapter contains sections titled: Introduction Potential Attacks to Computer Systems Cryptography Authentication Access Control Digital Signatures Design Principles Case Study: DCE Security Service Summary This chapter contains sections titled: Exercises Bibliography Pointers to Bibliographies on the Internet

  • OAuth Standard for User Authorization of Cloud Services

    The IETF OAuth specification is an open Web standard that enables secure authorization for applications running on various kinds of platforms. Using OAuth, third-party client applications may access protected resources on the cloud or elsewhere without the resource owner being required to supply user credentials such as an identity and password. In order to achieve authorization, OAuth specifies the use of a token that enables validated access to a resource. OAuth can effectively be combined with an identity- management system such as OpenID to concurrently provide both authorization and authentication functions. The original version 1.0 of the OAuth protocol relied upon the exchange of client-side signatures, while the new version 2.0 relies upon a bearer token scheme. The new protocol is designed to be simpler to implement and supports new application contexts, but introduces its own new challenges.

  • Distributed Access Control in Cloud Computing Systems

    With the tremendous increase in the number of distributed applications, the issue of distributed access control has become an important research topic for both academia and industry. In distributed computing environments like cloud computing or service computing, authentication and authorization are the two important functions to be performed, to make sure that unauthorized users do not access distributed system components. An effective access control mechanism is an essential security component as far as protecting the confidentiality, integrity, and availability (CIA) of information hosted in the cloud is concerned. An effective access control mechanism implemented in the cloud domain should be scalable, reliable, and robust and it should provide required features and procedures for identity provisioning, deprovisioning, authentication, authorization, accounting, and auditing. In this chapter, we discuss the issue of distributed access control, major features and functionalities, access control policies and models, distributed access control architecture for multicloud environments, trust, and identity management in cloud computing environments. Related work shows some of the major research activities in the area of distributed access control considering the advantages and disadvantages of the approaches that have been adopted. We conclude this chapter by discussing a few research issues in the area of distributed access control in the cloud environment.

  • TESLA-based Broadcast Authentication

    This chapter explores ways to use fast symmetric cryptography to protect vehicular communications, but without direct involvement of RSUs. It focuses on the timed efficient stream loss-tolerant authentication (TESLA) authentication protocol, which is commonly used in securing broadcast and multicast communication. In addition, since only a short message authentication code (MAC) tag is attached to each message, the extra message length and the bandwidth overhead due to the security mechanism can be significantly reduced. The chapter presents the design of a TESLA-based broadcast authentication scheme for vehicular communication, termed TSVC. It begins by providing a brief introduction to the techniques used here, which serve as the basis for the proposed scheme, and then presents the scheme. Finally, the chapter analyzes security through rigorous analysis and conducts performance evaluations through extensive simulation.

  • Distributed Cooperative Message Authentication

    This chapter presents an efficient cooperative message authentication scheme that does not directly involve a trusted authority (TA). First, the chapter proposes a cooperative authentication scheme that doesn't involve intervehicle interaction, using extensive simulations to derive the optimal strategy for vehicle users under different parameter settings. In order to resist the free- riding attacks that do not use fake authentication efforts, an evidence-token mechanism is added. The chapter evaluates the performance of the proposed scheme in a simulated VANET environment. In order to present insight into the performance of the proposed secure cooperative authentication scheme, the authors conducted a set of custom simulations using a Java simulator. The simulation settings and the simulation results are presented here. By the proposed scheme, vehicle users can cooperatively authenticate a bunch of message-signature pairs without direct involvement of a TA.

  • Introduction

    The dedicated short-range communication (DSRC) protocol is one of short-range wireless protocols, which is specifically designed for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications to enhance the safety and productivity of the transportation system, which is also referred to as an intelligent transportation system (ITS). In vehicular ad hoc networks (VANETs), roadside units (RSUs) can provide assistance in finding a facility such as a restaurant or gas station, and broadcast traffic-related messages such as maximum curve turning speed notifications to give drivers a heads-up. VANETs open up new avenues to create conveniences and safer lifestyles. In order to protect VANET against security and privacy threats, the security mechanisms employed in VANETs should satisfy the following security requirements: authentication, integrity, nonrepudiation, access control and privacy. The following security primitives help securing VANET: primitives for confidentiality, primitives for data integrity and authentication, primitives for nonrepudiation and primitives for privacy.

  • Context-aware Cooperative Authentication

    Many trusted security mechanisms and protocols have been developed to protect messages over vehicular ad hoc networks (VANETs), and to ensure the integrity and origin of messages. This chapter focuses on the trustworthiness of emergency messages in VANETs. In most cases, a VANET performs message propagation via multihop transmission, particularly in suburban areas where fewer roadside unit (RSUs) are installed. The chapter examines context-aware ways to protect some specific types of messages in VANETs while considering their unique requirements. It demonstrates that the proposed scheme can dramatically reduce both computation and transmission overhead in achieving efficient and effective authentication of emergency messages. The chapter describes the system model and the attack model, and discusses the security and efficiency design goals of the aggregated emergency message authentication and trustworthiness (AEMAT) scheme. It finally evaluates the performance of the proposed AEMAT scheme in terms of the resultant communication cost and computation overhead.

  • Camera-Based Image Forgery Detection

    Recently, an increased number of studies in image authentication and image forgery detection have appeared that are based on indicators arising from the acquisition process of the data, namely due to the inherent characteristics of the camera used to produce the image. This chapter focuses on different aspects of image forgery based on effects and cues found in the image that are due to the acquisition process. These aspects include: image authentication, image forgery detection and image signature. These studies are termed as camera-based image forgery detection methods. The chapter describes the camera structure and the three major components: optics, sensors and imaging pipeline. For each component, its basic mechanism, its role in the acquisition process and its effects on the final acquired image are detailed. The chapter presents a specific camera-based image forgery technique as a case study for the approaches.

  • Multimodal Physiological Biometrics Authentication

    This chapter contains sections titled: Introduction Experimental Protocol Authentication Algorithm Based on EEG Authentication Algorithm Based on ECG EEG and ECG Fusion Conclusion Summary Acknowledgments References

  • Fast Handover Authentication Based on Mobility Prediction

    This chapter discusses the characteristics of VANETs and how vehicles are moving on the road. It presents a fast handover authentication scheme based on a vehicle's mobility prediction. First, the chapter introduces a two-layer network architecture based on WiMax and 802.11p, in which broadband wireless Internet access supports both vehicles' safety-related applications and general mobile users' entertainment-related applications. Next, it briefly talks about the multilayer perceptron (MLP) classifier. The proposed seamless authentication scheme is composed of the following four phases: initial vehicle authentication phase, movement prediction phase, preauthentication phase, and handover phase. The chapter analyzes the security properties of the proposed scheme. In particular, it shows how the scheme can effectively resist replay attack and provide forward secrecy. The chapter concludes with a discussion on the performance of the proposed preauthentication scheme.



Standards related to Authentication

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard for Media Management System (MMS) Session Security, Authentication, Initialization Protocol (SSAIP)

Specify the protocol used to identify, authenticate and establish an initial connection between the software components of the IEEE Media Management System. Details of components of the Media Management System are specified by companion standards.


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


More Standards

Jobs related to Authentication

Back to Top