Authentication

View this topic in
Authentication is the act of confirming the truth of an attribute of a datum or entity. (Wikipedia.org)






Conferences related to Authentication

Back to Top

2018 24th International Conference on Pattern Recognition (ICPR)

ICPR will be an international forum for discussions on recent advances in the fields of Pattern Recognition, Machine Learning and Computer Vision, and on applications of these technologies in various fields

  • 2016 23rd International Conference on Pattern Recognition (ICPR)

    ICPR'2016 will be an international forum for discussions on recent advances in the fields of Pattern Recognition, Machine Learning and Computer Vision, and on applications of these technologies in various fields.

  • 2014 22nd International Conference on Pattern Recognition (ICPR)

    ICPR 2014 will be an international forum for discussions on recent advances in the fields of Pattern Recognition; Machine Learning and Computer Vision; and on applications of these technologies in various fields.

  • 2012 21st International Conference on Pattern Recognition (ICPR)

    ICPR is the largest international conference which covers pattern recognition, computer vision, signal processing, and machine learning and their applications. This has been organized every two years by main sponsorship of IAPR, and has recently been with the technical sponsorship of IEEE-CS. The related research fields are also covered by many societies of IEEE including IEEE-CS, therefore the technical sponsorship of IEEE-CS will provide huge benefit to a lot of members of IEEE. Archiving into IEEE Xplore will also provide significant benefit to the all members of IEEE.

  • 2010 20th International Conference on Pattern Recognition (ICPR)

    ICPR 2010 will be an international forum for discussions on recent advances in the fields of Computer Vision; Pattern Recognition and Machine Learning; Signal, Speech, Image and Video Processing; Biometrics and Human Computer Interaction; Multimedia and Document Analysis, Processing and Retrieval; Medical Imaging and Visualization.

  • 2008 19th International Conferences on Pattern Recognition (ICPR)

    The ICPR 2008 will be an international forum for discussions on recent advances in the fields of Computer vision, Pattern recognition (theory, methods and algorithms), Image, speech and signal analysis, Multimedia and video analysis, Biometrics, Document analysis, and Bioinformatics and biomedical applications.

  • 2002 16th International Conference on Pattern Recognition


2018 IEEE/PES Transmission and Distribution Conference and Exposition (T&D)

Conference and Exposition covering all aspects of Transmission and Distribuiton


2017 12th IEEE Conference on Industrial Electronics and Applications (ICIEA)

Industrial Informatics, Computational Intelligence, Control and Systems, Cyber-physical Systems, Energy and Environment, Mechatronics, Power Electronics, Signal and Information Processing, Network and Communication Technologies


2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2017 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


2017 15th Annual Conference on Privacy, Security and Trust (PST)

PST2017 covers a wide range of Privacy, Security, and Trust (PST) topics. The topics are inter-disciplinary across privacy, security and trust. Technologies of interest include:Access ControlAdversarial Machine LearningAnonymity, Accountability and AuditAttacks on Security and PrivacyAuthenticationBiometricsBlockchain and Related TechnologiesComputer and Network ForensicsCryptographic ProtocolsDistributed Trust and ConsensusFormal Methods for Security and PrivacyIdentity ManagementIntrusion DetectionKey ManagementMetrics for Security and PrivacyPrivacy Preserving/Enhancing TechnologiesProgram Analysis for Security and PrivacyQuantum-resistant CryptographyReputation SystemsThreat modeling and risk analysis The PST conference is unique in its broad approach including examining the issues from both the research and practice perspectives, encouraging multidisciplinary research, and fostering collaboration between academe, the private sector and government.

  • 2016 14th Annual Conference on Privacy, Security and Trust (PST)

    PST2016 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation. Privacy concerns the operational policies, procedures and regulations implemented within an information system to control for the unauthorized use of, access to, or release of personal information held in any format. Security addresses the various components of an information system that safeguard the data and associated infrastructure from unauthorized activity. Trust is a fundamental human behaviour. It is necessary for people to function in social groups, and it forms the foundation for many of our organizations and relationships.

  • 2015 13th Annual Conference on Privacy, Security and Trust (PST)

    PST2015 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation. Privacy concerns the operational policies, procedures and regulations implemented within an information system to control for the unauthorized use of, access to, or release of personal information held in any format. Security addresses the various components of an information system that safeguard the data and associated infrastructure from unauthorized activity. Trust is a fundamental human behavior. It is necessary for people to function in social groups, and it forms the foundation for many of our organizations and relationships.

  • 2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)

    The PST conference mission is to provide a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation.

  • 2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)

    Today new technologies and new applications will not be widely adopted until it can be demonstrated that the security of the underlying ICT infrastructure and the privacy of information being processed are both protected. Only then will users trust and therefore use these innovations and then, and only then, will the developers and society as a whole reap the benefits of the innovation. Without breakthroughs in Privacy, Security and Trust (PST) technology the "bad guys" will continue to thwart our best efforts to convince the public that cyber space is a safe place to do business. The annual Privacy, Security and Trust research conference has quickly established itself as a leading forum for the presentation and discussion of the latest challenges and solutions covering a wide range of PST topics. The PST conference is unique in its broad approach including examining the issues from both the research and practiceperspectives, encouraging multidisciplinary research, and fosterin

  • 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST)

    PST2011 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation. PST2011 will include an Innovation Day featuring workshops and tutorials followed by two days of high-quality research papers.

  • 2010 Eighth Annual International Conference on Privacy, Security and Trust (PST)

    PST2010 provides a forum for researchers world-wide to unveil their latest work in privacy, security and trust and to show how this research can be used to enable innovation.

  • 2008 6th Annual Privacy, Security and Trust Research Conference (PST2008)

    The PST conference is unique in its broad approach to privacy, security and trust research including examining the issues from both the research and practice perspectives, encouraging multidisciplinary research, and fostering collaboration between academe, the private sector and government.


More Conferences

Periodicals related to Authentication

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


More Periodicals

Most published Xplore authors for Authentication

Back to Top

Xplore Articles related to Authentication

Back to Top

Secure Multipath Routing Protocols in Wireless Sensor Networks: A Security Survey Analysis

Ali Modirkhazeni; Norafida Ithnin; Othman Ibrahim 2010 Second International Conference on Network Applications, Protocols and Services, 2010

Wireless Sensor Networks is usually consisting of huge number of limited sensor devices which are communicated over the wireless media. As sensor devices are limited, the networks exposed to various kinds of attacks and conventional defenses against these attacks are not suitable due to the resource constrained. Therefore, security in WSNs is a challenging task due to inheritance limitations of ...


Exploitability analysis using predictive cybersecurity framework

Subil Abraham; Suku Nair 2015 IEEE 2nd International Conference on Cybernetics (CYBCONF), 2015

Managing Security is a complex process and existing research in the field of cybersecurity metrics provide limited insight into understanding the impact attacks have on the overall security goals of an enterprise. We need a new generation of metrics that can enable enterprises to react even faster in order to properly protect mission-critical systems in the midst of both undiscovered ...


A New Public-Key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform

Chin-Chen Chang; Henry Chou 2008 Second International Conference on Future Generation Communication and Networking Symposia, 2008

In this paper, a new oblivious fragile watermarking using discrete cosine transform is proposed. It is inspired by Wong's public key watermarking scheme proposed in 1998 and aims to improve its vulnerability towards possible attacks indicated by Barreto and Holliman. Instead of making use of contextual information and making it an inter-block dependent scheme, as suggested by Barreto, we adopt ...


Self-Authentication Mechanism with Recovery Ability for Digital Images

Yi-Hui Chen; Chih-Yang Lin; Wanutchaporn Sirakriengkrai 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems, 2013

Nowadays, Authentication mechanism is widely applied to digital images. In this paper, we propose a self authentication mechanism with recovery ability for digital images, which is employed to protect the image during transmission over the internet. In the scheme, the image is to authenticate whether the area is modified by comparing the generated authentication code and hidden authentication code together. ...


A Lightweight Protocol for Dynamic RFID Identification

Stelvio Cimato 2008 32nd Annual IEEE International Computer Software and Applications Conference, 2008

RFID technology is widely used worldwide in a broad range of applications. Such technology however raises security concerns about the protection of the information stored in the RFID tags and exchanged during the wireless communication with the readers. In this work we propose an efficient protocol for tag identification which improves on previous proposals and provides an increased level of ...


More Xplore Articles

Educational Resources on Authentication

Back to Top

eLearning

Secure Multipath Routing Protocols in Wireless Sensor Networks: A Security Survey Analysis

Ali Modirkhazeni; Norafida Ithnin; Othman Ibrahim 2010 Second International Conference on Network Applications, Protocols and Services, 2010

Wireless Sensor Networks is usually consisting of huge number of limited sensor devices which are communicated over the wireless media. As sensor devices are limited, the networks exposed to various kinds of attacks and conventional defenses against these attacks are not suitable due to the resource constrained. Therefore, security in WSNs is a challenging task due to inheritance limitations of ...


Exploitability analysis using predictive cybersecurity framework

Subil Abraham; Suku Nair 2015 IEEE 2nd International Conference on Cybernetics (CYBCONF), 2015

Managing Security is a complex process and existing research in the field of cybersecurity metrics provide limited insight into understanding the impact attacks have on the overall security goals of an enterprise. We need a new generation of metrics that can enable enterprises to react even faster in order to properly protect mission-critical systems in the midst of both undiscovered ...


A New Public-Key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform

Chin-Chen Chang; Henry Chou 2008 Second International Conference on Future Generation Communication and Networking Symposia, 2008

In this paper, a new oblivious fragile watermarking using discrete cosine transform is proposed. It is inspired by Wong's public key watermarking scheme proposed in 1998 and aims to improve its vulnerability towards possible attacks indicated by Barreto and Holliman. Instead of making use of contextual information and making it an inter-block dependent scheme, as suggested by Barreto, we adopt ...


Self-Authentication Mechanism with Recovery Ability for Digital Images

Yi-Hui Chen; Chih-Yang Lin; Wanutchaporn Sirakriengkrai 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems, 2013

Nowadays, Authentication mechanism is widely applied to digital images. In this paper, we propose a self authentication mechanism with recovery ability for digital images, which is employed to protect the image during transmission over the internet. In the scheme, the image is to authenticate whether the area is modified by comparing the generated authentication code and hidden authentication code together. ...


A Lightweight Protocol for Dynamic RFID Identification

Stelvio Cimato 2008 32nd Annual IEEE International Computer Software and Applications Conference, 2008

RFID technology is widely used worldwide in a broad range of applications. Such technology however raises security concerns about the protection of the information stored in the RFID tags and exchanged during the wireless communication with the readers. In this work we propose an efficient protocol for tag identification which improves on previous proposals and provides an increased level of ...


More eLearning Resources

IEEE-USA E-Books

  • Query Answer Authentication

    In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties. Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / Conclusion

  • Network Security

    This chapter contains sections titled: * Introduction * Energy Cost of Embedded Security for Wireless Sensor Networks * Increasing Authentication and Communication Confidentiality in Wireless Sensor Networks * Efficient Pairwise Authentication Protocols for Sensor and Ad Hoc Networks * Fast and Scalable Key Establishment in Sensor Networks * Weil Pairing-Based Round, Efficient, and Fault-Tolerant Group Key Agreement Protocol for Sensor Networks * References

  • Generic Authentication Architecture

    This chapter contains sections titled: Overview of Generic Authentication Architecture Foundations of GAA Variations of the Generic Bootstrapping Architecture Building Blocks of GAA Other Architectural Issues Overview of 3GPP GAA Specifications References

  • Security Aspects of SDMN

    This chapter presents the security issues introduced by software defined networking (SDN), network function virtualization, and future mobile networks that integrate these technologies to become software defined mobile networks (SDMN).

  • Applications Using Generic Authentication Architecture

    This chapter contains sections titled: Standardized Usage Scenarios Additional Usage Scenarios References

  • Trust among the Algorithms: Ownership, Identity, and the Collaborative Stewardship of Information

    This chapter contains sections titled: Introduction, A Peculiar Anthropology, Identity, Authentication, and Anonymity, Crypto, Insider Threats and Collaborative Stewardship, Digital Rights Management and Its Discontents, Conclusion, Notes, References

  • GSM Security

    **A concise, updated guide to LTE Security **  This is a welcome Second Edition of the successful book on LTE Security (2010) addressing the security architecture for LTE as specified by 3GPP. Since 2010, LTE has established itself as the unrivalled mobile broadband technology of the fourth generation (4G), with significant commercial deployments around the world and a fast growing market.The subject of this book is hence even more relevant than it has been at the time of the first edition.  The authors explain in detail the security mechanisms employed in LTE and give an overview of the ones in GSM and 3G, which LTE security substantially extends. The specifications generated by standardization bodies inform how to implement the system (and this only to the extent required for interoperability), but almost never inform readers about why things are done the way they are. Furthermore, specifications tend to be readable only for a smal group of experts and lack the context of the broader picture. LTE Security Second Edition describes the essential elements of LTE Security, written by leading experts who participated in decisively shaping LTE security in the relevant standardization body, 3GPP, and explains the rationale behind the standards specifications giving readers a broader understanding of the context to these specifications. * Includes two new chapters covering 3GPP work on Relay Node Security and on system enhancements for Machine-type Communication (MTC), plus application layer security in ETSI TC M2M and embedded smart card in ETSI SCP  * Updates existing chapters , including Voice over LTE, Home base stations, and New Cryptographic Algorithms.

  • SET for E‐Commerce Transactions

    The Secure Electronic Transaction (SET) is a protocol designed for protecting credit card transactions over the Internet. SET is the Internet transaction protocol providing security by ensuring confidentiality, data integrity, authentication of each party, and validation of the participant's identity. The specifications of and ways to facilitate secure payment card transactions on the Internet are fully explored in this chapter. The chapter describes the major business requirements for credit card transactions by means of secure payment processing over the Internet. It also describes several transaction protocols needed to securely conduct payment processing by utilizing the cryptographic concepts. SET introduced a new concept of digital signature called dual signatures (DSs) generated by creating the message digest of two messages: order digest and payment digest. Finally, the chapter presents the steps involved encryption/decryption processes for message integrity.

  • Guidance for Deploying GAA

    This chapter contains sections titled: Integration with Application Servers Integration with OS Security Integration with Identity Management Systems Integration of GAA into Mobile Networks References

  • IPv6 Overview

    This chapter contains sections titled: IPv6 Protocol Basics Summary References



Standards related to Authentication

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard for Media Management System (MMS) Session Security, Authentication, Initialization Protocol (SSAIP)

Specify the protocol used to identify, authenticate and establish an initial connection between the software components of the IEEE Media Management System. Details of components of the Media Management System are specified by companion standards.


IEEE Standard for Message Sets for Vehicle/Roadside Communications

Research, compile, and consolidate information leading to the publication of a standard for exchanging DSRC information, providing for bi-directional message transmission and device control, in a manner which is compatible with but independent of the ASTM efforts to specify DSRC Layers 1 and 2. This will entail specifying the transponder resources, the transponder resource manager, the application message sets, and ...


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


More Standards