Skip to Content
You are currently on the new version of our website. Access the old version .

88 Results Found

  • Article
  • Open Access
334 Views
25 Pages

Authentication and Authorisation Method for a Cloud Side Static IoT Application

  • Jose Alvarez,
  • Matheus Santos,
  • David May and
  • Gerard Dooly

19 December 2025

IoT applications are increasingly common, yet they often rely on expensive, externally managed authentication services. This paper introduces a novel, self-contained authentication method for IoT applications which leverages fog computing principles...

  • Article
  • Open Access
7 Citations
8,604 Views
24 Pages

This research article delves into the development of a reinforcement learning (RL)-based continuous authentication system utilizing behavioral biometrics for user identification on computing devices. Keystroke dynamics are employed to capture unique...

  • Article
  • Open Access
10 Citations
5,691 Views
17 Pages

1 October 2022

In many fields of social life, such as justice, finance, communication and so on, signatures are used for identity recognition. The increasingly convenient and extensive application of technology increases the opportunity for forged signatures. How t...

  • Feature Paper
  • Article
  • Open Access
14 Citations
5,068 Views
20 Pages

Authentication of a Painting by Nicolae Grigorescu Using Modern Multi-Analytical Methods

  • Petru Ovidiu Tanasa,
  • Ion Sandu,
  • Viorica Vasilache,
  • Ioan Gabriel Sandu,
  • Ioan Cristinel Negru and
  • Andrei Victor Sandu

21 May 2020

The paper presents the expertise of authenticating a painting by Nicolae Grigorescu through the involvement of multi-analytical techniques, in order to identify and evaluate some archaeometric and chemometric characteristics of the pictorial material...

  • Article
  • Open Access
2 Citations
2,990 Views
23 Pages

Wireless, satellite, and mobile networks are increasingly used in application scenarios to provide advanced services to mobile or nomadic devices. For example, to authenticate mobile users while obtaining access to remote services, a two-factor authe...

  • Article
  • Open Access
10 Citations
3,480 Views
15 Pages

An Experimental Performance Assessment of Galileo OSNMA

  • Toni Hammarberg,
  • José M. Vallet García,
  • Jarno N. Alanko and
  • M. Zahidul H. Bhuiyan

9 January 2024

We present Galileo Open Service Navigation Message Authentication (OSNMA) observed operational information and key performance indicators (KPIs) from the analysis of a ten-day-long dataset collected in static open-sky conditions in southern Finland a...

  • Article
  • Open Access
13 Citations
4,004 Views
16 Pages

14 December 2020

Authentication has three basic factors—knowledge, ownership, and inherence. Biometrics is considered as the inherence factor and is widely used for authentication due to its conveniences. Biometrics consists of static biometrics (physical chara...

  • Article
  • Open Access
12 Citations
5,683 Views
18 Pages

31 August 2018

We introduce a two-stream model to use reflexive eye movements for smart mobile device authentication. Our model is based on two pre-trained neural networks, iTracker and PredNet, targeting two independent tasks: (i) gaze tracking and (ii) future fra...

  • Article
  • Open Access
28 Citations
11,858 Views
20 Pages

Untraceable Mobile Node Authentication in WSN

  • Kyusuk Han,
  • Kwangjo Kim and
  • Taeshik Shon

30 April 2010

Mobility of sensor node in Wireless Sensor Networks (WSN) brings security issues such as re-authentication and tracing the node movement. However, current security researches on WSN are insufficient to support such environments since their designs on...

  • Proceeding Paper
  • Open Access
3 Citations
1,302 Views
10 Pages

Sensitivity Analysis of Galileo OSNMA Cross-Authentication Sequences

  • Aleix Galan,
  • Cillian O’Driscoll,
  • Ignacio Fernandez-Hernandez and
  • Sofie Pollin

The Galileo Open Service Navigation Message Authentication (OSNMA) service has been transmitting stably in recent years and is expected to be declared operational in the next months. While the protocol is very flexible, most of the parameters, such a...

  • Article
  • Open Access
25 Citations
15,853 Views
25 Pages

Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication protocols. In this work, various recent ECC-based authentication and key exchange protocols are subjected to threat modeling and static analysis to detect vul...

  • Article
  • Open Access
3 Citations
2,084 Views
26 Pages

27 March 2025

Telemedicine diagnosis has become a more flexible and convenient way to receive diagnoses, which is of great significance in enhancing diagnosis, cutting costs, and serving remote users. However, telemedicine faces many security problems, such as the...

  • Article
  • Open Access
9 Citations
3,352 Views
22 Pages

Siamese Neural Network for Keystroke Dynamics-Based Authentication on Partial Passwords

  • Kamila Lis,
  • Ewa Niewiadomska-Szynkiewicz and
  • Katarzyna Dziewulska

26 July 2023

The paper addresses issues concerning secure authentication in computer systems. We focus on multi-factor authentication methods using two or more independent mechanisms to identify a user. User-specific behavioral biometrics is widely used to increa...

  • Article
  • Open Access
34 Citations
9,755 Views
17 Pages

Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication

  • Nyle Siddiqui,
  • Rushit Dave,
  • Mounika Vanamala and
  • Naeem Seliya

Static authentication methods, like passwords, grow increasingly weak with advancements in technology and attack strategies. Continuous authentication has been proposed as a solution, in which users who have gained access to an account are still moni...

  • Article
  • Open Access
31 Citations
5,017 Views
26 Pages

11 January 2018

Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication...

  • Article
  • Open Access
193 Views
36 Pages

Continuous Authentication Through Touch Stroke Analysis with Explainable AI (xAI)

  • Muhammad Nadzmi Mohd Nizam,
  • Shih Yin Ooi,
  • Soodamani Ramalingam and
  • Ying Han Pang

Mobile authentication is crucial for device security; however, conventional techniques such as PINs and swipe patterns are susceptible to social engineering attacks. This work explores the integration of touch stroke analysis and Explainable AI (xAI)...

  • Article
  • Open Access
518 Views
21 Pages

Quantum Enabled Data Authentication Without Classical Control Interaction

  • Piotr Zawadzki,
  • Grzegorz Dziwoki,
  • Marcin Kucharczyk,
  • Jan Machniewski,
  • Wojciech Sułek,
  • Jacek Izydorczyk,
  • Weronika Izydorczyk,
  • Piotr Kłosowski,
  • Adam Dustor and
  • Anna Zawadzka
  • + 2 authors

14 October 2025

We present a quantum-assisted data authentication protocol that integrates classical information-theoretic security with quantum communication techniques. We assume only that the participants have access to open classical and quantum channels, and sh...

  • Article
  • Open Access
5 Citations
3,012 Views
36 Pages

6 August 2020

Since current key management schemes are mainly designed for static and planar networks, they are not very suitable for the layer-cluster wireless sensor networks (WSNs), a WSN layer-cluster key management scheme based on quadratic polynomial and Lag...

  • Article
  • Open Access
3 Citations
4,179 Views
20 Pages

3 February 2022

In the Literature, we can find several research works to help in the digital crime fight in order to prove integrity and authenticity of a published document, image or video. Among all the crimes, fake news certainly is among the most recurrent ones...

  • Article
  • Open Access
4 Citations
3,442 Views
16 Pages

mmSafe: A Voice Security Verification System Based on Millimeter-Wave Radar

  • Zhanjun Hao,
  • Jianxiang Peng,
  • Xiaochao Dang,
  • Hao Yan and
  • Ruidong Wang

29 November 2022

With the increasing popularity of smart devices, users can control their mobile phones, TVs, cars, and smart furniture by using voice assistants, but voice assistants are susceptible to intrusion by outsider speakers or playback attacks. In order to...

  • Article
  • Open Access
351 Views
30 Pages

Although cookies introduced as session authentication tokens in Hypertext Transfer Protocol (HTTP) resolve its stateless limitation, their static nature introduces vulnerabilities to cross-site scripting (XSS) attacks. Attackers exploit unfiltered us...

  • Article
  • Open Access
24 Citations
6,356 Views
27 Pages

A Framework for Continuous Authentication Based on Touch Dynamics Biometrics for Mobile Banking Applications

  • Priscila Morais Argôlo Bonfim Estrela,
  • Robson de Oliveira Albuquerque,
  • Dino Macedo Amaral,
  • William Ferreira Giozza and
  • Rafael Timóteo de Sousa Júnior

19 June 2021

As smart devices have become commonly used to access internet banking applications, these devices constitute appealing targets for fraudsters. Impersonation attacks are an essential concern for internet banking providers. Therefore, user authenticati...

  • Article
  • Open Access
10 Citations
3,699 Views
20 Pages

2 October 2021

Electric Network Frequency (ENF) is embedded in multimedia recordings if the recordings are captured with a device connected to power mains or placed near the power mains. It is exploited as a tool for multimedia authentication. ENF fluctuates stocha...

  • Article
  • Open Access
10 Citations
21,917 Views
16 Pages

10 July 2020

Disney’s Mulan (1998) has generated much scholarly interest in comparing the film with its hypotext: the Chinese legend of Mulan. While this comparison has produced meaningful criticism of the Orientalism inherent in Disney’s cultural app...

  • Article
  • Open Access
16 Citations
9,146 Views
23 Pages

5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy

  • Ilsun You,
  • Gunwoo Kim,
  • Seonghan Shin,
  • Hoseok Kwon,
  • Jongkil Kim and
  • Joonsang Baek

27 December 2023

5G acts as a highway enabling innovative digital transformation and the Fourth Industrial Revolution in our lives. It is undeniable that the success of such a paradigm shift hinges on robust security measures. Foremost among these is primary authenti...

  • Article
  • Open Access
2,960 Views
20 Pages

This paper investigates digital comics—particularly webcomics and webtoons—as emerging forms of cultural heritage, analyzing their exponential global influence alongside the limitations of traditional heritage frameworks in systematically...

  • Article
  • Open Access
1,732 Views
25 Pages

29 October 2025

Heritage cities confront persistent tensions between safeguarding cultural authenticity and facilitating sustainable heritage tourism within rapidly modernizing urban contexts. This study examines these dynamics through Pingyao Ancient City, a UNESCO...

  • Article
  • Open Access
1 Citations
2,109 Views
14 Pages

Universally Composable Oblivious Transfer with Low Communication

  • Jiashuo Song,
  • Dongfei Wang,
  • Zhenzhen Zhang,
  • Zhenzhen Li,
  • Haiyang Ding and
  • Zichen Li

6 February 2023

In this paper, a universally composable 1-out-of-N oblivious transfer protocol with low communication is built. This protocol obtained full simulation security based on the modulo learning with rounding (Mod-LWR) assumption. It can achieve universall...

  • Article
  • Open Access
3 Citations
2,934 Views
18 Pages

A Robust Behavioral Biometrics Framework for Smartphone Authentication via Hybrid Machine Learning and TOPSIS

  • Moceheb Lazam Shuwandy,
  • Qutaiba Alasad,
  • Maytham M. Hammood,
  • Ayad A. Yass,
  • Salwa Khalid Abdulateef,
  • Rawan A. Alsharida,
  • Sahar Lazim Qaddoori,
  • Saadi Hamad Thalij,
  • Maath Frman and
  • Noor S. Abd
  • + 1 author

Significant vulnerabilities in traditional authentication systems have been demonstrated due to the high dependence on smartphone hardware devices to execute many different and complicated tasks. PINs, passwords, and static biometric techniques have...

  • Article
  • Open Access
5 Citations
3,520 Views
43 Pages

An Anti-Forensics Video Forgery Detection Method Based on Noise Transfer Matrix Analysis

  • Qing Bao,
  • Yagang Wang,
  • Huaimiao Hua,
  • Kexin Dong and
  • Feifei Lee

18 August 2024

The dispute over the authenticity of video has become a hot topic in judicial practice in recent years. Despite detection methods being updated rapidly, methods for determining authenticity have limitations, especially against high-level forgery. Del...

  • Proceeding Paper
  • Open Access
215 Views
11 Pages

Impact of Operating Conditions on the Reliability of SRAM-Based Physical Unclonable Functions (PUFs)

  • Marco Grossi,
  • Martin Omaña,
  • Simone Bisi,
  • Cecilia Metra and
  • Andrea Acquaviva

27 January 2026

Wireless sensor systems can collect and share a large amount of data for different kinds of applications, but are also vulnerable to cyberattacks. The impact of cyberattacks on systems’ confidentiality, integrity, and availability can be mitiga...

  • Abstract
  • Open Access
1 Citations
1,588 Views
1 Page

Hardware Passwords Manager Based on Biometric Authentication

  • Camelia Avram,
  • Jose Machado and
  • Adina Aştilean

This paper presents a portable passwords manager which has a two-stage biometric-based access procedure. Data security using biometric methods was chosen as a variant of reduced complexity but was very effective in preventing cyber theft. The impleme...

  • Article
  • Open Access
2 Citations
1,707 Views
19 Pages

Ensuring vehicle security and preventing unauthorized driving are critical in modern transportation. Traditional driver identification methods, such as biometric authentication, require additional hardware and may not adapt well to changing driving b...

  • Article
  • Open Access
425 Views
25 Pages

The integration of operational technology (OT) and information technology (IT) within the Industrial Internet of Things (IIoT) has posed prominent security challenges for resource-constrained devices. Existing authentication architectures often suffe...

  • Article
  • Open Access
16 Citations
2,615 Views
14 Pages

7 February 2023

The current study shows the numerical performances of the fractional order mathematical model based on the Majnun and Layla (FO-MML) romantic story. The stochastic computing numerical scheme based on the scaled conjugate gradient neural networks (SCG...

  • Article
  • Open Access
2 Citations
2,118 Views
10 Pages

Self-Supervised Facial Motion Representation Learning via Contrastive Subclips

  • Zheng Sun,
  • Shad A. Torrie,
  • Andrew W. Sumsion and
  • Dah-Jye Lee

Facial motion representation learning has become an exciting research topic, since biometric technologies are becoming more common in our daily lives. One of its applications is identity verification. After recording a dynamic facial motion video for...

  • Article
  • Open Access
1 Citations
1,768 Views
16 Pages

27 December 2024

Permissioned blockchains are increasingly used in areas like supply chain management, financial transactions, and medical data sharing, where ensuring data consistency and security is critical. However, these systems are vulnerable to threats such as...

  • Article
  • Open Access
5 Citations
2,126 Views
17 Pages

Study on Analysis Principle of Spatial System Method for a Hydraulic Steel Gate

  • Xuecai Zhang,
  • Senyuan Lou,
  • Liye Chen,
  • Zhengzhong Wang and
  • Fufu Zhang

10 November 2022

The target of this paper is to ensure that the spatial system method has scientific and efficient rules to follow in structural analysis of a hydraulic steel gate, and to overcome the problems of randomness and fuzziness in the analysis process. Base...

  • Article
  • Open Access
1 Citations
5,463 Views
24 Pages

1 May 2025

Generating character-consistent and personalized dialogue for Non-Player Characters (NPCs) in Role-Playing Games (RPGs) poses significant challenges, especially due to limited memory retention and inconsistent character representation. This paper pro...

  • Article
  • Open Access
8 Citations
3,946 Views
17 Pages

19 January 2022

Recently, more and more mobile devices have been connected to the Internet. The Internet environment is complicated, and network security incidents emerge endlessly. Traditional blocking and killing passive defense measures cannot fundamentally meet...

  • Article
  • Open Access
9 Citations
11,507 Views
16 Pages

A Biomimetic Approach for Designing a Full External Breast Prosthesis: Post-Mastectomy

  • Pedro Cruz,
  • F. Josue Hernandez,
  • Ma. Lourdes Zuñiga,
  • Jose Maria Rodríguez,
  • Rafael Figueroa,
  • Antonio Vertiz and
  • Zaira Pineda

1 March 2018

This work presents the design of a new breast prosthesis using the biomimetic technique for cases of complete mastectomy to address the problem of the increasing number of women diagnosed with breast cancer in Mexico who are candidates for a mastecto...

  • Article
  • Open Access
58 Citations
7,183 Views
14 Pages

Elephant dung coffee (Black Ivory Coffee) is a unique Thai coffee produced from Arabica coffee cherries consumed by Asian elephants and collected from their feces. In this work, elephant dung coffee and controls were analyzed using static headspace g...

  • Article
  • Open Access
2 Citations
3,191 Views
32 Pages

The rapid evolution and deployment of 5G networks have introduced complex security challenges due to their reliance on dynamic network slicing, ultra-low latency communication, decentralized architectures, and highly diverse use cases. Traditional pe...

  • Article
  • Open Access
2 Citations
2,272 Views
22 Pages

7 December 2022

This study aimed to provide a static solution to the boundary value problem presented by symmetric (0°/90°/0°) and antisymmetric (0°/90°) cross-ply composite, moderately thick shallow shells and plates (a special case of the shell...

  • Article
  • Open Access
802 Views
20 Pages

20 August 2025

In the domain of multi-agent reinforcement learning, conventional algorithms such as VDN, QMIX, and QTRAN have exhibited favorable performance in static task scenarios. However, these algorithms encounter challenges due to their limited capacity to m...

  • Article
  • Open Access
7 Citations
3,764 Views
20 Pages

3 January 2022

The ecosystem for an Internet of Things (IoT) generally comprises endpoint clients, network devices, and cloud servers. Thus, data transfers within the network present multiple security concerns. The recent boom in IoT applications has accelerated th...

  • Article
  • Open Access
16 Citations
5,464 Views
21 Pages

1 August 2018

The main objective of the study is to challenge previous approaches to heritage, both in terms of management and conceptualization. It aims to highlight the importance and articulation of the different attributes in abandoned vernacular landscapes in...

  • Article
  • Open Access
4 Citations
4,132 Views
14 Pages

The ability of an agent (natural or artificial) to overcome limitations caused by complexity can be identified with intelligence. Yet, the study of complexity is dominated by the issues not really associated with authentic intelligence. In search of...

  • Proceeding Paper
  • Open Access
1,673 Views
10 Pages

The resilience of Global Navigation Satellite System (GNSS) usage against spoofing attacks can be increased by signal monitoring algorithms aiming to detect a spoofing signal at the acquisition stage of GNSS receiver signal processing. A common appro...

  • Article
  • Open Access
790 Views
18 Pages

28 April 2025

As security issues in vehicular networks continue to intensify, ensuring the trustworthiness of message exchanges among vehicles, infrastructure, and cloud platforms has become increasingly critical. Although trust authentication serves as a fundamen...

of 2