The Experts below are selected from a list of 11496 Experts worldwide ranked by ideXlab platform

Karen Renaud - One of the best experts on this subject based on the ideXlab platform.

  • BCS HCI - A Visuo-Biometric Authentication Mechanism for Older Users
    People and Computers XIX — The Bigger Picture, 2020
    Co-Authors: Karen Renaud
    Abstract:

    The Web is an invaluable resource for users of all ages, but it especially offers facilities which can make a huge difference to the lives of elderly users, many of whom have to contend with limited mobility and frequent illness. Whereas there is some understanding of the issues that pertain to designing websites for this group of users, the issue of specialized Web Authentication has not received much attention. Web Authentication is often treated as a one-size-fits-all problem with ubiquitous use of the password, and indeed Authentication is seldom tailored to the needs of either the site or the target users. Sites are seldom subjected to a risk analysis before an Authentication Mechanism is chosen. This paper proposes a technique for matching the risk levels of a website to the security rating of an Authentication Mechanism and presents an Authentication Mechanism that is tailored to the needs of elderly users for protecting sites with a low risk rating. Usage data from a field test of this Mechanism is reported, which show that the Mechanism is indeed feasible and meets older users’ needs.

  • guidelines for designing graphical Authentication Mechanism interfaces
    International Journal of Information and Computer Security, 2009
    Co-Authors: Karen Renaud
    Abstract:

    The password era is drawing to a close. The latest technology is being released without keyboards, which makes password entry insecure and arduous. Furthermore, everyone is straining under the burden of multiple passwords and Personal Identification Numbers (PINs), and a viable knowledge-based alternative is urgently required. In the last few years a number of innovative graphical Authentication Mechanisms, which use pictures instead of alphanumeric strings, have been proposed. There is long-standing evidence that people remember pictures far better than they remember alphanumeric strings, so in terms of easing the memory load, pictures seem to offer a viable alternative. However, what is emerging from current research is that the design of such a graphical Authentication Mechanism interface can either make or break it, both in terms of security and usability. This paper will discuss various design options and make recommendations about how such systems should be designed in order to make them maximally efficacious while considering the level of risk associated with the resource being protected by the Mechanism.

  • A process for supporting risk-aware web Authentication Mechanism choice
    Reliability Engineering & System Safety, 2007
    Co-Authors: Karen Renaud
    Abstract:

    Web Authentication is often treated as a one-size-fits-all problem with ubiquitous use of the password. Indeed, Authentication is seldom tailored to the needs of either the site or the target users. This paper does an in-depth analysis of all the vulnerabilities of Authentication Mechanisms, and proposes a structured and simple process which, if followed, will enable developers to choose a web Authentication Mechanism so that it matches the needs of their particular site.

  • a visuo biometric Authentication Mechanism for older users
    BCS HCI, 2006
    Co-Authors: Karen Renaud
    Abstract:

    The Web is an invaluable resource for users of all ages, but it especially offers facilities which can make a huge difference to the lives of elderly users, many of whom have to contend with limited mobility and frequent illness. Whereas there is some understanding of the issues that pertain to designing websites for this group of users, the issue of specialized Web Authentication has not received much attention. Web Authentication is often treated as a one-size-fits-all problem with ubiquitous use of the password, and indeed Authentication is seldom tailored to the needs of either the site or the target users. Sites are seldom subjected to a risk analysis before an Authentication Mechanism is chosen. This paper proposes a technique for matching the risk levels of a website to the security rating of an Authentication Mechanism and presents an Authentication Mechanism that is tailored to the needs of elderly users for protecting sites with a low risk rating. Usage data from a field test of this Mechanism is reported, which show that the Mechanism is indeed feasible and meets older users’ needs.

Tai-myoung Chung - One of the best experts on this subject based on the ideXlab platform.

  • ICSNC - Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Environment
    2008 Third International Conference on Systems and Networks Communications, 2008
    Co-Authors: Tai-myoung Chung
    Abstract:

    In the current specification of Proxy Mobile IPv6, there is no attempts for optimized Authentication Mechanism. In this paper, we propose a ticket-based Authentication Mechanism in where the security information are reused for fast Authentication during mobile nodes hand off between different links. According to the performance evaluation, the proposed Mechanism shows the improved performance up to 89.2% compared to EAP-TLS and Kerberos. In addition, we provide the validity of the proposed Mechanism through BAN logic.

  • Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Environment
    2008 Third International Conference on Systems and Networks Communications, 2008
    Co-Authors: Tai-myoung Chung
    Abstract:

    In the current specification of Proxy Mobile IPv6, there is no attempts for optimized Authentication Mechanism. In this paper, we propose a ticket-based Authentication Mechanism in where the security information are reused for fast Authentication during mobile nodes hand off between different links. According to the performance evaluation, the proposed Mechanism shows the improved performance up to 89.2% compared to EAP-TLS and Kerberos. In addition, we provide the validity of the proposed Mechanism through BAN logic.

Chiayi Ku - One of the best experts on this subject based on the ideXlab platform.

  • a new ticket based Authentication Mechanism for fast handover in mesh network
    PLOS ONE, 2016
    Co-Authors: Pujen Cheng, Chiayi Ku
    Abstract:

    Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual Authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover Authentication Mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.’s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.’s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover Authentication Mechanism. The new Mechanism offers a higher level of security on a more scalable ground with the client’s privacy better preserved. The results of our performance analysis suggest that our new Mechanism is superior to some similar Mechanisms in terms of Authentication delay.

Hossam Afifi - One of the best experts on this subject based on the ideXlab platform.

  • Iris based Authentication Mechanism for e-Passports
    2010 2nd International Workshop on Security and Communication Networks, IWSCN 2010, 2010
    Co-Authors: Muhammad Abid, Sanjay Kanade, Mohamed Abid, Bernadette Dorizzi, Dijana Petrovska-delacrétaz, Hossam Afifi
    Abstract:

    E-Passports are widely issued all over the world, although they suffer from security flaws. Many guidelines were proposed to solve these security considerations, like the guideline of the International Civil Aviation Organization (ICAO), the Extended Access Control (EAC), and other solutions for the third e-Passport generation. In this paper, an iris based Authentication Mechanism for e-Passport is proposed and validated. This Mechanism is based on Elliptic Curve Cryptography (ECC). The iris based cryptographic key regeneration scheme is used to obtain a stable input from biometric data which is used to generate the security parameters of the elliptic curve. Another important aspect of this work is that it is evaluated on a publicly available biometric database. The results show a good performance especially from a biometric point of view (False Acceptance Rate of 0.2% and False Rejection Rate of 3.6%) on a subset of the NIST-ICE database.

Yihui Chen - One of the best experts on this subject based on the ideXlab platform.

  • Self-Authentication Mechanism with Recovery Ability for Digital Images
    2013 Seventh International Conference on Complex Intelligent and Software Intensive Systems, 2013
    Co-Authors: Yihui Chen, Wanutchaporn Sirakriengkrai
    Abstract:

    Nowadays, Authentication Mechanism is widely applied to digital images. In this paper, we propose a self Authentication Mechanism with recovery ability for digital images, which is employed to protect the image during transmission over the internet. In the scheme, the image is to authenticate whether the area is modified by comparing the generated Authentication code and hidden Authentication code together. In our experimental result, we show the positive result for the feasibility of the proposed scheme.

  • CISIS - Self-Authentication Mechanism with Recovery Ability for Digital Images
    2013 Seventh International Conference on Complex Intelligent and Software Intensive Systems, 2013
    Co-Authors: Yihui Chen, Wanutchaporn Sirakriengkrai
    Abstract:

    Nowadays, Authentication Mechanism is widely applied to digital images. In this paper, we propose a self Authentication Mechanism with recovery ability for digital images, which is employed to protect the image during transmission over the internet. In the scheme, the image is to authenticate whether the area is modified by comparing the generated Authentication code and hidden Authentication code together. In our experimental result, we show the positive result for the feasibility of the proposed scheme.

  • Authentication Mechanism for secret sharing using boolean operation
    电子科技学刊:英文版, 2012
    Co-Authors: Yihui Chen
    Abstract:

    A lossless image secret sharing using a simple Boolean operation is proposed. The concept of visual cryptography in the secret sharing scheme is used to redesign a lossless secret sharing scheme. To ensure that the reconstructed image is the true secret image, an Authentication Mechanism is imported into the proposed scheme to verify whether the shadows are authentic before reconstructing the secret image. The proposed scheme delivers much more effective performance than Chen and Wu's scheme.

  • A Self-Authentication Mechanism for a (3, 3)-threshold Secret Sharing Scheme
    2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
    Co-Authors: Yihui Chen
    Abstract:

    Secret sharing is widely used in secret image protection since 1979. Image secret sharing schemes are used to encrypt the secret image into several meaningless share images. Later on, the secret image can be reconstructed while collecting the share images. The Authentication Mechanism is a way to verify whether the reconstructed secret image is authentic. The general Authentication might increase the cost of key maintenance. To reduce the cost, this paper proposed a self-Authentication Mechanism for image secret sharing scheme. In addition, the reconstructed image can be completely reconstructed. The experiments give the positive data to show the feasibility of the proposed scheme.