user access
Recently Published Documents


TOTAL DOCUMENTS

621
(FIVE YEARS 195)

H-INDEX

21
(FIVE YEARS 5)

2022 ◽  
Vol 98 ◽  
pp. 107692
Author(s):  
Azeem Irshad ◽  
Shehzad Ashraf Chaudhry ◽  
Anwar Ghani ◽  
Ghulam Ali Mallah ◽  
Muhammad Bilal ◽  
...  

Author(s):  
Amitabh Thapliyal ◽  
Om Prakash Verma ◽  
Amioy Kumar

<p><span>The usage of mobile phones has increased multifold in the recent decades mostly because of its utility in most of the aspects of daily life, such as communications, entertainment, and financial transactions. Feature phones are generally the keyboard based or lower version of touch based mobile phones, mostly targeted for efficient calling and messaging. In comparison to smart phones, feature phones have no provision of a biometrics system for the user access. The literature, have shown very less attempts in designing a biometrics system which could be most suitable to the low-cost feature phones. A biometric system utilizes the features and attributes based on the physiological or behavioral properties of the individual. In this research, we explore the usefulness of keystroke dynamics for feature phones which offers an efficient and versatile biometric framework. In our research, we have suggested an approach to incorporate the user’s typing patterns to enhance the security in the feature phone. We have applied k-nearest neighbors (k-NN) with fuzzy logic and achieved the equal error rate (EER) 1.88% to get the better accuracy. The experiments are performed with 25 users on Samsung On7 Pro C3590. On comparison, our proposed technique is competitive with almost all the other techniques available in the literature.</span></p>


2021 ◽  
Vol 11 (6) ◽  
pp. 653-661
Author(s):  
Preetha Shivanna ◽  
Sheela Samudrala Venkatesiah

In the current era, it is necessary to device authorization and authentication techniques to secure resources in information technology. There are several methods to substantiate authorization and authentication. User authentication is essential for authenticating user access control in WSNs. Biometric recognition error, lack of anonymity and vulnerability to attacks, user verification problem, revocation problem and disclosure of session key by the gateway node are some of the security flaws encountered. In this study, a Multimodal Authentication Scheme for Wireless Sensor Networks (WSN-MAS) is proposed to authenticate legitimate users. The main objective is the fusion of fingerprint and iris biometric features at feature level to enable additional accuracy to verify and match user identity with stored templates. In this paper, multimodal biometric features are used for authentication to improve performance, reduce system error rates to achieve better security in WSN.


2021 ◽  
Vol 5 (1) ◽  
pp. 1-7
Author(s):  
Odila Abduraimovna Islamova ◽  
Zoya Sergeevna Chay ◽  
Feruza Saidovna Rakhimova ◽  
Feruza Saydaxmatovna Abdullayeva

This work belongs to the field of limit theorems for separable statistics. In particular, this paper considers the number of empty cells after placing particles in a finite number of cells, where each particle is placed in a polynomial scheme. The statistics under consideration belong to the class of separable statistics, which were previously considered in (Mirakhmedov: 1985), where necessary statements for the layout of particles in a countable number of cells were proved. The same scheme was considered in (Asimov: 1982), in which the conditions for the asymptotic normality of random variables were established. In this paper, the asymptotic normality of the statistics in question is proved and an estimate of the remainder term in the central limit theorem is obtained. In summary, the demand for separable statistics systems is growing day by day to address large-scale databases or to facilitate user access to data management. Because such systems are not only used for data entry and storage, they also describe their structure: file collection supports logical consistency; provides data processing language; restores data after various interruptions; database management systems allow multiple users.


Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3151
Author(s):  
Xia Deng ◽  
Junbin Shao ◽  
Le Chang ◽  
Junbin Liang

With the rapid development of satellite technology and the high transmission efficiency of LEO satellites, LEO satellite communication has received increasing attention. However, the frequent switching of satellite-earth links imposes a great challenge in LEO communication authentication. To tackle this challenge, this paper proposes a Blockchain-based Authentication Protocol Using Cryptocurrency Technology (BAPC), which solves the problem of a long pause time of satellite services caused by user access authentication in a scenario of frequent switching between satellites and ground users. First, we design three stages of the authentication process and introduce the cryptocurrency technology. Using currency transactions as the certificate of authentication improves not only the security of authentication, but also the efficiency of switching authentication. Next, in the network topology, the satellite cluster is divided into multiple regions to improve the efficiency of block consensus. Finally, the protocol is tested through extensive NS2-based simulations, and the results verify that BAPC can greatly shorten the response time of switching authentication and significantly reduce the time of block generation and the network throughput. As the number of users increases, the block generation time and network throughput can be further reduced.


2021 ◽  
Vol 6 (2) ◽  
pp. 210
Author(s):  
Rudi Hermawan

<p><em>In recent years cases of cyber attacks that lead to website security have increased. The most widely used website hacking threat is sql injection. By using the sqlmap tool that runs on the Kalilinux  operating system, attackers can easily take over very important user authentication data with their passwords. Attackers only use a special SQL query script using the python programming language will force the web server to output database information, tables, columns and data contents. This sql injection technique is not difficult, knowing how sql injection works is expected to be useful for web admins and web application developers to be able to secure user access from attackers. This attack simulation uses a virtual machine, by creating two virtual computers that are scripted as the attacker and the target server. By testing through this simulation, we can find out how the attack process and the consequences of attacks carried out by attackers.</em></p>


2021 ◽  
Vol 5 (11) ◽  
pp. 5-9
Author(s):  
Donglin Ge

As public assembly occupancies, academic libraries in China have been implementing effective strategies in response to the challenges brought by the COVID-19 pandemic since January 2020, in order to meet the teaching, learning, and researching needs of the faculties and students due to the closure of libraries. The library at the University of Shanghai for Science and Technology (USST) is one of the typical cases with significantly increased user access during the pandemic. In this article, a reflection is made on the emergency measures and endeavours by the library in USST to adapt various services, including digital resources guarantee while working remotely, moving from an offline reference service to online ones, extending circulation from an in-door service to an out-door service, the use of social media, and so on, in order to discuss the emerging problems and to analyze the lessons learned. On this basis, this article proposes suggestions for university libraries to realign their development directions and measures to digital collections and online services as well as to improve the vocational skills of librarians in the post-epidemic period, so as to provide more professional, active, and considerate services in the future.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Jianmin Wang ◽  
Yukun Xia ◽  
Wenbin Zhao ◽  
Yuhang Zhang ◽  
Feng Wu

Big data is massive and heterogeneous, along with the rapid increase in data quantity, and the diversification of user access, traditional database, and access control methods can no longer meet the requirements of big data storage and flexible access control. To solve this problem, an entity relationship completion and authority management method is proposed. By combining the weighted graph convolutional neural network and the attention mechanism, a knowledge base completion model is given. On this basis, the authority management model is formally defined and the process of multilevel trust access control is designed. The effectiveness of the proposed method is verified by experiments, and the authority management of knowledge base is more fine-grained and more secure.


Sign in / Sign up

Export Citation Format

Share Document