Query : Authentication
- Lloret, Jaime4
- Abd Alaziz ibn Mukhtar ibn Ibrahim2
- Adam M. Kiefer2
- Amy Jenkins2
- Ana Villar2
- Anthony L. Fratino2
- Bouyat, Jeanne2
- Daeseon Choi2
- Huber, Michael2
- Jean Bernon2
- Riky Rustam2
- Spiridopoulou, Maria2
- A. F. M. Shahen Shah1
- A. F. M. Suaib Akhter1
- A. S. M. Sanwar Hosen1
- A. V. Minbaleev1
- A.V. Sandu1
- A. Verpoorte1
- Aanchal Priyadarshini1
- Aayat Mahmoud Shdaifat1
- Methods and Statistics76
- Architecture and Space Management41
- Communication Sciences37
- Cultural Heritage and Museology32
- Biological Anthropology23
- Social Anthropology and Ethnology22
- Art and Art History20
- Archaeology and Prehistory16
- History, Philosophy and Sociology of Sciences13
- Gender Studies10
- Political Science10
- Environmental studies8
- Musicology and Performing Arts5
- Economies and Finances3
- Classical Studies2
Authentication of royal acts by the weapon seal of Queen Catherine de Foix
During this last year (March 2017 — April 2018) we consulted and described more than a thousand acts issued by King Jean d’ALBRET and his wife Queen Catherine de Foix. As regards their authentication, as demonstrated by Faustino Menéndez Pidal Navascués, Mikel Ramos Aguirre or Esperanza Ochoa de Olz...
Modeling security for network access through asymmetric cryptography using iris recognition and agent technology
The exponential growth in the use of the Internet as well as the emergence of new types of applications has increased the network’s constraints in terms f security. Fort the last several years, biometric techniques have proven their applicability and reliability in providing secure access to shared...
Tell or prove. Stories of discoveries and non-discoveries of oral caves
The debate on the seniority and authenticity of parithal art has developed in Europe for more than twenty years, starting in 1879 when the discovery of Altamira cave paintings takes place in Spain. The length of this debate reveals the difficulty for pre-historians of the end of the nineteenth centu...
Weaknesses of a dynamic identity based authentication protocol for multi-server architecture
Recently, Li et al. proposed a dynamic identity based authentication protocol for multi-server architecture. They claimed their protocol is secure and can withstand various attacks. But we found some security loopholes in the protocol. Accordingly, the current paper demonstrates that Li et al.'s pro...
Fake and plagiats in emerging literatures: when the French editorial market imposes its laws
Hélène Maurel-Indart (dir.) Dejà with ‘I’irai cracher on your tombs’, under the pseudonym of Vernon Sullivan, Boris Vian operated a successful vein: the popularity of the French public for the ‘Séries Noires’. The ‘false novels ‘beurs’, which emerged in the late 90s (the Chimo ‘affair’, followed by...
Vincent Lavoie éd., La Preuve par l’Image, Quebec, Canada, Presses of the University of Quebec, 2017, 298 pages
In 2017, the historian of the photography Vincent Lavoie published L’Affaire Capa, a roborative investigation into methods of authentication of photography, which are divided for the author into three categories: the voice of witnesses, records and forensic expertise. These three elements have an em...
Secure communication architecture for a UAV swarm
Advances in miniaturization of embedded systems have helped to produce small Unmanned Aerial Vehicles (UAVs) with highly effective capacity. In order to improve their capability in civilian complex missions (for instance, to bypass an obstruction), it is now possible to deploy UAV swarms, in which c...
Lightweight Distance bound Protocol for Low Cost RFID Tags
Almost all existing RFID authentication schemes (tag/reader) are vulnerable to relay attacks, because of their inability to estimate the distance to the tag. These attacks are very serious since it can be mounted without the notice of neither the reader nor the tag and cannot be prevented by cryptog...
Doubts about the links and authentication survey: the example of Hélène
The cliché, which sees the Middle Ages as a creative time and the men of this time of great children, has a hard life. It comes from the 19th century and is still home today to the heart of those who dream of a Middle Ages which, despite its hardness, would have been a ninety period. Enthusiasm and...
A Directly Public Verifiable Signcryption Scheme based on Elliptic Curves
A directly public verifiable signcryption scheme is introduced in this paper that provides the security attributes of message confidentiality, authentication, integrity, non-repudiation, unforgeability, and forward secrecy of message confidentiality. It provides the attribute of direct public verifi...
Symbolic Proofs of Computational Indistinguishability
Our society extensively relies on communications systems. Because such systems are used to exchange sensitive information and are pervasive, they need to be secured. Cryptographic protocols are what allow us to have secure communications. It is crucial that such protocols do not fail in providing th...
Improving Security Levels of IEEE 802.16e Authentication By Diffie-Hellman Method
In this paper, we proposed an authentication method according to Diffie-Hellman. First, we introduce different methods for authentication in IEEE.802.16 then we proposed an authentication method according to Diffie-Hellman and in the last we compare different methods for authentication to improve se...
Storing Authenticity at the Surface and into the Depths: Securing Paper with Human- and Machine-Readable Devices
This article examines the media technologies that mark paper as authentic. Using the examples of passports and paper banknotes, it considers the security features (e.g. graphic marks, holographs, chips) that do the work of reliably storing, protecting, and communicating authenticity across both spac...
Publishing the Revelation
In Morocco, as elsewhere, the successful publisher is the one who can adapt its production to its audiences. These are characterised by low purchasing power in Rabat and Casablanca, the economic and political capitals of the country where the survey was conducted. For example, the price of the book,...
On Burst Error Correction and Storage Security of Noisy Data
Secure storage of noisy data for authentication purposes usually involves the use of error correcting codes. We propose a new model scenario involving burst errors and present for that several constructions. Comment: to be presented at MTNS 2012
Discriminant analysis using fatty acids profile, stable carbon isotopes and tocopherols content as tool for feeding system prediction in Iberian pigs
Aim of study: The application of three analytical methods (fatty acids: FA, tocopherols: TOC, and isotope ratio: ISO) to distinguish the feeding type received by Iberian pigs during the fattening stage.Area of study: This distinction is very important for the labelling of Iberian high-quality produc...
Cybersecurity of Industrial Systems : Applicative Filtering and Generation of Attack Scenarios
Industrial systems, also called SCADA (for Supervisory Control And Data Acquisition),are targeted by cyberattacks since Stuxnet in 2010. Due to the criticality of theirinteraction with the real world, these systems can be really harmful for humans andenvironment. As industrial systems have historica...
Copy, authenticity, originality
From the white editorial authentication of slave narratives, to the cultural hybridity of the Harlem Renaissance, to the overtly independent publications of the Black Arts Movement, to the commercial power of Oprah's Book Club, African American textuality has been uniquely shaped by the contests for...
Towards trusted and secure communications in a vehicular environment
Routing and key management are the biggest challenges in vehicular networks. Inappropriate routing behaviour may affect the effectiveness of communications and affect the delivery of safety-related applications. On the other hand, key management, especially due to the use of PKI certificate manageme...
Authentication with RIPEMD-160 and Other Alternatives: A Hardware Design Perspective
Authentication with RIPEMD-160 and Other Alternatives: A Hardware Design Perspective
Security in Distributed, Grid, Mobile, and Pervasive Computing
Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing f...
Expertise and authentication of works of art
Authentication of works of art: liability of the expert and qualification of the contract under Swiss law
Exceptions to the future strong authentication obligation