Search Results

Results (27)

Search Parameters:

Keyword: Authentication
Order results
Results per page
Open AccessArticle
8 Pages, 1,346 KB Download PDF

Indoor Positioning: Comparing Different Techniques and Dealing with a user Authentication use Case

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 3, Page # 40–47, 2023; DOI: 10.25046/aj080305
Abstract:

Indoor positioning is a complex issue with many, heterogeneous application cases, each one presenting different requirements and environments. In such a complex ecosystem, an agile taxonomy is needed to be able to select a proper solution for a given scenario, as well as practical recommendations for the most used solutions. Besides providing these tools, we…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 953 KB Download PDF

A Novel Blockchain-Based Authentication and Access Control Model for Smart Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 651–657, 2021; DOI: 10.25046/aj060171
Abstract:

With the increase of smart factories and smart cities following the recent 4th industrial revolution, internal user authentication and authorization have become an important issue. The user authentication model using the server-client structure has a problem of forgery of the access history caused by the log manipulation of the administrator and unclearness of the responsibility.…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 570 KB Download PDF

Dense Deep Neural Network Architecture for Keystroke Dynamics Authentication in Mobile Phone

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 307–314, 2020; DOI: 10.25046/aj050637
Abstract:

The ever-growing technology in mobile smartphones has enabled users to store sensitive and private information; as a result, it required the need for an improved security system. Previous approaches heavily relied on shallow machine learning algorithms that require feature extraction which is time consuming, laborious and can cause, resulting in poor authentication. In this paper,…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 1,341 KB Download PDF

Verification of the Usefulness of Personal Authentication with Aerial Input Numerals Using Leap Motion

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 369–374, 2019; DOI: 10.25046/aj040548
Abstract:

With the progress of IoT, everything is going to be connected to the network. It will bring us a lot of benefits however some security risks will be occurred by connecting network. To avoid such problems, it is indispensable to strengthen security more than now. We focus on personal authentication as one of the security.…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
12 Pages, 700 KB Download PDF

Application Layer Security Authentication Protocols for the Internet of Things: A Survey

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 317–328, 2019; DOI: 10.25046/aj040131
Abstract:

Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
9 Pages, 1,013 KB Download PDF

Web Authentication: no Password; Listen and Touch

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 84–92, 2019; DOI: 10.25046/aj040109
Abstract:

Just as electricity has an essential role in our lives, the internet network and especially web services have become of vital importance nowadays. Without security service layers, apparently small things like checking a child’s school schedule on web may turn the daily routine into a nightmare. Web services users are still required to use many…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 664 KB Download PDF

Towards Adoption of Authentication and Authorization in Identity Management and Single Sign On

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 492–500, 2018; DOI: 10.25046/aj030556
Abstract:

Identity and Access Management (IAM) and Single Sign on (SSO) are two security concepts that are related to each other. IAM governs the user access in an organization whereas SSO facilitates the user by authenticating to one centralized application and not having to re-authenticate when trying to access other applications. This paper addresses the different…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 663 KB Download PDF

A Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 225–235, 2017; DOI: 10.25046/aj020627
Abstract:

Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 757 KB Download PDF

An Efficient Authentication Method For Smart Card Verification In Online

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 133–138, 2017; DOI: 10.25046/aj020418
Abstract:

The great cards are getting a charge out of a critical part inside the on-line managing wherever we have tendency to can’t check the cardholder up close and personal. The phishing sites may parody the data in the middle of the customer website and along these lines the common webpage. To protect the data and…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
5 Pages, 368 KB Download PDF

An Encryption Key for Secure Authentication: The Dynamic Solution

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 540–544, 2017; DOI: 10.25046/aj020369
Abstract:

In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 872 KB Download PDF

Cross layers security approach via an implementation of data privacy and by authentication mechanism for mobile WSNs

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 97–107, 2017; DOI: 10.25046/aj020112
Abstract:

To implement a new secure network with high mobility and low energy consumption, we use smart sensors. These sensors are powered by micro batteries generally non rechargeable. So, to extend their lifetime, it is necessary to implement new energy conservation techniques. Existing works separate the two features (security, energy conservation) and are interested specifically in…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Network Engineering (ENW))
Open AccessArticle
6 Pages, 734 KB Download PDF

Strong Authentication Protocol based on Java Crypto Chip as a Secure Element

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 5, Page # 21–26, 2016; DOI: 10.25046/aj010505
Abstract:

Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…

Read More
(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
22 Pages, 15,097 KB Download PDF

TIMeFoRCE: An Identity and Access Management Framework for IoT Devices in A Zero Trust Architecture

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 1–22, 2025; DOI: 10.25046/aj100601
Abstract:

Zero Trust Architecture offers a transformative approach to network security by emphasizing ”never trust, always verify.” IoT devices, while increasingly integral to modern ecosystems, pose unique challenges for identity management and access control due to their constrained processing power, memory, and energy capabilities. In a Zero Trust framework, every IoT device is treated as a…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Telecommunications (TEL))
Open AccessArticle
9 Pages, 878 KB Download PDF

Performance Evaluation of Convolutional Neural Networks (CNNs) And VGG on Real Time Face Recognition System

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 956–964, 2021; DOI: 10.25046/aj0602109
Abstract:

Face Recognition (FR) is considered as a heavily studied topic in computer vision field. The capability to automatically identify and authenticate human’s faces using real-time images is an important aspect in surveillance, security, and other related domains. There are separate applications that help in identifying individuals at specific locations which help in detecting intruders. The…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 886 KB Download PDF

Time Granularity-based Privacy Protection for Cloud Metering Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1278–1285, 2020; DOI: 10.25046/aj0506152
Abstract:

Due to the advent of cloud computing and Internet of Things, smart meters have become a crucial part of smart cities. Smart meters generate vast amounts of fine-grained data that can immediately provide useful information to electricity consumers, such as automatic billing, load monitoring, and dynamic time pricing. This will make the electricity consumers more…

Read More
(This article belongs to Section Network Engineering (ENW))
Open AccessArticle
10 Pages, 906 KB Download PDF

Hand-Based Biometric Recognition Technique – Survey

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 689–698, 2020; DOI: 10.25046/aj050683
Abstract:

In today’s modern world, reliable automatic personal recognition is a crucial area of discussion, primarily because of the increased security risks. A large number of systems first require the recognition of a person before they can access their services. Biometric recognition can be used, which can be understood as automatic identification or automatic verification of…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
17 Pages, 1,074 KB Download PDF

Detailed Security Evaluation of ARANz, ARAN and AODV Protocols

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 176–192, 2020; DOI: 10.25046/aj050523
Abstract:

Ad-Hoc networks are self-organized wireless networks. Finding a secure and efficient route leading from a specific source node to an intended destination node is one of the serious concerns in mobile Ad-Hoc networks. ARANz is one of the significant protocols that has been proposed for such networks. ARANz implements the authentication methods used with the…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
14 Pages, 2,291 KB Download PDF

Composition of Methods to Ensure Iris Liveness and Authenticity

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 130–143, 2020; DOI: 10.25046/aj050417
Abstract:

In a biometric system technology, a person is authenticated based on processing the unique features of the human biometric signs. One of the well known biometric systems is iris recognition, this technique being considered as one of the most secure authentication solutions in the biometric field. However, several attacks do exist that are able to…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Bioinformatics (BIF))
Open AccessArticle
11 Pages, 959 KB Download PDF

Securing Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 567–577, 2020; DOI: 10.25046/aj050271
Abstract:

In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 946 KB Download PDF

Biometric System Vulnerabilities: A Typology of Metadata

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 191–200, 2020; DOI: 10.25046/aj050125
Abstract:

This study presents a root cause analysis of biometric vulnerabilities and provides a comprehensive typology of metadata in biometric adaptation. Although they are more reliable and secure than traditional authentication methods, biometric techniques are subject to vulnerabilities that pose challenges. Faced with the proliferation of cases of identity theft and fraud, biometrics is increasingly used…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 1,529 KB Download PDF

Spiral Curve for Revocable Touchless Fingerprint Template Securisation

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 134–139, 2019; DOI: 10.25046/aj040616
Abstract:

Fingerprint data is really protected by cancelable fingerprint template because it can be revoked when compromise and a new one can be reissued. We develop a touchless cancelable fingerprint template whose algorithm was published in our previous work. We implement here the algorithm and conducted several tests on several databases to confirm the stability of…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 264 KB Download PDF

Using Privacy Enhancing and Fine-Grained Access Controlled eKYC to implement Privacy Aware eSign

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 347–358, 2019; DOI: 10.25046/aj040443
Abstract:

eSign is an online electronic signature service which is recently gaining more prominence in India. eSign is based on two online services from UIDAI, viz. a viz., Aadhaar based authentication and retrieval of resident’s eKYC information after taking his/her consent. With increased adoption of Aadhaar based services, privacy of user data has become more and…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 1,042 KB Download PDF

Detection the Places of the Heat Energy Leak on the Underground Thermal Pipelines Using the Computer System

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 01–09, 2019; DOI: 10.25046/aj040301
Abstract:

The purpose of this paper is to improve the thermographic method for detection the places of heat energy losses on the urban underground thermal pipelines using the computer system. This goal was achieved by building a heat map of the surveyed heating main with data layering directly on a computer map of the area, which…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 838 KB Download PDF

An Integrated & Secure System for Wearable Devices

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 432–437, 2018; DOI: 10.25046/aj030651
Abstract:

Health services are under increasing pressure to reduce large waiting times for appointments. The delayed diagnosis of a human illnesses could have profound consequences for the patient. The large waiting times may be attributed to lack of data, the accuracy of the data or the timeliness of the availability of the data. In addition to…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 484 KB Download PDF

A Secure Communication Framework for ECUs

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1307–1313, 2017; DOI: 10.25046/aj0203165
Abstract:

Electronic Control Units (ECUs) generate diagnostic and telemetric data that is communicated over the internal vehicular network. ECUs are resource constraint devices and have limited resources to devote for data security. In recent times, threats against vehicular networks have emerged that require attention of the research community. In this paper, we demonstrate data security threats…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026