35
35
Aug 23, 2016
08/16
by
Charles Hoskins
audio
eye 35
favorite 0
comment 0
Lesson 12 (part 2 of 4) in the Home Study Course in Fundamentals of Rare Coin Collecting and Investing , published by the Institute of Numismatic and Philatelic Studies (Adelphi University, Garden City, NY). Charles Hoskins is the featured speaker for Lesson 12.
Topics: Numismatics, Authentication
29
29
Aug 23, 2016
08/16
by
Charles Hoskins
audio
eye 29
favorite 0
comment 0
Lesson 12 (part 1 of 4) in the Home Study Course in Fundamentals of Rare Coin Collecting and Investing , published by the Institute of Numismatic and Philatelic Studies (Adelphi University, Garden City, NY). Charles Hoskins is the featured speaker for Lesson 12.
Topics: Numismatics, Authentication
29
29
Aug 23, 2016
08/16
by
Charles Hoskins
audio
eye 29
favorite 0
comment 0
Lesson 12 (part 3 of 4) in the Home Study Course in Fundamentals of Rare Coin Collecting and Investing , published by the Institute of Numismatic and Philatelic Studies (Adelphi University, Garden City, NY). Charles Hoskins is the featured speaker for Lesson 12.
Topics: Numismatics, Authentication
25
25
Aug 23, 2016
08/16
by
Charles Hoskins
audio
eye 25
favorite 0
comment 0
Lesson 12 (part 4 of 4) in the Home Study Course in Fundamentals of Rare Coin Collecting and Investing , published by the Institute of Numismatic and Philatelic Studies (Adelphi University, Garden City, NY). Charles Hoskins is the featured speaker for Lesson 12.
Topics: Numismatics, Authentication
43
43
Aug 19, 2018
08/18
by
Walter Breen
texts
eye 43
favorite 1
comment 0
A group of numismatic authentication letters from Walter Breen, two for 1921 Morgan dollar proofs and one for an 1893-CC proof dollar (on the letterhead of the Institute for Numismatic Authenticators), followed by an 1879-O proof silver dollar and an 1849 proof gold dollar (on the First Coinvestors letterhead).
Topics: Numismatics, Authentication
71
71
Jun 13, 2018
06/18
by
Walter Breen
texts
eye 71
favorite 1
comment 0
Eight letters of authentication (dating 1975-1979) signed by Walter Breen on the Pine Tree Galleries letterhead. Coins authenticated are an 1851 double eagle, 1909-S Indian cent, 1787 NOVA EBORAC copper, 1787 Connecticut cent (M. 4-L), 1781 North American Token, Massachusetts $4 note (May 5, 1780), 1787 Immunis Columbia, and 1786 Vermont copper (BB-5). Courtesy of R. W. Julian.
Topics: Numismatics, Authentication
14
14
Mar 23, 2021
03/21
by
Didih Rizki Chandranegara, Hardianto Wibowo, Agus Eko Minarno
texts
eye 14
favorite 0
comment 0
Account security was determined by how well the security techniques applied by the system were used. There had been many security methods that guaranteed the security of their accounts, one of which was Keystroke Dynamic Authentication. Keystroke Dynamic Authentication was an authentication technique that utilized the typing habits of a person as a security measurement tool for the user account. From several research, the average use in the Keystroke Dynamic Authentication classification is not...
Topics: Authentication, Biometric authentication, Keystroke dynamic authentication, Mean of horner’s...
199
199
Aug 24, 2013
08/13
by
European Telecommunications Standards Institute
texts
eye 199
favorite 0
comment 0
Topics: authentication, confidentiality, security
80
80
Jan 10, 2021
01/21
by
Smith, Richard E., 1952-
texts
eye 80
favorite 0
comment 0
xx, 549 p. : 24 cm
Topics: Computer security, Authentication
7
7.0
Aug 5, 2021
08/21
by
Smith, Richard E., 1952-
texts
eye 7
favorite 0
comment 0
xx, 549 p. : 24 cm
Topics: Computer security, Authentication
The military relies heavily on computer systems. Without a strong method of authentication to access these systems, threats to confi-dentiality, integrity, and availability of government information are likely to be more successful. A recent method of authentication for the Windows 8 and Windows 10 operating systems is picture gesture authentication (PGA), a new approach to entering a password to authenticate a user during system login. Each PGA password is composed of three gestures that are...
Topics: password, authentication, picture gesture authentication, background picture, strength requirements
35
35
Mar 17, 2021
03/21
by
IRJASH Journal
texts
eye 35
favorite 0
comment 0
In today’s communications, the main challenging facet is Security of LTE systems in terms of various areas such as mutual authentication, key management, forward and backward secrecy, use of efficient security tools, etc. For proper key management, the generation and distribution of random keys is of main concern which can be done with the help of dynamic security tools. In this paper, main features of security tools like, Docker, Java Cryptography Architecture (JCA), Token-based...
Topics: Docker, JCA, Key Management, Mutual Authentication, Token-based Authentication
From the bitsavers.org collection, a scanned-in computer-related document. mit :: lcs :: tr :: MIT-LCS-TR-818
Topics: authentication, cookie, adversary, web, user, server, http, authenticator, password, username,...
Englewood Christian Church Sunday Service, July 20, 2014 "Authentication of the Spirit" II Corinthians 3:1-18
Topic: Authentication of the Spirit
Topics: manualsonline, manuals, dupont_authentication
236
236
Aug 24, 2013
08/13
by
European Telecommunications Standards Institute
texts
eye 236
favorite 0
comment 0
Topics: authentication, confidentiality, endorsement, powerline
A combination of encryption and signature is a cryptosystem called traditional signcryption, wherein sender authentication is considered a key task to be verified by third party or judge. Without the knowledge of the sender, the judge can authenticate the message using the receiver decryption parameters and the process is called the signcryption scheme. The paper’s objective is to analyse the security and confidentiality of message and then to integrate authentication, enforceability, forward...
Topics: Signcryption, Identity, Cryptography & Authentication
Topics: manualsonline, manuals, dupont_authentication
Topics: manualsonline, manuals, dupont_authentication
Topics: manualsonline, manuals, dupont_authentication
4
4.0
Apr 28, 2022
04/22
by
Piyush Bhatia
texts
eye 4
favorite 0
comment 0
Authentication is a process of validating a user and providing security to a system. Authentication mechanisms include textual passwords, biometric passwords, site key validation etc. each having some limitations and drawbacks. To overcome these drawbacks, 3D-password came into picture as a new and improved authentication scheme. 3D-password is a multi-factor authentication scheme which includes the previous authentication schemes such as textual passwords, graphical passwords, biometric...
Topics: Authentication, Virtual environment, password
51
51
Feb 21, 2014
02/14
by
Dr. Andrew Lindell
movies
eye 51
favorite 0
comment 0
Before studying the technical aspects of anonymous Internet connections and anonymous authentication, we begin with a discussion of privacy and why it is important. Although the necessity of privacy is well accepted in the computer security community, the concrete reasons as to why are often not understood. We will demonstrate that such an understanding is crucial for providing technical solutions that solve the real problems at hand. Given this background, we briefly survey the known...
Topics: anonymous authentication, security, chatrooms
The move toward e-government has seen many institutions put special focus on the need for security, especially that of authentication. Single-factor password-based systems have been proven inadequate in safeguarding online financial and e-government service transactions. Industry adoption of Two-Factor Authentication (2FA) has also been piecemeal. To mitigate these deficiencies, the Singapore Government, in 2008, put forth a Call-for-Collaboration (CFC) seeking industry and academic...
Topics: Authentication, Computer science, Technology
Now a days the image authentication through watermarking is going in many different techniques. One of the newest method is filtered watermarking. The filtered watermarking is a secured watermarking technique. Depending upon the type of filter used during the watermarking process, the overall watermarked images results will be changed. Actually the target information is present in the edges of the watermark image in filtered watermarking process. The watermark image is hidden into another cover...
Topics: watermarking, Watermarking Embedding, authentication.
The aim of this project is to provide online facility of bus pass and tickets system to the daily commuters of Nagpur city. It uses database to store data about passenger, bus, ticket and bus pass. This project has two logins, one for user and another for admin. In this project ticket reservation and bus pass creation as well as renewal system has been provided. It is a web application for people who want to book ticket and get bus pass online. It is very useful as it reduces pressure of manual...
Topics: passenger, notification, authentication, registration
In this paper we implemented a graphical authentication system which overcomes all drawbacks of existing authentication system. In this system we combine the features of D´ej`a Vu, Cued Click Points, Secret Draw technique and Text Passwords. In this system we used database of 20 images. In the password creation process, we provide 4 images randomly amongst database of 20 images. On first 3 images user can select click points and add single digit/text on that images. On the fourth image user...
Topics: Authentication, Graphical Passwords, Security
Use of mobile phone is quite common in the modern day environment .With the increase in the facilities for the users of different sectors, data theft has also increased. To prevent the authentication process from the data theft, one time password system is applied to various sector of the industry like if you are logging in into an account, you need a OTPK password to get verified that you are the authenticated user. In such a case the user must be registered to the network to get the OTPK...
Topics: OTPK, Mobile Users, Authentication
197
197
Nov 8, 2004
11/04
by
http://www.aaanalyzer.addr.com
software
eye 197
favorite 0
comment 0
This is a security program to implement activity analysis, to counteract such an analysis and to change the system settings and policies. You can also use it to restrict access to the sensitive data and available services as well as to change the settings of Microsoft Internet Explorer, Netmeeting, MSN Instant Messenger and Outlook Express. It includes 402 system policies, 115 Windows authentication and configuration items and 190 histories entries.
Topics: Activity and Authentication Analyzer, Internet, Monitoring, System, AUTHENTICATION, ANALYZER,...
Topics: manualsonline, manuals, dupont_authentication
Authentication is a fundamental aspect of information security in enabling the authenticity of the source of information to be determined. Among several electronic authentication mechanisms available today, deploying the right authentication mechanism will protect information against its envisaged threat(s) in the designated operating environment. This study attempts to create a taxonomy (classification) for current operational authentication protocols, and show how the taxonomy could help to...
Topics: Computer networks, Security measures, Authentication
A comparative analysis of attacks carried out in cloud technologies, the main methods and methods of information protection, the possibilities of using hardware and software, and methods to combat threats when eliminating them, ensuring data protection were carried out Mamarajabov Odil Elmurzayevich 2020. Cloud technology to ensure the protection of fundamental methods and use of information. International Journal on Integrated Education. 3, 10 (Oct. 2020), 313-315....
Topics: Cloud, cloud technology, computing, authentication
There are currently no access control methods to permit personnel, such as military members, government agencies, or first-responders, access to restricted resources and applications that are only available when certain conditions are satisfied. Such conditions include user authentication, authorized geographic locations, and connections to specific base transceiver stations or base station controllers. This work defines mobile security enclaves, which are designed to provide this access...
Topics: Computer science, Communication, Authentication, Exclaves
In the context of on-line assessment in Electronic-learning, a problem arises when a student taking an exam may wish to cheat by handing over personal credentials to someone to take their place in an exam; another problem is that there is no method for signing digital content as it is being produced in a computerized environment. Our proposed solution is to digitally sign the participant’s work by embedding voice samples in the transcript paper at regular intervals. In this investigation, we...
Topics: Transparency, Authentication, E-learning, Steganography
UIDAI Authentication Portal User Manual
Topics: Aadhaar, Authentication, Portal, User Manual
In modern days, gadgets are essential part of everyday lives and they enable to access a variety of ubiquitous services. Recently, the availability of these ubiquitous and mobile services has increased due to the different form of access provided by mobile devices, such as Bluetooth and Wi-Fi. In the same trend, the typologies of vulnerabilities exploiting these services and communication channels have boosted as well. Therefore, the presence of malware in mobile platform can seriously impact...
Topics: Authentication, Brightness, Security, Smart Phone.
The widespread usage of social networking in personal and professional fields has increased the concern of security and integrity of information. This paper provides a solution on pre-network level through authenticated encryption and hence increasing the confidence in posting and sharing data on internet or cloud. Graphical user interfaces on the end users’ level for authenticating and encrypting data serve as a powerful tool in adressing data security attacks.
Topics: Encryption, Authentication, User Interface, Security
10
10.0
Jan 13, 2021
01/21
by
Karina Harper (harperk)
data
eye 10
favorite 0
comment 0
This is a case for a U2F Zero Two Factor Authentication Key USB stick I made for our IT guys. There is a top and bottom that slide together and are snug when printed on my printrbots. The button is accessible and the USB is able to be plugged in.
Topics: u2f_zero, thingiverse, usb_case, u2fzero, usb_stick, stl, usbcase, USB_Holder, Computer,...
26
26
Mar 31, 2021
03/21
by
Alaa Wagih Abdul Qader, Israa Ezzat Salem, Haider Rasheed Abdulshaheed
texts
eye 26
favorite 0
comment 0
IT systems and data that you store, and process are valuable resources that need protection. Validation and reliability of information are essential in networks and computer systems. The communicating is done by two parties via an unsafe channel require a way to validate the data spent by one party as valid (or unaltered) by the other party. In our study, we suggest new one-way defragmentation algorithm to implement message authentication and integration in program execution. These software...
Topics: Authentication integrity, Hash functions, Validation
Current naval networks vary in size and implementation, but have one thing in common: poor network device connectivity oversight. Poor network oversight can lead to unauthorized network access, but there is a potential solution with software-defined networking (SDN). SDN technology provides the management oversight and capability to maintain a complete network picture of all connected devices. SDN is the network technology that separates the control plane from the forwarding plane of the...
Topics: SDN, VLAN, 802.1x authentication, RADIUS
Passive RFID tags are attractive for their low cost, small footprint, and ability to function without batteries. The lack of onboard power, however, limits the complexity of operations that can be performed by the tags' integrated circuits, and this limitation prevents the tags from being able to perform typical functions required to support e-authentication. This thesis quantifies the delta between the power that would be required to perform MAC-based authentication, and the power made...
Topics: Radio frequency identification systems, Authentication
5
5.0
Apr 30, 2022
04/22
by
Prof. Mrinal Khadse, Vidya Dandinashivara, Shruti Nair, Nikita Paspunatu
texts
eye 5
favorite 0
comment 0
Humongous amount of data and information are generated by users everyday which are private, thus needed to be secured and protected. We are using the concept of honeywords to increase the security of the system. Honeywords are basically dummy passwords created by the system which is stored along with the actual user password. When an adversary steals the password file and tries one of the honeywords, the user is immediately informed about this activity.
Topics: Passwords, Authentication, Honeywords, Security, login
From the bitsavers.org collection, a scanned-in computer-related document. mit :: lcs :: tr :: MIT-LCS-TR-691
Topics: server, authentication, servers, security, access, domain, mesh, model, request, cascaded, access...
From the bitsavers.org collection, a scanned-in computer-related document. xerox :: parc :: techReports :: CSL-78-4 Using Encryption for Authentication in Large Networks of Computers
Topics: authentication, encryption, protocol, protocols, servers, message, encrypted, networks, server,...
18
18
movies
eye 18
favorite 0
comment 0
Authentication, authorization and public key infrastructure are complicated and hard to get right, yet crucial for every infrastructure. Manifold user databases in each application as well as ad-hoc self-signed TLS/SSL certificates don't scale and are hard to administrate. Users don't want to remember a password for each service, admins prefer a centralized PKI, and developers struggle with correct handling of password. FreeIPA is an Open Source, Python-based identity management solution. It is...
Topics: Authentication, Infrastructure, Web Track, EuroPython2017, Python
Secure and reliable authentication is one important part in the scope of IT security, but the practical experience shows that adequate authentication mechanisms are often inconvenient for the populace. Password-based mechanisms dominate as they are easy to use and do not need additional hardware. However, lots of users do not realize the threads with respect to password-based mechanisms: many users use passwords for remote authentication over unsecured channels or in not trustworthy...
Topics: authentication, single sign-on, crypto token
94
94
Jul 12, 2014
07/14
by
R. G. Sakthivelan & Ashiba Sundaram
texts
eye 94
favorite 0
comment 0
In Database outsourcing paradigm, the authentication of the query results at the client remains a challenging problem. Existing system focuses on the Outsourced Spatial Database (OSDB) model and propose an efficient scheme, called VN-Auth, which allows a client to verify the correctness and completeness of the result set. This approach is based on neighborhood information derived from the Voronoi diagram of the underlying spatial data set and can handle fundamental spatial query types, such as...
Topics: Query Authentication, Spatial Queries, Outsourced Databases
159
159
Feb 21, 2014
02/14
by
Dr. Neal Krawetz
movies
eye 159
favorite 0
comment 0
Digital cameras and video software have made it easier than ever to create high quality pictures and movies. Services such as MySpace, Google Video, and Flickr make it trivial to distribute pictures, and many are picked up by the mass media. However, there is a problem: how can you tell if a video or picture is real? Is it computer generated or modified? In a world where pictures are more influencial than words, being able to distinguish fact from fiction in a systematic way is essential. This...
Topics: images, JPEG, digital authentication, wavelet transformations
This paper introduces the idea of hierarchical visual cryptography. Authentication is the important issue over the internet. This paper describes a secured authentication mechanism with the help of visual cryptography. Visual cryptography simply divides secret information in to number of parts called shares. These shares are further transmitted over the network and at the receiving end secrets are revealed by superimposition. Many layers of visual cryptography exist in proposed system hence...
Topics: Visual cryptography, secret sharing, shares, authentication.
135
135
Sep 19, 2014
09/14
by
DESHANT1 & RAHUL JOHARI²
texts
eye 135
favorite 0
comment 0
In today’s world of technology, security for systems/restricted places has become a challenging task. Authentication plays a major role for any security system where access can be given to only authorized persons. Authentication is the process of giving someone the identity so that he or she can access that particular application or data. It is like confirming something what it claims to be something like we are showing our ID proof to get access in the particular area restricted to...
Topics: Authentication, Matrix, Biometric, MATLAB, Security System
Software piracy by users is generally believed to harm both software firms through lower profits and buying customers through higher prices . Thus, it is thought that perfect and cost less technological protection would benefit both firms and consumers. The model developed here suggests that in some circumstances, even with significant piracy, not protecting can be the best policy, both raising firm profits and lowering selling prices. Key to the analysis is joining the presence of a positive...
Topics: Computer Security, Copyright, Cryptography, Encryption, Authentication