Radar-Based Non-Contact Continuous Identity Authentication
نویسندگان
چکیده
منابع مشابه
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous computing paradigms which are highly dynamic and mobile in nature, entity authentication may not be sufficient or even appropriate, especially if a principal’s privacy is to be protected. In order to preserve privacy, o...
متن کاملAn Identity-based Non-interactive Authentication Framework for Computational Grids
We examine the authentication framework for Globus Security Infrastructure (GSI, the current grid security standard) and identify a weakness of poor scalability due to heavy interactions between a user-side client and many resource contribution sites. We propose an alternative authentication framework for GSI using authenticated session keys which are shared between two parties without any inte...
متن کاملContinuous Identity Authentication Using Multi-modal Physiological Sensors
The research proposed is for the construction and evaluation of an automated biometric system using a set of different unobtrusive physiological sensors (i.e., eye tracking & biosensors) that continuously authenticate the identity of the user. The system is designed to provide an added layer of security beyond point-of-entry identification methods and can be used in high and moderate security a...
متن کاملIdentity Based Message Authentication for Dynamic Networks
This paper presents a message authentication scheme built on top of an original construct that combines a simple form of identity based cryptography with an iterated version of RSA. Our scheme blends the features of identity based cryptography and stream authentication while at the same time offering security comparable to that of the basic RSA cryptosystem. As opposed to other authentication s...
متن کاملIdentity Authentication Based on Two-Beam Interference
A two-factor identity authentication method on the basis of two-beam interference was presented. While verifying a user’s identity, a specific “phase key” as well as a corresponding “phase lock” are both mandatory required for a successful authentication. Note that this scheme can not only check the legality of the users, but also verify their identity levels so as to grant them hierarchical ac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Remote Sensing
سال: 2020
ISSN: 2072-4292
DOI: 10.3390/rs12142279