- Browse by Subject
Browsing by Subject "Authentication"
Now showing 1 - 6 of 6
Results Per Page
Sort Options
Item Design and evaluation of a secure, privacy-preserving and cancelable biometric authentication : Bio-Capsule(2014-09-04) Sui, Yan; Zou, Xukai, 1963-; Bertino, Elisa; Li, Ninghui; Du, Yingzi, 1975-; Li, Feng; Prabhakar, Sunil; Gorman, William J.A large portion of system breaches are caused by authentication failure either during the system login process or even in the post-authentication session, which is further related to the limitations associated with existing authentication approaches. Current authentication methods, whether proxy based or biometrics based, are hardly user-centric; and they either put burdens on users or endanger users' (biometric) security and privacy. In this research, we propose a biometrics based user-centric authentication approach. The main idea is to introduce a reference subject (RS) (for each system), securely fuse the user's biometrics with the RS, generate a BioCapsule (BC) (from the fused biometrics), and employ BCs for authentication. Such an approach is user-friendly, identity-bearing yet privacy-preserving, resilient, and revocable once a BC is compromised. It also supports "one-click sign on" across multiple systems by fusing the user's biometrics with a distinct RS on each system. Moreover, active and non-intrusive authentication can be automatically performed during the user's post-authentication on-line session. In this research, we also formally prove that the proposed secure fusion based BC approach is secure against various attacks and compare the new approach with existing biometrics based approaches. Extensive experiments show that the performance (i.e., authentication accuracy) of the new BC approach is comparable to existing typical biometric authentication approaches, and the new BC approach also possesses other desirable features such as diversity and revocability.Item How to Get Your Social Media, Email and Text Evidence Admitted (and Keep Theirs Out)(2016-10) Hook, Sara AnneWith all of the changes surrounding social media and email, it's critical to get up to speed on the latest rules, procedures and case law. This full-day, cutting-edge course will walk you through state processes, procedures and the latest case law while equipping you with handy how-to's, sample screen shots, real world examples and shortcuts along the way. Expert attorney faculty, who know the ins and outs of these groundbreaking new forms of evidence, will provide practical tech advice that you can actually understand and start using right away. From email to Facebook, Twitter and Snapchat, to YouTube, Pinterest and video surveillance, this comprehensive ESI guide will give you invaluable insight into proven ways for identifying, preserving, producing, admitting and blocking ESI.Item RCID: Fingerprinting Passive RFID Tags via Wideband Backscatter(IEEE, 2022) Li, Jiawei; Li, Ang; Han, Dianqi; Zhang, Yan; Li, Tao; Zang, Yanchao; Computer and Information Science, Purdue School of ScienceTag cloning and spoofing pose great challenges to RFID applications. This paper presents the design and evaluation of RCID, a novel system to fingerprint RFID tags based on the unique reflection coefficient of each tag circuit. Based on a novel OFDM-based fingerprint collector, our system can quickly acquire and verify each tag’s RCID fingerprint which are independent of the RFID reader and measurement environment. Our system applies to COTS RFID tags and readers after a firmware update at the reader. Extensive prototyped experiments on 600 tags confirm that RCID is highly secure with the authentication accuracy up to 97.15% and the median authentication error rate equal to 1.49%. RCID is also highly usable because it only takes about 8 s to enroll a tag and 2 ms to verify an RCID fingerprint with a fully connected multi-class neural network. Finally, empirical studies demonstrate that the entropy of an RCID fingerprint is about 202 bits over a bandwidth of 20 MHz in contrast to the best prior result of 17 bits, thus offering strong theoretical resilience to RFID cloning and spoofing.Item Simulation of Authentication in Information-Processing Electronic Devices Based on Poisson Pulse Sequence Generators(MDPI, 2022) Maksymovych, Volodymyr; Nyemkova, Elena; Justice, Connie; Shabatura, Mariia; Harasymchuk, Oleh; Lakh, Yuriy; Rusynko, Morika; Electrical and Computer Engineering, Purdue School of Engineering and TechnologyPoisson pulse sequence generators are quite well studied, have good statistical properties, are implemented both in software and hardware, but have not yet been used for the purpose of authentication. The work was devoted to modeling authenticators of information-processing electronic devices by creating a bit template simulator based on a Poisson pulse sequence generator (PPSG). The generated templates imitated an important property of real bit templates, which reflected the physical uniqueness of electronic devices, namely Hamming distances between arbitrary template pairs for the same device were much smaller than the distance between arbitrary template pairs for two different devices. The limits of the control code values were determined by setting the range of the average frequency values of the output pulse sequence with the Poisson distribution law. The specified parameters of the output pulse sequence were obtained due to the optimization of the parameters of the PPSG structural elements. A combination of pseudo-random sequences with the control code’s different values formed the bit template. The comparison of the Hamming distance between the standard and real-time templates with a given threshold value was used as a validation mechanism. The simulation experiment results confirmed the unambiguous authentication of devices. The simulation results also showed similarities with the real data obtained for the bit templates of personal computers’ own noise. The proposed model could be used for improving the cybersecurity of a corporate network as an additional factor in the authentication of information-processing electronic devices for which the measurement of noise with the required accuracy is not possible or significantly difficult.Item Social Media, The Internet and Electronically Stored Information (ESI) Challenges(2015) Hook, Sara Anne; Faklaris, CoriProgram Description Do you seek out litigation challenges? Do you have the confidence to own the courtroom and take down your opponent? Avoid complacency and take your practice to the next level with this comprehensive legal guide. You'll learn advanced tools to overcome the most difficult obstacles in civil litigation. Our experienced faculty will share the techniques they've developed over years in civil practice. Whether you're authenticating ESI, explaining complex damages, or prepping for an expert witness examination, you'll come back to the lessons learned in this seminar again and again. I.New Federal Rules of Civil Procedure II.Top Trial Mistakes: A Civil Court Judge's Perspective III.Resolving Discovery Disputes IV.Strategically Using Motions in Limine V.Social Media, the Internet and Electronically Stored Information (ESI) Challenges VI.Settle Your Case Before Trial: Advanced Techniques VII.Identifying and Overcoming Juror Bias VIII.Introducing Complex Case Themes During Opening Statements IX.Presenting Technical Expert Testimony to the Jury X.Using Evidence to Support Your Proposed Damages XI.Addressing Weaknesses in Your Case in Closing Statements XII.EthicsItem V. Real-World Examples, Handy How-to’s and Sample Screen Shots(2017) Hook, Sara AnneWith all of the changes surrounding social media and email, it's critical to get up to speed on the latest rules, procedures and case law. This full-day, cutting-edge course will walk you through state processes, procedures and the latest case law while equipping you with handy how-to's, sample screen shots, real world examples and shortcuts along the way. Expert attorney faculty, who know the ins and outs of these groundbreaking new forms of evidence, will provide practical tech advice that you can actually understand and start using right away. From email to Facebook, Twitter and Snapchat, to YouTube, Pinterest and video surveillance, this comprehensive ESI guide will give you invaluable insight into proven ways for identifying, preserving, producing, admitting and blocking ESI.