Searched for: subject%3A%22Authentication%22
(1 - 20 of 71)

Pages

document
van Duijne, Bas (author)
Architectural graduation project containing a research and design for the Notre Dame of Paris. The research focusses on reinterpreting the Notre Dame of Paris based on seven interviews. The interviews are bundled in a set of narrative drawings that approach the building and its environment as intangible domain containing rather the social...
student report 2023
document
Kumar, Anand (author), Singh, Karan (author), Shariq, Mohd (author), Lal, C. (author), Conti, M. (author), Amin, Ruhul (author), Chaudhry, Shehzad Ashraf (author)
In the era of the Internet of Communication Technologies (ICT), the Internet is becoming more popular and widely used across the world. Radio Frequency IDentification (RFID) has become a prominent technology in healthcare systems for identifying tagged objects. The RFID tags are attached to the billions of different healthcare devices or...
journal article 2023
document
Lotto, Alessandro (author), Singh, Vaibhav (author), Ramasubramanian, Bhaskar (author), Brighente, Alessandro (author), Conti, M. (author), Poovendran, Radha (author)
Fifth-generation (5G) cellular communication networks are being deployed on applications beyond mobile devices, including vehicular networks and industry automation. Despite their increasing popularity, 5G networks, as defined by the Third Generation Partnership Project (3GPP), have been shown to be vulnerable against fake base station (FBS)...
conference paper 2023
document
Li, Wenting (author), Wang, Ping (author), Liang, K. (author)
Password-only authentication is one of the most popular secure mechanisms for real-world online applications. But it easily suffers from a practical threat - password leakage, incurred by external and internal attackers. The external attacker may compromise the password file stored on the authentication server, and the insider may...
journal article 2023
document
Cardaioli, Matteo (author), Conti, M. (author), Orazi, Gabriele (author), Tricomi, Pier Paolo (author), Tsudik, Gene (author)
Authentication and de-authentication phases should occur at the beginning and end of secure user sessions, respectively. A secure session requires the user to pass the former, but the latter is often underestimated or ignored. Unattended or dangling sessions expose users to well-known Lunchtime Attacks. To mitigate this threat, researchers...
journal article 2023
document
Mankutė, Aistė (author)
The project “Activating the glass box” aims to find out how the existing built heritage can be not an obstacle, but the key to the comprehensive dense city of the near future. It showcases the contextual design approach and opportunities for the unlisted 50’s-60’s international style office buildings - “glass boxes”- whose potential is not yet...
master thesis 2022
document
Aanhane, Sam (author), Molenkamp, Simon (author), Vrijdag, Joos (author)
This bachelor end project thesis is describing ways to use dry-electrode electroencephalography (EEG) measurements for authentication. There are five proposed methods based on the literature study, which in this report are called: ’frequency tagging’, ’pseudowords’, ’familiar music’, ’mental tasks’, and ’emotions’. First, all methods were tested...
bachelor thesis 2022
document
Song, Lulu (author)
The project Open House, ‘gleans’ a derelict and underutilised part of the riverfront in Maastricht and gives it over to the everyday people of the city in the form of a public building - an Arts Centre for Maastricht. The ambition for the project is to create an architecture that will mesh seamlessly with the public realm, breaking down the...
master thesis 2022
document
Prinsze, Daan (author)
During this research we have replaced Bracha’s layer in the state-of-the-art Bracha-Dolev protocol to improve the performance by decreasing the message complexity of the protocol running on top of a given network topology so long as the requirements stated by Bracha and Dolev are met. Bracha-Dolev is an algorithm that is used to establish a...
bachelor thesis 2022
document
PSARRI, OLGA (author)
The present essay examines the influence of authenticity’s notion on <br/>Industrial Heritage Reuse practices in Europe from the 1970’s onwards. This <br/>consideration formed the motive of the carried-out analysis. Initially, <br/>authenticity’s theoretical framework is being interpreted through its latent <br/>relation to intangible heritage....
student report 2022
document
Abrahams, Joël (author)
Quantum networks allow multiple devices to exchange information encoded within quantum systems.<br/>Such quantum networks use classical control messages to coordinate entanglement between nodes.<br/>Third parties which can forge such control messages may interfere with the workings of quantum links, however:<br/>They may either perform...
master thesis 2022
document
Narang, Sushant (author)
Recently, data breaches have been increasing in many organisations, causing a spotlight to be put on the security practices such as 2 Factor Authentication(2FA) technology and the methods used to protect cyberspace. This has resulted in an opportunity for passwordless authentication technologies. Biloq is an early stage venture which aims to...
master thesis 2022
document
Tissen, L.N.M. (author)
3D printing’s rapid technological development is starting to impact the art field because, for the first time, it has become possible to exactly reproduce and reconstruct artworks without any loss of their physical features. Yet, a coherent overview of how 3D printing is used within the art field while paying attention to ethical considerations...
book chapter 2022
document
Cardaioli, Matteo (author), Conti, M. (author), Tricomi, Pier Paolo (author), Tsudik, Gene (author)
Ideally, secure user sessions should start and end with authentication and de-Authentication phases, respectively. While the user must pass the former to start a secure session, the latter's importance is often ignored or underestimated. Dangling or unattended sessions expose users to well-known Lunchtime Attacks. To mitigate this threat, the...
conference paper 2022
document
Zhang, M. (author), Warth, T. (author), Boon, N.J.H. (author), Demirörs, Ahmet Faik (author), Eral, H.B. (author)
A microfluidic platform for continuous synthesis of hydrogel microparticles with superparamagnetic colloids (SPCs) embedded at prescribed positions is described. The shape of the cross-linked microparticle is independently controlled by stop–flow lithography, whereas the position of trapped SPCs are dictated by virtual magnetic moulds made of...
journal article 2022
document
Ahvanooey, Milad Taleby (author), Zhu, Mark Xuefang (author), Li, Qianmu (author), Mazurczyk, Wojciech (author), Choo, Kim Kwang Raymond (author), Gupta, Brij B. (author), Conti, M. (author)
User authentication remains a challenging issue, despite the existence of a large number of proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web-based, and hardware-based schemes. For example, some of these schemes are not suitable for deployment in an Internet of Things (IoT) setting, partly due to the...
journal article 2022
document
El-Zawawy, Mohamed A. (author), Brighente, Alessandro (author), Conti, M. (author)
Internet of Drones (IoD) is a framework to set up drones networks that may serve multiple purposes, e.g., data collection. New IoD applications (such as drone assisted internet of vehicles) envision the simultaneous collection of multiple data types. Although authentication may prevent unauthorized users to access the collected data, existing...
journal article 2022
document
Shariq, Mohd (author), Singh, Karan (author), Lal, C. (author), Conti, M. (author), Khan, Tayyab (author)
Internet of Things (IoT) technologies rapidly evolve and are used in many real-life applications. One of the core technologies used in various IoT applications is Radio Frequency IDentification (RFID) technology. RFID wirelessly and uniquely identifies the tagged objects without a direct line of sight. However, the research community had...
journal article 2022
document
Dai, T. (author), Li, Ji (author), Aktürk, Gül (author), Jiao, Jian (author)
The designation of cultural heritage, especially the World Cultural Heritage Site, is extensively discussed regarding its impacts on tourism destination branding. However, the impact of the designation(s) of World and/or National Cultural Heritage Site on affective city image and behavioural intention is still under-researched. This study aims...
journal article 2022
document
Lee, Yoonjeong (author), Kothuis, B.L.M. (author)
This chapter evaluated the educational effects of an international integrative research education program by analyzing the survey of participating students of the NSF PIRE CFRR Program. The survey was conducted from 2016 to 2019, before and after the 2-week research field trip in the Netherlands. The results show that a problem- and place...
book chapter 2022
Searched for: subject%3A%22Authentication%22
(1 - 20 of 71)

Pages