Open Access. Powered by Scholars. Published by Universities.®
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Entire DC Network
The Hybridization Of Automatic Identification Techniques In Mass Market Applications: Towards A Model Of Coexistence, Katina Michael, M. G. Michael, Holly Tootell, V. Baker
The Hybridization Of Automatic Identification Techniques In Mass Market Applications: Towards A Model Of Coexistence, Katina Michael, M. G. Michael, Holly Tootell, V. Baker
Dr Holly Tootell
The number and type of automatic identification technologies in the market have grown since the bar code was introduced in the retail sector in the late 1960s. This paper studies the selection environment of auto-ID and defines, describes and gives examples of three main patterns of innovation: migration, integration, and convergence. The findings indicate that technology adoption is not always about choosing the dominant design but about how to future-proof an auto-ID implementation. Enterprises wishing to adopt auto-ID techniques need to be aware that technology is not static, auto-ID techniques are not stand-alone, and consumers may have wide-ranging requirements for …
Applying Feature Selection To Reduce Variability In Keystroke Dynamics Data For Authentication Systems, Mark Abernethy, Shri Rai
Applying Feature Selection To Reduce Variability In Keystroke Dynamics Data For Authentication Systems, Mark Abernethy, Shri Rai
Australian Information Warfare and Security Conference
Authentication systems enable the verification of claimed identity. Password-based authentication systems are ubiquitous even though such systems are amenable to numerous attack vectors and are therefore responsible for a large number of security breaches. Biometrics has been increasingly researched and used as an alternative to password-based systems. There are a number of alternative biometric characteristics that can be used for authentication purposes, each with different positive and negative implementation factors. Achieving a successful authentication performance requires effective data processing. This study investigated the use of keystroke dynamics for authentication purposes. A feature selection process, based on normality statistics, was applied …
Coercion Resistance In Authentication Responsibility Shifting, Payas Gupta, Xuhua Ding, Debin Gao
Coercion Resistance In Authentication Responsibility Shifting, Payas Gupta, Xuhua Ding, Debin Gao
Research Collection School Of Computing and Information Systems
Responsibility shifting, a popular solution used in the event of failure of primary authentication where a human helper is involved in regaining access, is vulnerable to coercion attacks. In this work, we report our user study which investigates the helper’s emotional status when being coerced to assist in an attack. Results show that the coercion causes involuntary skin conductance fluctuation on the helper, which indicates that he/she is nervous and stressed. This response can be used to strengthen the security of the authentication system by providing coercion resistance.