Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni Jan 2016

Product Authentication Using Hash Chains And Printed Qr Codes, Harshith R. Keni

Electronic Theses and Dissertations

This thesis explores the usage of simple printed tags for authenticating products. Printed tags are a cheap alternative to RFID and other tag based systems and do not require specialized equipment. Due to the simplistic nature of such printed codes, many security issues like tag impersonation, server impersonation, reader impersonation, replay attacks and denial of service present in RFID based solutions need to be handled differently. An algorithm that utilizes hash chains to secure such simple tags while still keeping cost low is discussed. The security characteristics of this scheme as well as other product authentication schemes that use RFID …


Capital One Mobile Authentication: Authentication Using Biometric, Anh Dang, Hunter Miller, Matthew Mosca Jan 2016

Capital One Mobile Authentication: Authentication Using Biometric, Anh Dang, Hunter Miller, Matthew Mosca

Capstone Design Expo Posters

Capital One, a large US bank, is currently providing customers with a mobile servicing experience. One of the features of the mobile servicing app is easy and convenient access to account information. Capital One currently allows users to authenticate using a traditional username / password, their registered SureSwipe feature and even their finger on supported devices. The project's goal is to evaluate the viability of retinal recognition as a new method for biometric authentication.

By successfully developing this project, the application could offer retinal recognition as an additional biometric authentication option to customers. This can be used to help eliminate …


Authentication Of Uncertain Data Based On K-Means Clustering, Levent Ünver, Taflan İmre Gündem Jan 2016

Authentication Of Uncertain Data Based On K-Means Clustering, Levent Ünver, Taflan İmre Gündem

Turkish Journal of Electrical Engineering and Computer Sciences

No abstract provided.


An Improved Security Framework For Web Service-Based Resources, Wenbin Jiang, Hui Xu, Hao Dong, Hai Jin, Xiaofei Liao Jan 2016

An Improved Security Framework For Web Service-Based Resources, Wenbin Jiang, Hui Xu, Hao Dong, Hai Jin, Xiaofei Liao

Turkish Journal of Electrical Engineering and Computer Sciences

Web service-based application has become one of the dominative ones of the Internet. This trend brings more and more security challenges in reliability, confidentiality, and data nonrepudiation, especially in some systems that have massive diversified resources. An improved framework for secure accesses of Web resources is presented and implemented by extending and enhancing the Spring Security framework. It improves the security level of systems for identity authentication, authorized access, and secure transmission. The highly safe authentication is based on the integration of an improved authentication module of Spring Security with a U-key method and a RSA algorithm. For authorized access, …