ListarGrupos de investigación por tema "Authentication"
Mostrando ítems 1-6 de 6
-
A First Approach to Authentication Based on Artificial Intelligence for Touch-Screen Devices
(MDPI AG, 2020-08-18)[Abstract] Most authentication schemes follow a classical approach, where the users are authenticated only once at the beginning of their sessions. Therefore, it is not possible to verify the legitimate use of such a ... -
A Sensor-Based Methodology to Differentiate Pure and Mixed White Tequilas Based on Fused Infrared Spectra and Multivariate Data Treatment
(MDPI, 2021-02-27)[Abstract]: Mexican Tequila is one of the most demanded import spirits in Europe. Its fast-raising worldwide request makes counterfeiting a profitable activity affecting both consumers and legal distillers. In this paper, ... -
An Analysis of the Current Implementations Based on the WebAuthn and FIDO Authentication Standards
(MDPI, 2021)[Abstract] During the last few years, some of the most relevant IT companies have started to develop new authentication solutions which are not vulnerable to attacks like phishing. WebAuthn and FIDO authentication standards ... -
Authentication of tequilas using pattern recognition and supervised classification
(Elsevier, 2017-07-18)[Abstract] Sales of reputed, Mexican tequila grown substantially in last years and, therefore, counterfeiting is increasing steadily. Hence, methodologies intended to characterize and authenticate commercial beverages are ... -
Implementing a Web Application for W3C WebAuthn Protocol Testing
(MDPI AG, 2020-08-18)[Abstract] During the last few years, the FIDO Alliance and the W3C have been working on a new standard called WebAuthn that aims to substitute the obsolete password as an authentication method by using physical security ... -
Mouse Behavior Analysis Based on Artificial Intelligence as a Second-Phase Authentication System
(MDPI AG, 2019-08-01)[Abstract] Nowadays, a wide variety of computer systems use authentication protocols based on several factors in order to enhance security. In this work, the viability of a second-phase authentication scheme based on users’ ...