Keystroke Dynamics-Based Credential Hardening Systems
NASA Astrophysics Data System (ADS)
Bartlow, Nick; Cukic, Bojan
abstract Keystroke dynamics are becoming a well-known method for strengthening username- and password-based credential sets. The familiarity and ease of use of these traditional authentication schemes combined with the increased trustworthiness associated with biometrics makes them prime candidates for application in many web-based scenarios. Our keystroke dynamics system uses Breiman’s random forests algorithm to classify keystroke input sequences as genuine or imposter. The system is capable of operating at various points on a traditional ROC curve depending on application-specific security needs. As a username/password authentication scheme, our approach decreases the system penetration rate associated with compromised passwords up to 99.15%. Beyond presenting results demonstrating the credential hardening effect of our scheme, we look into the notion that a user’s familiarity to components of a credential set can non-trivially impact error rates.
The impact of database quality on keystroke dynamics authentication
NASA Astrophysics Data System (ADS)
Panasiuk, Piotr; Rybnik, Mariusz; Saeed, Khalid; Rogowski, Marcin
2016-06-01
This paper concerns keystroke dynamics, also partially in the context of touchscreen devices. The authors concentrate on the impact of database quality and propose their algorithm to test database quality issues. The algorithm is used on their own
TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
NASA Astrophysics Data System (ADS)
Nauman, Mohammad; Ali, Tamleek
Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to mitigate the risks associated with naïve username/password based authentication. However, these approaches have two major limitations: they are not applicable to services where authentication occurs outside the domain of the mobile device - such as web-based services; and they often overly tax the limited computational capabilities of mobile devices. In this paper, we propose a protocol for keystroke dynamics analysis which allows web-based applications to make use of remote attestation and delegated keystroke analysis. The end result is an efficient keystroke-based user identification mechanism that strengthens traditional password protected services while mitigating the risks of user profiling by collaborating malicious web services.
Keystroke dynamics in the pre-touchscreen era
Ahmad, Nasir; Szymkowiak, Andrea; Campbell, Paul A.
2013-01-01
Biometric authentication seeks to measure an individual’s unique physiological attributes for the purpose of identity verification. Conventionally, this task has been realized via analyses of fingerprints or signature iris patterns. However, whilst such methods effectively offer a superior security protocol compared with password-based approaches for example, their substantial infrastructure costs, and intrusive nature, make them undesirable and indeed impractical for many scenarios. An alternative approach seeks to develop similarly robust screening protocols through analysis of typing patterns, formally known as keystroke dynamics. Here, keystroke analysis methodologies can utilize multiple variables, and a range of mathematical techniques, in order to extract individuals’ typing signatures. Such variables may include measurement of the period between key presses, and/or releases, or even key-strike pressures. Statistical methods, neural networks, and fuzzy logic have often formed the basis for quantitative analysis on the data gathered, typically from conventional computer keyboards. Extension to more recent technologies such as numerical keypads and touch-screen devices is in its infancy, but obviously important as such devices grow in popularity. Here, we review the state of knowledge pertaining to authentication via conventional keyboards with a view toward indicating how this platform of knowledge can be exploited and extended into the newly emergent type-based technological contexts. PMID:24391568
Keystroke dynamics in the pre-touchscreen era.
Ahmad, Nasir; Szymkowiak, Andrea; Campbell, Paul A
2013-12-19
Biometric authentication seeks to measure an individual's unique physiological attributes for the purpose of identity verification. Conventionally, this task has been realized via analyses of fingerprints or signature iris patterns. However, whilst such methods effectively offer a superior security protocol compared with password-based approaches for example, their substantial infrastructure costs, and intrusive nature, make them undesirable and indeed impractical for many scenarios. An alternative approach seeks to develop similarly robust screening protocols through analysis of typing patterns, formally known as keystroke dynamics. Here, keystroke analysis methodologies can utilize multiple variables, and a range of mathematical techniques, in order to extract individuals' typing signatures. Such variables may include measurement of the period between key presses, and/or releases, or even key-strike pressures. Statistical methods, neural networks, and fuzzy logic have often formed the basis for quantitative analysis on the data gathered, typically from conventional computer keyboards. Extension to more recent technologies such as numerical keypads and touch-screen devices is in its infancy, but obviously important as such devices grow in popularity. Here, we review the state of knowledge pertaining to authentication via conventional keyboards with a view toward indicating how this platform of knowledge can be exploited and extended into the newly emergent type-based technological contexts.
The influence of emotion on keyboard typing: an experimental study using visual stimuli.
Lee, Po-Ming; Tsui, Wei-Hsuan; Hsiao, Tzu-Chien
2014-06-20
Emotion recognition technology plays the essential role of enhancement in Human-Computer Interaction (HCI). In recent years, a novel approach for emotion recognition has been reported, which is by keystroke dynamics. This approach can be considered to be rather desirable in HCI because the data used is rather non-intrusive and easy to obtain. However, there were only limited investigations about the phenomenon itself in previous studies. This study aims to examine the source of variance in keystroke typing patterns caused by emotions. A controlled experiment to collect subjects' keystroke data in different emotional states induced by International Affective Picture System (IAPS) was conducted. Two-way Valence (3) × Arousal (3) ANOVAs were used to examine the collected dataset. The results of the experiment indicate that the effect of emotion is significant (p<.001) in the keystroke duration, keystroke latency, and accuracy rate of the keyboard typing. However, the size of the emotional effect is small, compare to the individual variability. Our findings support the conclusion that the keystroke duration, keystroke latency, and also the accuracy rate of typing, are influenced by emotional states. Notably, the finding about the size of effect suggests that the accuracy rate of the emotion recognition could be further improved if personalized models are utilized. On the other hand, the finding also provides an explanation of why real-world applications which authenticate the identity of users by monitoring keystrokes may not be interfered by the emotional states of users. The experiment was conducted using standard instruments and hence is expected to be highly reproducible.
Capturing Cognitive Processing Time for Active Authentication
2014-02-01
cognitive fingerprint for continuous authentication. Its effectiveness has been verified through a campus-wide experiment at Iowa State University...2 3.1 Cognitive Fingerprint Description...brief to capture a “ cognitive fingerprint .” In the current keystroke-authentication commercial market, some products combine the timing information of
A survey of keystroke dynamics biometrics.
Teh, Pin Shen; Teoh, Andrew Beng Jin; Yue, Shigang
2013-01-01
Research on keystroke dynamics biometrics has been increasing, especially in the last decade. The main motivation behind this effort is due to the fact that keystroke dynamics biometrics is economical and can be easily integrated into the existing computer security systems with minimal alteration and user intervention. Numerous studies have been conducted in terms of data acquisition devices, feature representations, classification methods, experimental protocols, and evaluations. However, an up-to-date extensive survey and evaluation is not yet available. The objective of this paper is to provide an insightful survey and comparison on keystroke dynamics biometrics research performed throughout the last three decades, as well as offering suggestions and possible future research directions.
Context-Aware Active Authentication using Touch Gestures, Typing Patterns and Body Movement
2016-03-01
Division Information Directorate This report is published in the interest of scientific and technical information exchange, and its publication does...CA policy clarification memorandum dated 16 Jan 09. 13. SUPPLEMENTARY NOTES 14. ABSTRACT Design, develop and evaluate a desktop based active...of this project was to design, develop and evaluate a desktop active authentication system that uses the following keystroke timing based biometric
A Survey of Keystroke Dynamics Biometrics
Yue, Shigang
2013-01-01
Research on keystroke dynamics biometrics has been increasing, especially in the last decade. The main motivation behind this effort is due to the fact that keystroke dynamics biometrics is economical and can be easily integrated into the existing computer security systems with minimal alteration and user intervention. Numerous studies have been conducted in terms of data acquisition devices, feature representations, classification methods, experimental protocols, and evaluations. However, an up-to-date extensive survey and evaluation is not yet available. The objective of this paper is to provide an insightful survey and comparison on keystroke dynamics biometrics research performed throughout the last three decades, as well as offering suggestions and possible future research directions. PMID:24298216
A Scientific Understanding of Keystroke Dynamics
2012-01-01
keystroke- dynamics classifiers. Obaidat and Sadoun (1997) had 16 subjects type their own and each others’ user IDs. They constructed neural networks and a...puts are assigned high anomaly scores. In the training phase, the neural network is constructed with p input nodes and p out- put nodes (where p is...Berlin. S. Cho, C. Han, D. H. Han, and H.-I. Kim. Web- based keystroke dynamics identity ver- ification using neural network . Journal of Organizational
On continuous user authentication via typing behavior.
Roth, Joseph; Liu, Xiaoming; Metaxas, Dimitris
2014-10-01
We hypothesize that an individual computer user has a unique and consistent habitual pattern of hand movements, independent of the text, while typing on a keyboard. As a result, this paper proposes a novel biometric modality named typing behavior (TB) for continuous user authentication. Given a webcam pointing toward a keyboard, we develop real-time computer vision algorithms to automatically extract hand movement patterns from the video stream. Unlike the typical continuous biometrics, such as keystroke dynamics (KD), TB provides a reliable authentication with a short delay, while avoiding explicit key-logging. We collect a video database where 63 unique subjects type static text and free text for multiple sessions. For one typing video, the hands are segmented in each frame and a unique descriptor is extracted based on the shape and position of hands, as well as their temporal dynamics in the video sequence. We propose a novel approach, named bag of multi-dimensional phrases, to match the cross-feature and cross-temporal pattern between a gallery sequence and probe sequence. The experimental results demonstrate a superior performance of TB when compared with KD, which, together with our ultrareal-time demo system, warrant further investigation of this novel vision application and biometric modality.
A parallel decision tree-based method for user authentication based on keystroke patterns.
Sheng, Yong; Phoha, Vir V; Rovnyak, Steven M
2005-08-01
We propose a Monte Carlo approach to attain sufficient training data, a splitting method to improve effectiveness, and a system composed of parallel decision trees (DTs) to authenticate users based on keystroke patterns. For each user, approximately 19 times as much simulated data was generated to complement the 387 vectors of raw data. The training set, including raw and simulated data, is split into four subsets. For each subset, wavelet transforms are performed to obtain a total of eight training subsets for each user. Eight DTs are thus trained using the eight subsets. A parallel DT is constructed for each user, which contains all eight DTs with a criterion for its output that it authenticates the user if at least three DTs do so; otherwise it rejects the user. Training and testing data were collected from 43 users who typed the exact same string of length 37 nine consecutive times to provide data for training purposes. The users typed the same string at various times over a period from November through December 2002 to provide test data. The average false reject rate was 9.62% and the average false accept rate was 0.88%.
Personal Identification by Keystroke Dynamics in Japanese Free Text Typing
NASA Astrophysics Data System (ADS)
Samura, Toshiharu; Nishimura, Haruhiko
Biometrics is classified into verification and identification. Many researchers on the keystroke dynamics have treated the verification of a fixed short password which is used for the user login. In this research, we pay attention to the identification and investigate several characteristics of the keystroke dynamics in Japanese free text typing. We developed Web-based typing software in order to collect the keystroke data on the Local Area Network and performed experiments on a total of 112 subjects, from which three groups of typing level, the beginner's level and above, the normal level and above and the middle level and above were constructed. Based on the identification methods by the weighted Euclid distance and the neural network for the extracted feature indexes in Japanese texts, we evaluated identification performances for the three groups. As a result, high accuracy of personal identification was confirmed in both methods, in proportion to the typing level of the group.
The Influence of Emotion on Keyboard Typing: An Experimental Study Using Auditory Stimuli.
Lee, Po-Ming; Tsui, Wei-Hsuan; Hsiao, Tzu-Chien
2015-01-01
In recent years, a novel approach for emotion recognition has been reported, which is by keystroke dynamics. The advantages of using this approach are that the data used is rather non-intrusive and easy to obtain. However, there were only limited investigations about the phenomenon itself in previous studies. Hence, this study aimed to examine the source of variance in keyboard typing patterns caused by emotions. A controlled experiment to collect subjects' keystroke data in different emotional states induced by International Affective Digitized Sounds (IADS) was conducted. Two-way Valence (3) x Arousal (3) ANOVAs was used to examine the collected dataset. The results of the experiment indicate that the effect of arousal is significant in keystroke duration (p < .05), keystroke latency (p < .01), but not in the accuracy rate of keyboard typing. The size of the emotional effect is small, compared to the individual variability. Our findings support the conclusion that the keystroke duration and latency are influenced by arousal. The finding about the size of the effect suggests that the accuracy rate of emotion recognition technology could be further improved if personalized models are utilized. Notably, the experiment was conducted using standard instruments and hence is expected to be highly reproducible.
Yager, Neil; Dunstone, Ted
2010-02-01
It is commonly accepted that users of a biometric system may have differing degrees of accuracy within the system. Some people may have trouble authenticating, while others may be particularly vulnerable to impersonation. Goats, wolves, and lambs are labels commonly applied to these problem users. These user types are defined in terms of verification performance when users are matched against themselves (goats) or when matched against others (lambs and wolves). The relationship between a user's genuine and impostor match results suggests four new user groups: worms, doves, chameleons, and phantoms. We establish formal definitions for these animals and a statistical test for their existence. A thorough investigation is conducted using a broad range of biometric modalities, including 2D and 3D faces, fingerprints, iris, speech, and keystroke dynamics. Patterns that emerge from the results expose novel, important, and encouraging insights into the nature of biometric match results. A new framework for the evaluation of biometric systems based on the biometric menagerie, as opposed to collective statistics, is proposed.
Personalized keystroke dynamics for self-powered human--machine interfacing.
Chen, Jun; Zhu, Guang; Yang, Jin; Jing, Qingshen; Bai, Peng; Yang, Weiqing; Qi, Xuewei; Su, Yuanjie; Wang, Zhong Lin
2015-01-27
The computer keyboard is one of the most common, reliable, accessible, and effective tools used for human--machine interfacing and information exchange. Although keyboards have been used for hundreds of years for advancing human civilization, studying human behavior by keystroke dynamics using smart keyboards remains a great challenge. Here we report a self-powered, non-mechanical-punching keyboard enabled by contact electrification between human fingers and keys, which converts mechanical stimuli applied to the keyboard into local electronic signals without applying an external power. The intelligent keyboard (IKB) can not only sensitively trigger a wireless alarm system once gentle finger tapping occurs but also trace and record typed content by detecting both the dynamic time intervals between and during the inputting of letters and the force used for each typing action. Such features hold promise for its use as a smart security system that can realize detection, alert, recording, and identification. Moreover, the IKB is able to identify personal characteristics from different individuals, assisted by the behavioral biometric of keystroke dynamics. Furthermore, the IKB can effectively harness typing motions for electricity to charge commercial electronics at arbitrary typing speeds greater than 100 characters per min. Given the above features, the IKB can be potentially applied not only to self-powered electronics but also to artificial intelligence, cyber security, and computer or network access control.
Authentication, privacy, security can exploit brainwave by biomarker
NASA Astrophysics Data System (ADS)
Jenkins, Jeffrey; Sweet, Charles; Sweet, James; Noel, Steven; Szu, Harold
2014-05-01
We seek to augment the current Common Access Control (CAC) card and Personal Identification Number (PIN) verification systems with an additional layer of classified access biometrics. Among proven devices such as fingerprint readers and cameras that can sense the human eye's iris pattern, we introduced a number of users to a sequence of 'grandmother images', or emotionally evoked stimuli response images from other users, as well as one of their own, for the purpose of authentication. We performed testing and evaluation of the Authenticity Privacy and Security (APS) brainwave biometrics, similar to the internal organ of the human eye's iris which cannot easily be altered. `Aha' recognition through stimulus-response habituation can serve as a biomarker, similar to keystroke dynamics analysis for inter and intra key fluctuation time of a memorized PIN number (FIST). Using a non-tethered Electroencephalogram (EEG) wireless smartphone/pc monitor interface, we explore the appropriate stimuli-response biomarker present in DTAB low frequency group waves. Prior to login, the user is shown a series of images on a computer display. They have been primed to click their mouse when the image is presented. DTAB waves are collected with a wireless EEG and are sent via Smartphone to a cloud based processing infrastructure. There, we measure fluctuations in DTAB waves from a wireless, non-tethered, single node EEG device between the Personal Graphic Image Number (PGIN) stimulus image and the response time from an individual's mental performance baseline. Towards that goal, we describe an infrastructure that supports distributed verification for web-based EEG authentication. The performance of machine learning on the relative Power Spectral Density EEG data may uncover features required for subsequent access to web or media content. Our approach provides a scalable framework wrapped into a robust Neuro-Informatics toolkit, viable for use in the Biomedical and mental health communities, as well as numerous consumer applications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Campbell, Scott; Campbell, Scott
NERSC recently undertook a project to access and analyze Secure Shell (SSH) related data. This includes authentication data such as user names and key fingerprints, interactive session data such as keystrokes and responses, and information about noninteractive sessions such as commands executed and files transferred. Historically, this data has been inaccessible with traditional network monitoring techniques, but with a modification to the SSH daemon, this data can be passed directly to intrusion detection systems for analysis. The instrumented version of SSH is now running on all NERSC production systems. This paper describes the project, details about how SSH was instrumented,more » and the initial results of putting this in production.« less
Keystroke Analysis: Reflections on Procedures and Measures
ERIC Educational Resources Information Center
Baaijen, Veerle M.; Galbraith, David; de Glopper, Kees
2012-01-01
Although keystroke logging promises to provide a valuable tool for writing research, it can often be difficult to relate logs to underlying processes. This article describes the procedures and measures that the authors developed to analyze a sample of 80 keystroke logs, with a view to achieving a better alignment between keystroke-logging measures…
NASA Technical Reports Server (NTRS)
Walatka, Pamela P.; Buning, Pieter G.; Pierce, Larry; Elson, Patricia A.
1990-01-01
PLOT3D is a computer graphics program designed to visualize the grids and solutions of computational fluid dynamics. Seventy-four functions are available. Versions are available for many systems. PLOT3D can handle multiple grids with a million or more grid points, and can produce varieties of model renderings, such as wireframe or flat shaded. Output from PLOT3D can be used in animation programs. The first part of this manual is a tutorial that takes the reader, keystroke by keystroke, through a PLOT3D session. The second part of the manual contains reference chapters, including the helpfile, data file formats, advice on changing PLOT3D, and sample command files.
Keystroke Logging in Writing Research: Using Inputlog to Analyze and Visualize Writing Processes
ERIC Educational Resources Information Center
Leijten, Marielle; Van Waes, Luuk
2013-01-01
Keystroke logging has become instrumental in identifying writing strategies and understanding cognitive processes. Recent technological advances have refined logging efficiency and analytical outputs. While keystroke logging allows for ecological data collection, it is often difficult to connect the fine grain of logging data to the underlying…
The effect of emotion on keystroke: an experimental study using facial feedback hypothesis.
Tsui, Wei-Hsuan; Lee, Poming; Hsiao, Tzu-Chien
2013-01-01
The automatic emotion recognition technology is an important part of building intelligent systems to prevent the computers acting inappropriately. A novel approach for recognizing emotional state by their keystroke typing patterns on a standard keyboard was developed in recent years. However, there was very limited investigation about the phenomenon itself in the previous literatures. Hence, in our study, we conduct a controlled experiment to collect subjects' keystroke data in the different emotional states induced by facial feedback. We examine the difference of the keystroke data between positive and negative emotional states. The results prove the significance in the differences in the typing patterns under positive and negative emotions for all subjects. Our study provides an evidence for the reasonability about developing the technique of emotion recognition by keystroke.
When does word frequency influence written production?
Baus, Cristina; Strijkers, Kristof; Costa, Albert
2013-01-01
The aim of the present study was to explore the central (e.g., lexical processing) and peripheral processes (motor preparation and execution) underlying word production during typewriting. To do so, we tested non-professional typers in a picture typing task while continuously recording EEG. Participants were instructed to write (by means of a standard keyboard) the corresponding name for a given picture. The lexical frequency of the words was manipulated: half of the picture names were of high-frequency while the remaining were of low-frequency. Different measures were obtained: (1) first keystroke latency and (2) keystroke latency of the subsequent letters and duration of the word. Moreover, ERPs locked to the onset of the picture presentation were analyzed to explore the temporal course of word frequency in typewriting. The results showed an effect of word frequency for the first keystroke latency but not for the duration of the word or the speed to which letter were typed (interstroke intervals). The electrophysiological results showed the expected ERP frequency effect at posterior sites: amplitudes for low-frequency words were more positive than those for high-frequency words. However, relative to previous evidence in the spoken modality, the frequency effect appeared in a later time-window. These results demonstrate two marked differences in the processing dynamics underpinning typing compared to speaking: First, central processing dynamics between speaking and typing differ already in the manner that words are accessed; second, central processing differences in typing, unlike speaking, do not cascade to peripheral processes involved in response execution.
When does word frequency influence written production?
Baus, Cristina; Strijkers, Kristof; Costa, Albert
2013-01-01
The aim of the present study was to explore the central (e.g., lexical processing) and peripheral processes (motor preparation and execution) underlying word production during typewriting. To do so, we tested non-professional typers in a picture typing task while continuously recording EEG. Participants were instructed to write (by means of a standard keyboard) the corresponding name for a given picture. The lexical frequency of the words was manipulated: half of the picture names were of high-frequency while the remaining were of low-frequency. Different measures were obtained: (1) first keystroke latency and (2) keystroke latency of the subsequent letters and duration of the word. Moreover, ERPs locked to the onset of the picture presentation were analyzed to explore the temporal course of word frequency in typewriting. The results showed an effect of word frequency for the first keystroke latency but not for the duration of the word or the speed to which letter were typed (interstroke intervals). The electrophysiological results showed the expected ERP frequency effect at posterior sites: amplitudes for low-frequency words were more positive than those for high-frequency words. However, relative to previous evidence in the spoken modality, the frequency effect appeared in a later time-window. These results demonstrate two marked differences in the processing dynamics underpinning typing compared to speaking: First, central processing dynamics between speaking and typing differ already in the manner that words are accessed; second, central processing differences in typing, unlike speaking, do not cascade to peripheral processes involved in response execution. PMID:24399980
ERIC Educational Resources Information Center
Almond, Russell; Deane, Paul; Quinlan, Thomas; Wagner, Michael; Sydorenko, Tetyana
2012-01-01
The Fall 2007 and Spring 2008 pilot tests for the "CBAL"™ Writing assessment included experimental keystroke logging capabilities. This report documents the approaches used to capture the keystroke logs and the algorithms used to process the outputs. It also includes some preliminary findings based on the pilot data. In particular, it…
The serial order of response units in word production: The case of typing.
Scaltritti, Michele; Longcamp, Marieke; Alario, F-Xavier
2018-05-01
The selection and ordering of response units (phonemes, letters, keystrokes) represents a transversal issue across different modalities of language production. Here, the issue of serial order was investigated with respect to typewriting. Following seminal investigations in the spoken modality, we conducted an experiment where participants typed as many times as possible a pair of words during a fixed time-window. The 2 words shared either their first 2 keystrokes, the last 2 ones, all the keystrokes, or were unrelated. Fine-grained performance measures were recorded at the level of individual keystrokes. In contrast with previous results from the spoken modality, we observed an overall facilitation for words sharing the initial keystrokes. In addition, the initial overlap briefly delayed the execution of the following keystroke. The results are discussed with reference to different theoretical perspectives on serial order, with a particular attention to the competing accounts offered by position coding models and chaining models. Our findings point to potential major differences between the speaking and typing modalities in terms of interactive activation between lexical and response units processing levels. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
Evaluation of a Biometric Keystroke Typing Dynamics Computer Security System
1992-03-01
intrusions, numerous computer systems have been threatened or destroyed by virus attacks. A recent example was the virus called " Michelangelo ," which...threatened to destroy all data on infected hard disks on the birthday of the artist Michelangelo , 6 March, in 1992. During the 1991 Persian Gulf War
Kinematic Origins of Motor Inconsistency in Expert Pianists.
Tominaga, Kenta; Lee, André; Altenmüller, Eckart; Miyazaki, Fumio; Furuya, Shinichi
2016-01-01
For top performers, including athletes and musicians, even subtle inconsistencies in rhythm and force during movement production decrease the quality of performance. However, extensive training over many years beginning in childhood is unable to perfect dexterous motor performance so that it is without any error. To gain insight into the biological mechanisms underlying the subtle defects of motor actions, the present study sought to identify the kinematic origins of inconsistency of dexterous finger movements in musical performance. Seven highly-skilled pianists who have won prizes at international piano competitions played a short sequence of tones with the right hand at a predetermined tempo. Time-varying joint angles of the fingers were recorded using a custom-made data glove, and the timing and velocity of the individual keystrokes were recorded from a digital piano. Both ridge and stepwise multiple regression analyses demonstrated an association of the inter-trial variability of the inter-keystroke interval (i.e., rhythmic inconsistency) with both the rotational velocity of joints of the finger used for a keystroke (i.e., striking finger) and the movement independence between the striking and non-striking fingers. This indicates a relationship between rhythmic inconsistency in musical performance and the dynamic features of movements in not only the striking finger but also the non-striking fingers. In contrast, the inter-trial variability of the key-descending velocity (i.e., loudness inconsistency) was associated mostly with the kinematic features of the striking finger at the moment of the keystroke. Furthermore, there was no correlation between the rhythmic and loudness inconsistencies. The results suggest distinct kinematic origins of inconsistencies in rhythm and loudness in expert musical performance.
CBEFF Common Biometric Exchange File Format
2001-01-03
and systems. Points of contact for CBEFF and liaisons to other organizations can be found in Appendix F. 2. Purpose The purpose of CBEFF is...0x40 Signature Dynamics 0x80 Keystroke Dynamics 0x100 Lip Movement 0x200 Thermal Face Image 0x400 Thermal Hand Image 0x800 Gait 0x1000 Body...this process is negligible from the Biometric Objects point of view, unless the process creating the livescan sample to compare against the
Should Security Researchers Experiment More and Draw More Inferences?
2011-08-01
knowledge would be enormous. To obtain a large and representative sample of keystroke-dynamics research papers, we consulted the IEEE Xplore database... IEEE Xplore are similar to those published elsewhere), these confidence intervals estimate the re- gions where those true percentages would lie with 95...of articles and conference pro- ceedings published by the IEEE , to which our university maintains a subscription. We conducted two keyword searches for
TRACING THE DEVELOPMENT OF TYPEWRITING SKILLS IN AN ADAPTIVE E-LEARNING ENVIRONMENT.
van den Bergh, Mattis; Hofman, Abe D; Schmittmann, Verena D; van der Maas, Han L J
2015-12-01
Typewriting studies which compare novice and expert typists have suggested that highly trained typing skills involve cognitive process with an inner and outer loop, which regulate keystrokes and words, respectively. The present study investigates these loops longitudinally, using multi-level modeling of 1,091,707 keystroke latencies from 62 children (M age=12.6 yr.) following an online typing course. Using finger movement repetition as indicator of the inner loop and words typed as indicator of the outer loop, practicing keystroke latencies resulted in different developmental curves for each loop. Moreover, based on plateaus in the developmental curves, the inner loop seemed to require less practice to develop than the outer loop.
Control of multi-joint arm movements for the manipulation of touch in keystroke by expert pianists
2010-01-01
Background Production of a variety of finger-key touches in the piano is essential for expressive musical performance. However, it remains unknown how expert pianists control multi-joint finger and arm movements for manipulating the touch. The present study investigated differences in kinematics and kinetics of the upper-limb movements while expert pianists were depressing a key with two different touches: pressed and struck. The former starts key-depression with the finger-tip contacting the key, whereas the latter involves preparatory arm-lift before striking the key. To determine the effect of individual muscular torque (MUS) as well as non-muscular torques on joint acceleration, we performed a series of inverse and forward dynamics computations. Results The pressed touch showed smaller elbow extension velocity, and larger shoulder and finger flexion velocities during key-depression compared with the struck touch. The former touch also showed smaller elbow extension acceleration directly attributed to the shoulder MUS. In contrast, the shoulder flexion acceleration induced by elbow and wrist MUS was greater for the pressed touch than the struck touch. Towards the goal of producing the target finger-key contact dynamics, the pressed and struck touches effectively took advantage of the distal-to-proximal and proximal-to-distal inter-segmental dynamics, respectively. Furthermore, a psychoacoustic experiment confirmed that a tone elicited by the pressed touch was perceived softer than that by the struck touch. Conclusion The present findings suggest that manipulation of tone timbre depends on control of inter-segmental dynamics in piano keystroke. PMID:20630085
Modeling Basic Writing Processes from Keystroke Logs
ERIC Educational Resources Information Center
Guo, Hongwen; Deane, Paul D.; van Rijn, Peter W.; Zhang, Mo; Bennett, Randy E.
2018-01-01
The goal of this study is to model pauses extracted from writing keystroke logs as a way of characterizing the processes students use in essay composition. Low-level timing data were modeled, the interkey interval and its subtype, the intraword duration, thought to reflect processes associated with keyboarding skills and composition fluency.…
ERIC Educational Resources Information Center
Crump, Matthew J. C.; Logan, Gordon D.
2010-01-01
Routine actions are commonly assumed to be controlled by hierarchically organized processes and representations. In the domain of typing theories, word-level information is assumed to activate the constituent keystrokes required to type each letter in a word. We tested this assumption directly using a novel single-letter probe technique. Subjects…
Analyzing Pauses in Computer-Assisted EFL Writing--A Computer-Keystroke-Log Perspective
ERIC Educational Resources Information Center
Xu, Cuiqin; Qi, Yan
2017-01-01
Using computer keystroke logs, this study investigated how writing skill affected L2 writers' pausing patterns to gain insights into their management of the cognitive writing processes. The 59 participants, 29 in the more-skilled group and 30 in the less-skilled group, were recruited from a college English course at a key Chinese university. The…
Keystroke-Level Analysis to Estimate Time to Process Pages in Online Learning Environments
ERIC Educational Resources Information Center
Bälter, Olle; Zimmaro, Dawn
2018-01-01
It is challenging for students to plan their work sessions in online environments, as it is very difficult to make estimates on how much material there is to cover. In order to simplify this estimation, we have extended the Keystroke-level analysis model with individual reading speed of text, figures, and questions. This was used to estimate how…
ERIC Educational Resources Information Center
Deane, Paul; Zhang, Mo
2015-01-01
In this report, we examine the feasibility of characterizing writing performance using process features derived from a keystroke log. Using data derived from a set of "CBAL"™ writing assessments, we examine the following research questions: (a) How stable are the keystroke timing and process features across testing occasions?; (b) How…
Prosodic Boundaries in Writing: Evidence from a Keystroke Analysis
Fuchs, Susanne; Krivokapić, Jelena
2016-01-01
The aim of the paper is to investigate duration between successive keystrokes during typing in order to examine whether prosodic boundaries are expressed in the process of writing. In particular, we are interested in interkey durations that occur next to punctuation marks (comma and full stops while taking keystrokes between words as a reference), since these punctuation marks are often realized with minor or major prosodic boundaries during overt reading. A two-part experiment was conducted: first, participants’ keystrokes on a computer keyboard were recorded while writing an email to a close friend (in two conditions: with and without time pressure). Second, participants read the email they just wrote. Interkey durations were compared to pause durations at the same locations during read speech. Results provide evidence of significant differences between interkey durations between words, at commas and at full stops (from shortest to longest). These durations were positively correlated with silent pause durations during overt reading. A more detailed analysis of interkey durations revealed patterns that can be interpreted with respect to prosodic boundaries in speech production, namely as phrase-final and phrase-initial lengthening occurring at punctuation marks. This work provides initial evidence that prosodic boundaries are reflected in the writing process. PMID:27917129
Prosodic Boundaries in Writing: Evidence from a Keystroke Analysis.
Fuchs, Susanne; Krivokapić, Jelena
2016-01-01
The aim of the paper is to investigate duration between successive keystrokes during typing in order to examine whether prosodic boundaries are expressed in the process of writing. In particular, we are interested in interkey durations that occur next to punctuation marks (comma and full stops while taking keystrokes between words as a reference), since these punctuation marks are often realized with minor or major prosodic boundaries during overt reading. A two-part experiment was conducted: first, participants' keystrokes on a computer keyboard were recorded while writing an email to a close friend (in two conditions: with and without time pressure). Second, participants read the email they just wrote. Interkey durations were compared to pause durations at the same locations during read speech. Results provide evidence of significant differences between interkey durations between words, at commas and at full stops (from shortest to longest). These durations were positively correlated with silent pause durations during overt reading. A more detailed analysis of interkey durations revealed patterns that can be interpreted with respect to prosodic boundaries in speech production, namely as phrase-final and phrase-initial lengthening occurring at punctuation marks. This work provides initial evidence that prosodic boundaries are reflected in the writing process.
Yamaguchi, Motonori; Logan, Gordon D
2014-11-01
The present study investigated the way people acquire and control skilled performance in the context of typewriting. Typing skill was degraded by changing the location of a key (target key) while retaining the locations of other keys to disable an association between the letter and the key. We conducted 4 experiments: Experiment 1 demonstrated that disabling a letter-key association affected not only the execution of the target keystroke but also the planning of other keystrokes for words involving the target key. In Experiments 2-4, typists practiced with a new target location and then transferred to a condition in which they typed the practiced words with the original key location (Experiment 2) or typed new words with the practiced key location (Experiments 3 and 4). Experiment 2 showed that the newly acquired letter-key association interfered with the execution of the original keystroke but not planning. Experiments 3 and 4 demonstrated that acquisition of the new letter-key association depended on multiple levels of linguistic units. Experiment 4 demonstrated that acquisition of the new association depended on sequences both before and after the target keystroke. We discuss implications of the results for 2 prominent approaches to modeling sequential behavior: hierarchical control and recurrent network models. PsycINFO Database Record (c) 2014 APA, all rights reserved.
Kim, Daehee; Kim, Dongwan; An, Sunshin
2016-07-09
Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption.
Kim, Daehee; Kim, Dongwan; An, Sunshin
2016-01-01
Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption. PMID:27409616
Watch what you type: the role of visual feedback from the screen and hands in skilled typewriting.
Snyder, Kristy M; Logan, Gordon D; Yamaguchi, Motonori
2015-01-01
Skilled typing is controlled by two hierarchically structured processing loops (Logan & Crump, 2011): The outer loop, which produces words, commands the inner loop, which produces keystrokes. Here, we assessed the interplay between the two loops by investigating how visual feedback from the screen (responses either were or were not echoed on the screen) and the hands (the hands either were or were not covered with a box) influences the control of skilled typing. Our results indicated, first, that the reaction time of the first keystroke was longer when responses were not echoed than when they were. Also, the interkeystroke interval (IKSI) was longer when the hands were covered than when they were visible, and the IKSI for responses that were not echoed was longer when explicit error monitoring was required (Exp. 2) than when it was not required (Exp. 1). Finally, explicit error monitoring was more accurate when response echoes were present than when they were absent, and implicit error monitoring (i.e., posterror slowing) was not influenced by visual feedback from the screen or the hands. These findings suggest that the outer loop adjusts the inner-loop timing parameters to compensate for reductions in visual feedback. We suggest that these adjustments are preemptive control strategies designed to execute keystrokes more cautiously when visual feedback from the hands is absent, to generate more cautious motor programs when visual feedback from the screen is absent, and to enable enough time for the outer loop to monitor keystrokes when visual feedback from the screen is absent and explicit error reports are required.
The physiology of keystroke dynamics
NASA Astrophysics Data System (ADS)
Jenkins, Jeffrey; Nguyen, Quang; Reynolds, Joseph; Horner, William; Szu, Harold
2011-06-01
A universal implementation for most behavioral Biometric systems is still unknown since some behaviors aren't individual enough for identification. Habitual behaviors which are measurable by sensors are considered 'soft' biometrics (i.e., walking style, typing rhythm), while physical attributes (i.e., iris, fingerprint) are 'hard' biometrics. Thus, biometrics can aid in the identification of a human not only in cyberspace but in the world we live in. Hard biometrics have proven to be a rather successful form of identification, despite a large amount of individual signatures to keep track of. Virtually all soft biometric strategies, however, share a common pitfall. Instead of the classical pass/fail decision based on the measurements used by hard biometrics, a confidence threshold is imposed, increasing False Alarm and False Rejection Rates. This unreliability is a major roadblock for large scale system integration. Common computer security requires users to log-in with a six or more digit PIN (Personal Identification Number) to access files on the disk. Commercially available Keystroke Dynamics (KD) software can separately calculate and keep track of the mean and variance for each time travelled between each key (air time), and the time spent pressing each key (touch time). Despite its apparent utility, KD is not yet a robust, fault-tolerant system. We begin with a simple question: how could a pianist quickly control so many different finger and wrist movements to play music? What information, if any, can be gained from analyzing typing behavior over time? Biology has shown us that the separation of arm and finger motion is due to 3 long nerves in each arm; regulating movement in different parts of the hand. In this paper we wish to capture the underlying behavioral information of a typist through statistical memory and non-linear dynamics. Our method may reveal an inverse Compressive Sensing mapping; a unique individual signature.
Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih
2016-11-01
Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.
Secrets of virtuoso: neuromuscular attributes of motor virtuosity in expert musicians
Furuya, Shinichi; Oku, Takanori; Miyazaki, Fumio; Kinoshita, Hiroshi
2015-01-01
Musical performance requires extremely fast and dexterous limb movements. The underlying biological mechanisms have been an object of interest among scientists and non-scientists for centuries. Numerous studies of musicians and non-musicians have demonstrated that neuroplastic adaptations through early and deliberate musical training endowed superior motor skill. However, little has been unveiled about what makes inter-individual differences in motor skills among musicians. Here we determined the attributes of inter-individual differences in the maximum rate of repetitive piano keystrokes in twenty-four pianists. Among various representative factors of neuromuscular functions, anatomical characteristics, and training history, a stepwise multiple regression analysis and generalized linear model identified two predominant predictors of the maximum rate of repetitive piano keystrokes; finger tapping rate and muscular strength of the elbow extensor. These results suggest a non-uniform role of individual limb muscles in the production of extremely fast repetitive multi-joint movements. Neither age of musical training initiation nor the amount of extensive musical training before age twenty was a predictor. Power grip strength was negatively related to the maximum rate of piano keystrokes only during the smallest tone production. These findings highlight the importance of innate biological nature and explicit training for motor virtuosity. PMID:26502770
Secrets of virtuoso: neuromuscular attributes of motor virtuosity in expert musicians
NASA Astrophysics Data System (ADS)
Furuya, Shinichi; Oku, Takanori; Miyazaki, Fumio; Kinoshita, Hiroshi
2015-10-01
Musical performance requires extremely fast and dexterous limb movements. The underlying biological mechanisms have been an object of interest among scientists and non-scientists for centuries. Numerous studies of musicians and non-musicians have demonstrated that neuroplastic adaptations through early and deliberate musical training endowed superior motor skill. However, little has been unveiled about what makes inter-individual differences in motor skills among musicians. Here we determined the attributes of inter-individual differences in the maximum rate of repetitive piano keystrokes in twenty-four pianists. Among various representative factors of neuromuscular functions, anatomical characteristics, and training history, a stepwise multiple regression analysis and generalized linear model identified two predominant predictors of the maximum rate of repetitive piano keystrokes; finger tapping rate and muscular strength of the elbow extensor. These results suggest a non-uniform role of individual limb muscles in the production of extremely fast repetitive multi-joint movements. Neither age of musical training initiation nor the amount of extensive musical training before age twenty was a predictor. Power grip strength was negatively related to the maximum rate of piano keystrokes only during the smallest tone production. These findings highlight the importance of innate biological nature and explicit training for motor virtuosity.
South African managers in public service: On being authentic
Simbhoo, Nirvana
2014-01-01
South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work–life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work. PMID:24434054
South African managers in public service: on being authentic.
Barnard, Antoni; Simbhoo, Nirvana
2014-01-01
South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work-life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work.
Temporal Control and Hand Movement Efficiency in Skilled Music Performance
Goebl, Werner; Palmer, Caroline
2013-01-01
Skilled piano performance requires considerable movement control to accomplish the high levels of timing and force precision common among professional musicians, who acquire piano technique over decades of practice. Finger movement efficiency in particular is an important factor when pianists perform at very fast tempi. We document the finger movement kinematics of highly skilled pianists as they performed a five-finger melody at very fast tempi. A three-dimensional motion-capture system tracked the movements of finger joints, the hand, and the forearm of twelve pianists who performed on a digital piano at successively faster tempi (7–16 tones/s) until they decided to stop. Joint angle trajectories computed for all adjacent finger phalanges, the hand, and the forearm (wrist angle) indicated that the metacarpophalangeal joint contributed most to the vertical fingertip motion while the proximal and distal interphalangeal joints moved slightly opposite to the movement goal (finger extension). An efficiency measure of the combined finger joint angles corresponded to the temporal accuracy and precision of the pianists’ performances: Pianists with more efficient keystroke movements showed higher precision in timing and force measures. Keystroke efficiency and individual joint contributions remained stable across tempo conditions. Individual differences among pianists supported the view that keystroke efficiency is required for successful fast performance. PMID:23300946
Distinct Inter-Joint Coordination during Fast Alternate Keystrokes in Pianists with Superior Skill.
Furuya, Shinichi; Goda, Tatsushi; Katayose, Haruhiro; Miwa, Hiroyoshi; Nagata, Noriko
2011-01-01
Musical performance requires motor skills to coordinate the movements of multiple joints in the hand and arm over a wide range of tempi. However, it is unclear whether the coordination of movement across joints would differ for musicians with different skill levels and how inter-joint coordination would vary in relation to music tempo. The present study addresses these issues by examining the kinematics and muscular activity of the hand and arm movements of professional and amateur pianists who strike two keys alternately with the thumb and little finger at various tempi. The professionals produced a smaller flexion velocity at the thumb and little finger and greater elbow pronation and supination velocity than did the amateurs. The experts also showed smaller extension angles at the metacarpo-phalangeal joint of the index and middle fingers, which were not being used to strike the keys. Furthermore, muscular activity in the extrinsic finger muscles was smaller for the experts than for the amateurs. These findings indicate that pianists with superior skill reduce the finger muscle load during keystrokes by taking advantage of differences in proximal joint motion and hand postural configuration. With an increase in tempo, the experts showed larger and smaller increases in elbow velocity and finger muscle co-activation, respectively, compared to the amateurs, highlighting skill level-dependent differences in movement strategies for tempo adjustment. Finally, when striking as fast as possible, individual differences in the striking tempo among players were explained by their elbow velocities but not by their digit velocities. These findings suggest that pianists who are capable of faster keystrokes benefit more from proximal joint motion than do pianists who are not capable of faster keystrokes. The distinct movement strategy for tempo adjustment in pianists with superior skill would therefore ensure a wider range of musical expression.
Distinct Inter-Joint Coordination during Fast Alternate Keystrokes in Pianists with Superior Skill
Furuya, Shinichi; Goda, Tatsushi; Katayose, Haruhiro; Miwa, Hiroyoshi; Nagata, Noriko
2011-01-01
Musical performance requires motor skills to coordinate the movements of multiple joints in the hand and arm over a wide range of tempi. However, it is unclear whether the coordination of movement across joints would differ for musicians with different skill levels and how inter-joint coordination would vary in relation to music tempo. The present study addresses these issues by examining the kinematics and muscular activity of the hand and arm movements of professional and amateur pianists who strike two keys alternately with the thumb and little finger at various tempi. The professionals produced a smaller flexion velocity at the thumb and little finger and greater elbow pronation and supination velocity than did the amateurs. The experts also showed smaller extension angles at the metacarpo-phalangeal joint of the index and middle fingers, which were not being used to strike the keys. Furthermore, muscular activity in the extrinsic finger muscles was smaller for the experts than for the amateurs. These findings indicate that pianists with superior skill reduce the finger muscle load during keystrokes by taking advantage of differences in proximal joint motion and hand postural configuration. With an increase in tempo, the experts showed larger and smaller increases in elbow velocity and finger muscle co-activation, respectively, compared to the amateurs, highlighting skill level-dependent differences in movement strategies for tempo adjustment. Finally, when striking as fast as possible, individual differences in the striking tempo among players were explained by their elbow velocities but not by their digit velocities. These findings suggest that pianists who are capable of faster keystrokes benefit more from proximal joint motion than do pianists who are not capable of faster keystrokes. The distinct movement strategy for tempo adjustment in pianists with superior skill would therefore ensure a wider range of musical expression. PMID:21660290
Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo
2012-12-01
The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.
Authentication and Key Establishment in Dynamic Wireless Sensor Networks
Qiu, Ying; Zhou, Jianying; Baek, Joonsang; Lopez, Javier
2010-01-01
When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing. In order to provide a high level of security in this environment, the moving sensor node needs to be authenticated to new neighboring nodes and a key established for secure communication. The paper proposes an efficient and scalable protocol to establish and update the authentication key in a dynamic wireless sensor network environment. The protocol guarantees that two sensor nodes share at least one key with probability 1 (100%) with less memory and energy cost, while not causing considerable communication overhead. PMID:22319321
ERIC Educational Resources Information Center
Vollan, Clayton J.
A study was devised to determine whether, if color is found superior to black-and-white for communicating dynamic picture content, that superiority can be attributed to the realism of authentic color, or whether that superiority is the effect of the simple presence of color. A sample of 90 sixth grade students were shown slides, half of which…
... tech system – Paper and pencil High-tech system – Computer program that produces voice output at keystroke Oral ... for Aphasia Actions Speak as Loud as Words Computers & Language Rehab From Singing to Speaking When the ...
Workplace Ergonomics Reference Guide
... between use of keyboard and mouse (use keystroke equivalents to mouse). Change your posture frequently throughout the ... walls should be removed. The carpeting should be non-absorbent in warm, dark colors without padding or ...
Finger-specific loss of independent control of movements in musicians with focal dystonia.
Furuya, S; Altenmüller, E
2013-09-05
The loss of independent control of finger movements impairs the dexterous use of the hand. Focal hand dystonia is characterised by abnormal structural and functional changes at the cortical and subcortical regions responsible for individuated finger movements and by the loss of surround inhibition in the finger muscles. However, little is known about the pathophysiological impact of focal dystonia on the independent control of finger movements. Here we addressed this issue by asking pianists with and without focal dystonia to repetitively strike a piano key with one of the four fingers as fast as possible while the remaining digits kept the adjacent keys depressed. Using principal component analysis and cluster analysis to the derived keystroke data, we successfully classified pianists according to the presence or absence of dystonic symptoms with classification rates and cross-validation scores of approximately 90%. This confirmed the effects of focal dystonia on the individuated finger movements. Interestingly, the movement features that contributed to successful classification differed across fingers. Compared to healthy pianists, pianists with an affected index finger were characterised predominantly by stronger keystrokes, whereas pianists with affected middle or ring fingers exhibited abnormal temporal control of the keystrokes, such as slowness and rhythmic inconsistency. The selective alternation of the movement features indicates a finger-specific loss of the independent control of finger movements in focal dystonia of musicians. Copyright © 2013 IBRO. Published by Elsevier Ltd. All rights reserved.
Skilful force control in expert pianists.
Oku, Takanori; Furuya, Shinichi
2017-05-01
Dexterous object manipulation in skilful behaviours such as surgery, craft making, and musical performance involves fast, precise, and efficient control of force with the fingers. A challenge in playing musical instruments is the requirement of independent control of the magnitude and rate of force production, which typically vary in relation to loudness and tempo. However, it is unknown how expert musicians skilfully control finger force to elicit tones with a wide range of loudness and tempi. Here, we addressed this issue by comparing the variation of spatiotemporal characteristics of force during repetitive and simultaneous piano keystrokes in relation to the loudness and tempo between pianists and musically untrained individuals. While the peak key-descending velocity varied with loudness but not with tempo in both groups, the peak and impulse of the key-depressing force were smaller in pianists than in the non-musicians, specifically when eliciting loud tones, suggesting superior energetic efficiency in the trained individuals. The key-depressing force was more consistent across strikes in pianists than in the non-musicians at all loudness levels but only at slow tempi, confirming expertise-dependency of precise force control. A regression analysis demonstrated that individual differences in the keystroke rates when playing at the fastest tempo across the trained pianists were negatively associated with the force impulse during the key depression but not with the peak force only at the loudest tone. This suggests that rapid reductions of force following the key depression plays a role in considerably fast performance of repetitive piano keystrokes.
Hand kinematics of piano playing
Flanders, Martha; Soechting, John F.
2011-01-01
Dexterous use of the hand represents a sophisticated sensorimotor function. In behaviors such as playing the piano, it can involve strong temporal and spatial constraints. The purpose of this study was to determine fundamental patterns of covariation of motion across joints and digits of the human hand. Joint motion was recorded while 5 expert pianists played 30 excerpts from musical pieces, which featured ∼50 different tone sequences and fingering. Principal component analysis and cluster analysis using an expectation-maximization algorithm revealed that joint velocities could be categorized into several patterns, which help to simplify the description of the movements of the multiple degrees of freedom of the hand. For the thumb keystroke, two distinct patterns of joint movement covariation emerged and they depended on the spatiotemporal patterns of the task. For example, the thumb-under maneuver was clearly separated into two clusters based on the direction of hand translation along the keyboard. While the pattern of the thumb joint velocities differed between these clusters, the motions at the metacarpo-phalangeal and proximal-phalangeal joints of the four fingers were more consistent. For a keystroke executed with one of the fingers, there were three distinct patterns of joint rotations, across which motion at the striking finger was fairly consistent, but motion of the other fingers was more variable. Furthermore, the amount of movement spillover of the striking finger to the adjacent fingers was small irrespective of the finger used for the keystroke. These findings describe an unparalleled amount of independent motion of the fingers. PMID:21880938
Screen Fingerprints as a Novel Modality for Active Authentication
2014-03-01
and mouse dynamics [9]. Some other examples of the computational behavior metrics of the cognitive fingerprint include eye tracking, how Approved...SCREEN FINGERPRINTS AS A NOVEL MODALITY FOR ACTIVE AUTHENTICATION UNIVERSITY OF MARYLAND MARCH 2014 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC...COVERED (From - To) MAY 2012 – OCT 2013 4. TITLE AND SUBTITLE SCREEN FINGERPRINTS AS A NOVEL MODALITY FOR ACTIVE AUTHENTICATION 5a. CONTRACT
Spreadsheet Works: Graphing Functions on a Spreadsheet.
ERIC Educational Resources Information Center
Ramamurthi, V. S.
1989-01-01
Explains graphing functions when using LOTUS 1-2-3. Provides examples and explains keystroke entries needed to make the graphs. Notes up to six functions can be displayed on the same set of axes. (MVL)
still trust the computer from which you are making the access. Keystroke logging is the most direct way of getting login information and encryption does not protect you from it. If you don't trust the
Android Based Behavioral Biometric Authentication via Multi-Modal Fusion
2014-06-12
such as the way he or she uses the mouse, or interacts with the Graphical User Interface (GUI) [9]. Described simply, standard biometrics is determined...as a login screen on a standard computer. Active authentication is authentication that occurs dynamically throughout interaction with the device. A...because they are higher level constructs in themselves. The Android framework was specifically used for capturing the multitouch gestures: pinch and zoom
Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming
2015-11-30
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost.
A Lightweight Continuous Authentication Protocol for the Internet of Things.
Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-04-05
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.
Prediction of destination entry and retrieval times using keystroke-level models
DOT National Transportation Integrated Search
1998-04-01
Thirty-six drivers entered and retrieved destinations using an Ali-Scout navigation computer. Retrieval involved keying in part of the destination name, scrolling through a list of names, or a combination of those methods. Entry required keying in th...
Predictive error detection in pianists: a combined ERP and motion capture study
Maidhof, Clemens; Pitkäniemi, Anni; Tervaniemi, Mari
2013-01-01
Performing a piece of music involves the interplay of several cognitive and motor processes and requires extensive training to achieve a high skill level. However, even professional musicians commit errors occasionally. Previous event-related potential (ERP) studies have investigated the neurophysiological correlates of pitch errors during piano performance, and reported pre-error negativity already occurring approximately 70–100 ms before the error had been committed and audible. It was assumed that this pre-error negativity reflects predictive control processes that compare predicted consequences with actual consequences of one's own actions. However, in previous investigations, correct and incorrect pitch events were confounded by their different tempi. In addition, no data about the underlying movements were available. In the present study, we exploratively recorded the ERPs and 3D movement data of pianists' fingers simultaneously while they performed fingering exercises from memory. Results showed a pre-error negativity for incorrect keystrokes when both correct and incorrect keystrokes were performed with comparable tempi. Interestingly, even correct notes immediately preceding erroneous keystrokes elicited a very similar negativity. In addition, we explored the possibility of computing ERPs time-locked to a kinematic landmark in the finger motion trajectories defined by when a finger makes initial contact with the key surface, that is, at the onset of tactile feedback. Results suggest that incorrect notes elicited a small difference after the onset of tactile feedback, whereas correct notes preceding incorrect ones elicited negativity before the onset of tactile feedback. The results tentatively suggest that tactile feedback plays an important role in error-monitoring during piano performance, because the comparison between predicted and actual sensory (tactile) feedback may provide the information necessary for the detection of an upcoming error. PMID:24133428
Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming
2015-01-01
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost. PMID:26633396
Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae
2014-01-01
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications. PMID:24521942
Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae
2014-02-11
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications.
Warning: This keyboard will deconstruct--the role of the keyboard in skilled typewriting.
Crump, Matthew J C; Logan, Gordon D
2010-06-01
Skilled actions are commonly assumed to be controlled by precise internal schemas or cognitive maps. We challenge these ideas in the context of skilled typing, where prominent theories assume that typing is controlled by a well-learned cognitive map that plans finger movements without feedback. In two experiments, we demonstrate that online physical interaction with the keyboard critically mediates typing skill. Typists performed single-word and paragraph typing tasks on a regular keyboard, a laser-projection keyboard, and two deconstructed keyboards, made by removing successive layers of a regular keyboard. Averaged over the laser and deconstructed keyboards, response times for the first keystroke increased by 37%, the interval between keystrokes increased by 120%, and error rate increased by 177%, relative to those of the regular keyboard. A schema view predicts no influence of external motor feedback, because actions could be planned internally with high precision. We argue that the expert knowledge mediating action control emerges during online interaction with the physical environment.
Asker-Arnason, Lena; Wengelin, Asa; Sahlén, Birgitta
2008-01-01
Twenty-seven children, with typical language development (TLD), 8-10 years old and 10-12 years old, were assessed with keystroke-logging in order to investigate their narrative writing. Measures of the writing process and the written product were used. One purpose was to explore how children produce written narratives in on-line production, and to relate the writing process to the written product. The results showed that those children who produced the final text faster, also wrote stories that comprised of more words. In the group of older children, children with better narrative ability used less pause time than those with worse ability, and the girls were faster writers than the boys. We believe that keystroke-logging gives valuable information for the assessment of young children's writing and that it is a potentially valid assessment tool for children from about 10 years of age.
The Perception and Mimicry of Facial Movements Predict Judgments of Smile Authenticity
Korb, Sebastian; With, Stéphane; Niedenthal, Paula; Kaiser, Susanne; Grandjean, Didier
2014-01-01
The mechanisms through which people perceive different types of smiles and judge their authenticity remain unclear. Here, 19 different types of smiles were created based on the Facial Action Coding System (FACS), using highly controlled, dynamic avatar faces. Participants observed short videos of smiles while their facial mimicry was measured with electromyography (EMG) over four facial muscles. Smile authenticity was judged after each trial. Avatar attractiveness was judged once in response to each avatar’s neutral face. Results suggest that, in contrast to most earlier work using static pictures as stimuli, participants relied less on the Duchenne marker (the presence of crow’s feet wrinkles around the eyes) in their judgments of authenticity. Furthermore, mimicry of smiles occurred in the Zygomaticus Major, Orbicularis Oculi, and Corrugator muscles. Consistent with theories of embodied cognition, activity in these muscles predicted authenticity judgments, suggesting that facial mimicry influences the perception of smiles. However, no significant mediation effect of facial mimicry was found. Avatar attractiveness did not predict authenticity judgments or mimicry patterns. PMID:24918939
A Lightweight Continuous Authentication Protocol for the Internet of Things
Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-01-01
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168
The Effect of Age and Task Difficulty
ERIC Educational Resources Information Center
Mallo, Jason; Nordstrom, Cynthia R.; Bartels, Lynn K.; Traxler, Anthony
2007-01-01
Electronic Performance Monitoring (EPM) is a common technique used to record employee performance. EPM may include counting computer keystrokes, monitoring employees' phone calls or internet activity, or documenting time spent on work activities. Despite EPM's prevalence, no studies have examined how this management tool affects older workers--a…
1985-06-10
flowcharts - hierarchical charts - data flow diagrams - finite state diagrams - control flow diagrams - decision tables/trees - entity-relationship...and beginners ; for example, is prompting via menus provided for beginners and single keystroke capability provided for experienced users? 2-13 - input
ERIC Educational Resources Information Center
Blinn, Charles R.; And Others
A project undertaken at the University of Minnesota evaluated two microcomputer teletraining systems (audiographic conferencing) to determine the effectiveness of this technology for point-to-point and multipoint distance education. System design requirements included broadcast keystrokes, error checking, master-slave linkages, simultaneous voice…
Security analysis and enhanced user authentication in proxy mobile IPv6 networks.
Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho
2017-01-01
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.
Disfluency effects on lexical selection.
Medimorec, Srdan; Young, Torin P; Risko, Evan F
2017-01-01
Recent research has suggested that introducing a disfluency in the context of written composition (i.e., typing with one hand) can increase lexical sophistication. In the current study, we provide a strong test between two accounts of this phenomenon, one that attributes it to the delay caused by the disfluency and one that attributes it to the disruption of typical finger-to-letter mappings caused by the disfluency. To test between these accounts, we slowed down participants' typewriting by introducing a small delay between keystrokes while individuals wrote essays. Critically, this manipulation did not disrupt typical finger-to-letter mappings. Consistent with the delay-based account, our results demonstrate that the essays written in this less fluent condition were more lexically diverse and used less frequent words. Implications for the temporal dynamics of lexical selection in complex cognitive tasks are discussed. Copyright © 2016 Elsevier B.V. All rights reserved.
Using Real-Life Experiences to Teach Computer Concepts
ERIC Educational Resources Information Center
Read, Alexis
2012-01-01
Teaching computer concepts to individuals with visual impairments (that is, those who are blind or visually impaired) presents some unique challenges. Students often have difficulty remembering to perform certain steps or have difficulty remembering specific keystrokes when using computers. Many cannot visualize the way in which complex computing…
Different Keystrokes for Different Folks: Addressing Learning Styles in Online Education
ERIC Educational Resources Information Center
Pinchot, Jamie; Paullet, Karen
2014-01-01
Online learning has become increasingly popular in recent years. This interest in online education has brought about new learning opportunities for both educators and learners. Technology has enabled higher education institutions the ability to provide quality education reaching learners that might otherwise be impossible. When developing online…
A Routing Path Construction Method for Key Dissemination Messages in Sensor Networks
Moon, Soo Young; Cho, Tae Ho
2014-01-01
Authentication is an important security mechanism for detecting forged messages in a sensor network. Each cluster head (CH) in dynamic key distribution schemes forwards a key dissemination message that contains encrypted authentication keys within its cluster to next-hop nodes for the purpose of authentication. The forwarding path of the key dissemination message strongly affects the number of nodes to which the authentication keys in the message are actually distributed. We propose a routing method for the key dissemination messages to increase the number of nodes that obtain the authentication keys. In the proposed method, each node selects next-hop nodes to which the key dissemination message will be forwarded based on secret key indexes, the distance to the sink node, and the energy consumption of its neighbor nodes. The experimental results show that the proposed method can increase by 50–70% the number of nodes to which authentication keys in each cluster are distributed compared to geographic and energy-aware routing (GEAR). In addition, the proposed method can detect false reports earlier by using the distributed authentication keys, and it consumes less energy than GEAR when the false traffic ratio (FTR) is ≥10%. PMID:25136649
Identification of a Smartphone User via Keystroke Analysis
2014-03-01
Participation for the study was solicited via email to students and faculty of the Computer Science Department and Cyber Academic Group at the Naval...taken a monumental effort, but some of our team members are on the verge of burnout . I believe a short break would work wonders for our technical team
Using Keystroke Analytics to Improve Pass-Fail Classifiers
ERIC Educational Resources Information Center
Casey, Kevin
2017-01-01
Learning analytics offers insights into student behaviour and the potential to detect poor performers before they fail exams. If the activity is primarily online (for example computer programming), a wealth of low-level data can be made available that allows unprecedented accuracy in predicting which students will pass or fail. In this paper, we…
Mixed Methods for Mixed Reality: Understanding Users' Avatar Activities in Virtual Worlds
ERIC Educational Resources Information Center
Feldon, David F.; Kafai, Yasmin B.
2008-01-01
This paper examines the use of mixed methods for analyzing users' avatar-related activities in a virtual world. Server logs recorded keystroke-level activity for 595 participants over a six-month period in Whyville.net, an informal science website. Participants also completed surveys and participated in interviews regarding their experiences.…
Yamaguchi, Motonori; Crump, Matthew J C; Logan, Gordon D
2013-06-01
Typing performance involves hierarchically structured control systems: At the higher level, an outer loop generates a word or a series of words to be typed; at the lower level, an inner loop activates the keystrokes comprising the word in parallel and executes them in the correct order. The present experiments examined contributions of the outer- and inner-loop processes to the control of speed and accuracy in typewriting. Experiments 1 and 2 involved discontinuous typing of single words, and Experiments 3 and 4 involved continuous typing of paragraphs. Across experiments, typists were able to trade speed for accuracy but were unable to type at rates faster than 100 ms/keystroke, implying limits to the flexibility of the underlying processes. The analyses of the component latencies and errors indicated that the majority of the trade-offs were due to inner-loop processing. The contribution of outer-loop processing to the trade-offs was small, but it resulted in large costs in error rate. Implications for strategic control of automatic processes are discussed. (PsycINFO Database Record (c) 2013 APA, all rights reserved).
ERIC Educational Resources Information Center
Chinn, Pauline W. U.
2009-01-01
This response draws from the literature on adaptive learning, traditional ecological knowledge, and social-ecological systems to show that Brad's choice is not a simple decision between traditional ecological knowledge and authentic science. This perspective recognizes knowledge systems as dynamic, cultural and historical activities characterized…
Security analysis and enhanced user authentication in proxy mobile IPv6 networks
Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick
2017-01-01
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN’s identity, password and session key. In this paper, we analyze Alizadeh et al.’s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key. PMID:28719621
van Vugt, Floris T.; Tillmann, Barbara
2014-01-01
The human brain is able to predict the sensory effects of its actions. But how precise are these predictions? The present research proposes a tool to measure thresholds between a simple action (keystroke) and a resulting sound. On each trial, participants were required to press a key. Upon each keystroke, a woodblock sound was presented. In some trials, the sound came immediately with the downward keystroke; at other times, it was delayed by a varying amount of time. Participants were asked to verbally report whether the sound came immediately or was delayed. Participants' delay detection thresholds (in msec) were measured with a staircase-like procedure. We hypothesised that musicians would have a lower threshold than non-musicians. Comparing pianists and brass players, we furthermore hypothesised that, as a result of a sharper attack of the timbre of their instrument, pianists might have lower thresholds than brass players. Our results show that non-musicians exhibited higher thresholds for delay detection (180±104 ms) than the two groups of musicians (102±65 ms), but there were no differences between pianists and brass players. The variance in delay detection thresholds could be explained by variance in sensorimotor synchronisation capacities as well as variance in a purely auditory temporal irregularity detection measure. This suggests that the brain's capacity to generate temporal predictions of sensory consequences can be decomposed into general temporal prediction capacities together with auditory-motor coupling. These findings indicate that the brain has a relatively large window of integration within which an action and its resulting effect are judged as simultaneous. Furthermore, musical expertise may narrow this window down, potentially due to a more refined temporal prediction. This novel paradigm provides a simple test to estimate the temporal precision of auditory-motor action-effect coupling, and the paradigm can readily be incorporated in studies investigating both healthy and patient populations. PMID:24498299
Robust anonymous authentication scheme for telecare medical information systems.
Xie, Qi; Zhang, Jun; Dong, Na
2013-04-01
Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.
Writing in Dyslexia: Product and Process
ERIC Educational Resources Information Center
Morken, Froydis; Helland, Turid
2013-01-01
Research on dyslexia has largely centred on reading. The aim of this study was to assess the writing of 13 children with and 28 without dyslexia at age 11?years. A programme for keystroke logging was used to allow recording of typing activity as the children performed a sentence dictation task. Five sentences were read aloud twice each. The task…
ERIC Educational Resources Information Center
Gnach, Aleksandra; Wiesner, Esther; Bertschi-Kaufmann, Andrea; Perrin, Daniel
2007-01-01
Children and young people are increasingly performing a variety of writing tasks using computers, with word processing programs thus becoming their natural writing environment. The development of keystroke logging programs enables us to track the process of writing, without changing the writing environment for the writers. In the myMoment schools…
Development of a Prototype Detailing Management System for the Civil Engineer Corps
2002-09-01
73 Figure 30. Associate Members To Billets SQL Statement...American Standard Code for Information Interchange EMPRS Electronic Military Personnel Record System VBA Visual Basic for Applications SDLC...capturing keystrokes or carrying out a series of actions when opening an Access database. In the place of macros, VBA should be used because of its
ERIC Educational Resources Information Center
Wu, Will F. W.; Magill, Richard A.
2011-01-01
For this study, we investigated the effects of self-controlled practice on learning multiple motor skills. Thirty participants were randomly assigned to self-control or yoked conditions. Participants learned a three-keystroke pattern with three different relative time structures. Those in the self-control group chose one of three relative time…
Examining Online College Cyber Cheating Methods and Prevention Measures
ERIC Educational Resources Information Center
Moten, James, Jr.; Fitterer, Alex; Brazier, Elise; Leonard, Jonathan; Brown, Avis
2013-01-01
Academic dishonesty in the online cheating environment of distance education learning has gained traction in the past decade. By a few simple keystrokes, students' can find a wide array of online services for hire to write research papers, complete homework assignments, or enroll on behalf of the student on record to take the entire online…
ERIC Educational Resources Information Center
Baildon, Mark; Damico, James
2011-01-01
The "elaborate systems of communication" that historian Christopher Lasch observed nearly three decades ago have intensified in complexity and scope. The explosion of the Internet and wireless technologies has resulted in a dizzying proliferation of texts. Teachers and students are but a keystroke or mouse click away from a limitless stream of…
Lavan, Nadine; McGettigan, Carolyn
2017-10-01
We present an investigation of the perception of authenticity in audiovisual laughter, in which we contrast spontaneous and volitional samples and examine the contributions of unimodal affective information to multimodal percepts. In a pilot study, we demonstrate that listeners perceive spontaneous laughs as more authentic than volitional ones, both in unimodal (audio-only, visual-only) and multimodal contexts (audiovisual). In the main experiment, we show that the discriminability of volitional and spontaneous laughter is enhanced for multimodal laughter. Analyses of relationships between affective ratings and the perception of authenticity show that, while both unimodal percepts significantly predict evaluations of audiovisual laughter, it is auditory affective cues that have the greater influence on multimodal percepts. We discuss differences and potential mismatches in emotion signalling through voices and faces, in the context of spontaneous and volitional behaviour, and highlight issues that should be addressed in future studies of dynamic multimodal emotion processing.
Addressing the Tension Between Strong Perimeter Control an Usability
NASA Technical Reports Server (NTRS)
Hinke, Thomas H.; Kolano, Paul Z.; Keller, Chris
2006-01-01
This paper describes a strong perimeter control system for a general purpose processing system, with the perimeter control system taking significant steps to address usability issues, thus mitigating the tension between strong perimeter protection and usability. A secure front end enforces two-factor authentication for all interactive access to an enclave that contains a large supercomputer and various associated systems, with each requiring their own authentication. Usability is addressed through a design in which the user has to perform two-factor authentication at the secure front end in order to gain access to the enclave, while an agent transparently performs public key authentication as needed to authenticate to specific systems within the enclave. The paper then describes a proxy system that allows users to transfer files into the enclave under script control, when the user is not present to perform two-factor authentication. This uses a pre-authorization approach based on public key technology, which is still strongly tied to both two-factor authentication and strict control over where files can be transferred on the target system. Finally the paper describes an approach to support network applications and systems such as grids or parallel file transfer protocols that require the use of many ports through the perimeter. The paper describes a least privilege approach that dynamically opens ports on a host-specific, if-authorized, as-needed, just-in-time basis.
Park, YoHan; Park, YoungHo
2016-12-14
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.
A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks
Wang, Qiuhua
2017-01-01
Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate. PMID:28165423
Park, YoHan; Park, YoungHo
2016-01-01
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment. PMID:27983616
A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.
Wang, Qiuhua
2017-02-04
Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.
ERIC Educational Resources Information Center
Yamaguchi, Motonori; Crump, Matthew J. C.; Logan, Gordon D.
2013-01-01
Typing performance involves hierarchically structured control systems: At the higher level, an outer loop generates a word or a series of words to be typed; at the lower level, an inner loop activates the keystrokes comprising the word in parallel and executes them in the correct order. The present experiments examined contributions of the outer-…
Does Learning a Complex Task Have To Be Complex?: A Study in Learning Decomposition.
ERIC Educational Resources Information Center
Lee, Frank J.; Anderson, John R.
2001-01-01
Decomposed the learning in the Kanfer-Ackerman Air-Traffic Controller Task (P. Ackerman, 1988) down to learning at the keyboard level. Reanalyzed the Ackerman data to show that learning in this complex task reflects learning at the keystroke level. Conducted an eye-tracking experiment with 10 adults that showed that learning at the key stroke…
Personality identified self-powering keyboard
Wang, Zhong Lin; Zhu, Guang; Chen, Jun
2018-02-06
A keyboard for converting keystrokes into electrical signals is disclosed. The keyboard includes a plurality of keys. At least one of the keys includes two electrodes and a member that generates triboelectric charges upon skin contact. The member is adjacent to one of the electrodes to affect a flow of electrons between the two electrodes when a distance between the member and the skin varies.
ERIC Educational Resources Information Center
Vizer, Lisa Michele
2013-01-01
Systems that can detect cognitive decline or harmful levels of stress could assist users in managing their stress and health. However, current assessments are often obtrusive or require specialized equipment, and not suited to continuous monitoring of cognitive status. This research leverages attributes of everyday keyboard interactions to…
Piano training in youths with hand motor impairments after damage to the developing brain
Lampe, Renée; Thienel, Anna; Mitternacht, Jürgen; Blumenstein, Tobias; Turova, Varvara; Alves-Pinto, Ana
2015-01-01
Damage to the developing brain may lead to impairment of the hand motor function and negatively impact on patients’ quality of life. Development of manual dexterity and finger and hand motor function may be promoted by learning to play the piano. The latter brings together music with the intensive training of hand coordination and fine finger mobility. We investigated if learning to play the piano helped to improve hand motor skills in 18 youths with hand motor disorders resulting from damage during early brain development. Participants trained 35–40 minutes twice a week for 18 months with a professional piano teacher. With the use of a Musical Instrument Digital Interface piano, the uniformity of finger strokes could be objectively assessed from the timing of keystrokes. The analysis showed a significant improvement in the uniformity of keystrokes during the training. Furthermore, the youths showed strong motivation and engagement during the study. This is nevertheless an open study, and further studies remain needed to exclude effects of growth and concomitant therapies on the improvements observed and clarify which patients will more likely benefit from learning to play the piano. PMID:26345312
Piano training in youths with hand motor impairments after damage to the developing brain.
Lampe, Renée; Thienel, Anna; Mitternacht, Jürgen; Blumenstein, Tobias; Turova, Varvara; Alves-Pinto, Ana
2015-01-01
Damage to the developing brain may lead to impairment of the hand motor function and negatively impact on patients' quality of life. Development of manual dexterity and finger and hand motor function may be promoted by learning to play the piano. The latter brings together music with the intensive training of hand coordination and fine finger mobility. We investigated if learning to play the piano helped to improve hand motor skills in 18 youths with hand motor disorders resulting from damage during early brain development. Participants trained 35-40 minutes twice a week for 18 months with a professional piano teacher. With the use of a Musical Instrument Digital Interface piano, the uniformity of finger strokes could be objectively assessed from the timing of keystrokes. The analysis showed a significant improvement in the uniformity of keystrokes during the training. Furthermore, the youths showed strong motivation and engagement during the study. This is nevertheless an open study, and further studies remain needed to exclude effects of growth and concomitant therapies on the improvements observed and clarify which patients will more likely benefit from learning to play the piano.
Losing dexterity: patterns of impaired coordination of finger movements in musician’s dystonia
Furuya, Shinichi; Tominaga, Kenta; Miyazaki, Fumio; Altenmüller, Eckart
2015-01-01
Extensive training can bring about highly-skilled action, but may also impair motor dexterity by producing involuntary movements and muscular cramping, as seen in focal dystonia (FD) and tremor. To elucidate the underlying neuroplastic mechanisms of FD, the present study addressed the organization of finger movements during piano performance in pianists suffering from the condition. Principal component (PC) analysis identified three patterns of fundamental joint coordination constituting finger movements in both patients and controls. The first two coordination patterns described less individuated movements between the “dystonic” finger and key-striking fingers for patients compared to controls. The third coordination pattern, representing the individuation of movements between the middle and ring fingers, was evident during a sequence of strikes with these fingers in controls, which was absent in the patients. Consequently, rhythmic variability of keystrokes was more pronounced during this sequence of strikes for the patients. A stepwise multiple-regression analysis further identified greater variability of keystrokes for individuals displaying less individuated movements between the affected and striking fingers. The findings suggest that FD alters dexterous joint coordination so as to lower independent control of finger movements, and thereby degrades fine motor control. PMID:26289433
ERIC Educational Resources Information Center
Zhang, Mo; Deane, Paul
2015-01-01
In educational measurement contexts, essays have been evaluated and formative feedback has been given based on the end product. In this study, we used a large sample collected from middle school students in the United States to investigate the factor structure of the writing process features gathered from keystroke logs and the association of that…
The 24/7 Professor--What to Do When Home Is Just Another Word for the Office
ERIC Educational Resources Information Center
Fogg, Piper
2008-01-01
Technology has revolutionized the way professors work. With just a few keystrokes, they can gain access to vast library collections online. They can collaborate with peers halfway around the globe. They can read e-mail at home in their pajamas or at a research site thousands of miles away. The convenience of being able to work virtually anywhere…
Development and optimization of an efficient qPCR system for olive authentication in edible oils.
Alonso-Rebollo, Alba; Ramos-Gómez, Sonia; Busto, María D; Ortega, Natividad
2017-10-01
The applicability of qPCR in olive-oil authentication depends on the DNA obtained from the oils and the amplification primers. Therefore, four olive-specific amplification systems based on the trnL gene were designed (A-, B-, C- and D-trnL systems). The qPCR conditions, primer concentration and annealing temperature, were optimized. The systems were tested for efficiency and sensitivity to select the most suitable for olive oil authentication. The selected system (D-trnL) demonstrated specificity toward olive in contrast to other oleaginous species (canola, soybean, sunflower, maize, peanut and coconut) and showed high sensitivity in a broad linear dynamic range (LOD and LOQ: 500ng - 0.0625pg). This qPCR system enabled detection, with high sensitivity and specificity, of olive DNA isolated from oils processed in different ways, establishing it as an efficient method for the authentication of olive oil regardless of its category. Copyright © 2017 Elsevier Ltd. All rights reserved.
On Location Learning: Authentic Applied Science with Networked Augmented Realities
NASA Astrophysics Data System (ADS)
Rosenbaum, Eric; Klopfer, Eric; Perry, Judy
2007-02-01
The learning of science can be made more like the practice of science through authentic simulated experiences. We have created a networked handheld Augmented Reality environment that combines the authentic role-playing of Augmented Realities and the underlying models of Participatory Simulations. This game, known as Outbreak @ The Institute, is played across a university campus where players take on the roles of doctors, medical technicians, and public health experts to contain a disease outbreak. Players can interact with virtual characters and employ virtual diagnostic tests and medicines. They are challenged to identify the source and prevent the spread of an infectious disease that can spread among real and/or virtual characters according to an underlying model. In this paper, we report on data from three high school classes who played the game. We investigate students' perception of the authenticity of the game in terms of their personal embodiment in the game, their experience playing different roles, and their understanding of the dynamic model underlying the game.
Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles
Xu, Wenyu; Zhang, Jing; Xu, Yan; Liu, Lu
2018-01-01
The Internet of Vehicles (IoV) plays an important role in smart transportation to reduce the drivers’s risk of having an accident and help them manage small emergencies. Therefore, security and privacy issues of the message in the tamper proof device (TPD) broadcasted to other vehicles and roadside units (RSUs) have become an important research subject in the field of smart transportation. Many authentication schemes are proposed to tackle the challenges above and most of them are heavy in computation and communication. In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. Because of not using bilinear pairing, our scheme yields a better performance in terms of computation overhead and communication overhead, and is more suitable to be applied in the Internet of Vehicles. PMID:29735941
Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles.
Cui, Jie; Xu, Wenyu; Zhong, Hong; Zhang, Jing; Xu, Yan; Liu, Lu
2018-05-07
The Internet of Vehicles (IoV) plays an important role in smart transportation to reduce the drivers’s risk of having an accident and help them manage small emergencies. Therefore, security and privacy issues of the message in the tamper proof device (TPD) broadcasted to other vehicles and roadside units (RSUs) have become an important research subject in the field of smart transportation. Many authentication schemes are proposed to tackle the challenges above and most of them are heavy in computation and communication. In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. Because of not using bilinear pairing, our scheme yields a better performance in terms of computation overhead and communication overhead, and is more suitable to be applied in the Internet of Vehicles.
Huang, Qinlong; Yang, Yixian; Shi, Yuxiang
2018-02-24
With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.
Yang, Yixian; Shi, Yuxiang
2018-01-01
With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC. PMID:29495269
Advances in high-resolution mass spectrometry based on metabolomics studies for food--a review.
Rubert, Josep; Zachariasova, Milena; Hajslova, Jana
2015-01-01
Food authenticity becomes a necessity for global food policies, since food placed in the market without fail has to be authentic. It has always been a challenge, since in the past minor components, called also markers, have been mainly monitored by chromatographic methods in order to authenticate the food. Nevertheless, nowadays, advanced analytical methods have allowed food fingerprints to be achieved. At the same time they have been also combined with chemometrics, which uses statistical methods in order to verify food and to provide maximum information by analysing chemical data. These sophisticated methods based on different separation techniques or stand alone have been recently coupled to high-resolution mass spectrometry (HRMS) in order to verify the authenticity of food. The new generation of HRMS detectors have experienced significant advances in resolving power, sensitivity, robustness, extended dynamic range, easier mass calibration and tandem mass capabilities, making HRMS more attractive and useful to the food metabolomics community, therefore becoming a reliable tool for food authenticity. The purpose of this review is to summarise and describe the most recent metabolomics approaches in the area of food metabolomics, and to discuss the strengths and drawbacks of the HRMS analytical platforms combined with chemometrics.
Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo
2017-12-03
The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.
SegAuth: A Segment-based Approach to Behavioral Biometric Authentication
Li, Yanyan; Xie, Mengjun; Bian, Jiang
2016-01-01
Many studies have been conducted to apply behavioral biometric authentication on/with mobile devices and they have shown promising results. However, the concern about the verification accuracy of behavioral biometrics is still common given the dynamic nature of behavioral biometrics. In this paper, we address the accuracy concern from a new perspective—behavior segments, that is, segments of a gesture instead of the whole gesture as the basic building block for behavioral biometric authentication. With this unique perspective, we propose a new behavioral biometric authentication method called SegAuth, which can be applied to various gesture or motion based authentication scenarios. SegAuth can achieve high accuracy by focusing on each user’s distinctive gesture segments that frequently appear across his or her gestures. In SegAuth, a time series derived from a gesture/motion is first partitioned into segments and then transformed into a set of string tokens in which the tokens representing distinctive, repetitive segments are associated with higher genuine probabilities than those tokens that are common across users. An overall genuine score calculated from all the tokens derived from a gesture is used to determine the user’s authenticity. We have assessed the effectiveness of SegAuth using 4 different datasets. Our experimental results demonstrate that SegAuth can achieve higher accuracy consistently than existing popular methods on the evaluation datasets. PMID:28573214
SegAuth: A Segment-based Approach to Behavioral Biometric Authentication.
Li, Yanyan; Xie, Mengjun; Bian, Jiang
2016-10-01
Many studies have been conducted to apply behavioral biometric authentication on/with mobile devices and they have shown promising results. However, the concern about the verification accuracy of behavioral biometrics is still common given the dynamic nature of behavioral biometrics. In this paper, we address the accuracy concern from a new perspective-behavior segments, that is, segments of a gesture instead of the whole gesture as the basic building block for behavioral biometric authentication. With this unique perspective, we propose a new behavioral biometric authentication method called SegAuth, which can be applied to various gesture or motion based authentication scenarios. SegAuth can achieve high accuracy by focusing on each user's distinctive gesture segments that frequently appear across his or her gestures. In SegAuth, a time series derived from a gesture/motion is first partitioned into segments and then transformed into a set of string tokens in which the tokens representing distinctive, repetitive segments are associated with higher genuine probabilities than those tokens that are common across users. An overall genuine score calculated from all the tokens derived from a gesture is used to determine the user's authenticity. We have assessed the effectiveness of SegAuth using 4 different datasets. Our experimental results demonstrate that SegAuth can achieve higher accuracy consistently than existing popular methods on the evaluation datasets.
A Framework to Integrate Public, Dynamic Metrics into an OER Platform
ERIC Educational Resources Information Center
Cohen, Jaclyn Zetta; Omollo, Kathleen Ludewig; Malicke, Dave
2014-01-01
The usage metrics for open educational resources (OER) are often either hidden behind an authentication system or shared intermittently in static, aggregated format at the repository level. This paper discusses the first year of University of Michigan's project to share its OER usage data dynamically, publicly, to synthesize it across different…
Dynamic Variables of Science Classroom Discourse in Relation to Teachers' Instructional Beliefs
ERIC Educational Resources Information Center
Kaya, Sibel
2014-01-01
The current study examines if the occurrence of dynamic variables namely, authentic questions, uptake, high-level evaluation and student questions in primary science classrooms vary by teachers' instructional beliefs. Twelve 4th grade teachers from two different schools volunteered to participate in the study. Data was collected through…
Radio frequency tags systems to initiate system processing
NASA Astrophysics Data System (ADS)
Madsen, Harold O.; Madsen, David W.
1994-09-01
This paper describes the automatic identification technology which has been installed at Applied Magnetic Corp. MR fab. World class manufacturing requires technology exploitation. This system combines (1) FluoroTrac cassette and operator tracking, (2) CELLworks cell controller software tools, and (3) Auto-Soft Inc. software integration services. The combined system eliminates operator keystrokes and errors during normal processing within a semiconductor fab. The methods and benefits of this system are described.
Iakovakis, Dimitrios; Hadjidimitriou, Stelios; Charisis, Vasileios; Bostantzopoulou, Sevasti; Katsarou, Zoe; Hadjileontiadis, Leontios J
2018-05-16
Parkinson's disease (PD) is a degenerative movement disorder causing progressive disability that severely affects patients' quality of life. While early treatment can produce significant benefits for patients, the mildness of many early signs combined with the lack of accessible high-frequency monitoring tools may delay clinical diagnosis. To meet this need, user interaction data from consumer technologies have recently been exploited towards unsupervised screening for PD symptoms in daily life. Similarly, this work proposes a method for detecting fine motor skills decline in early PD patients via analysis of patterns emerging from finger interaction with touchscreen smartphones during natural typing. Our approach relies on low-/higher-order statistical features of keystrokes timing and pressure variables, computed from short typing sessions. Features are fed into a two-stage multi-model classification pipeline that reaches a decision on the subject's status (PD patient/control) by gradually fusing prediction probabilities obtained for individual typing sessions and keystroke variables. This method achieved an AUC = 0.92 and 0.82/0.81 sensitivity/specificity (matched groups of 18 early PD patients/15 controls) with discriminant features plausibly correlating with clinical scores of relevant PD motor symptoms. These findings suggest an improvement over similar approaches, thereby constituting a further step towards unobtrusive early PD detection from routine activities.
Lee, Tian-Fu; Wang, Zeng-Bo
2017-01-01
The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions. PMID:29207509
NASA Astrophysics Data System (ADS)
Wegner, K.; Branch, B. D.; Smith, S. C.
2013-12-01
The Global Learning and Observations to Benefit the Environment (GLOBE) program is a worldwide hands-on, primary and secondary school-based science and education program (www.globe.gov). GLOBE's vision promotes and supports students, teachers and scientists to collaborate on inquiry-based authentic science investigations of the environment and the Earth system working in close partnership with NASA, NOAA and NSF Earth System Science Projects (ESSP's) in study and research about the dynamics of Earth's environment. GLOBE Partners conduct face-to-face Professional Development in more than 110 countries, providing authentic scientific research experience in five investigation areas: atmosphere, earth as a system, hydrology, land cover, and soil. This presentation will provide a sample for a new framework of Professional Development that was implemented in July 2013 at Purdue University lead by Mr. Steven Smith who has tested GLOBE training materials for future training. The presentation will demonstrate how institutions can provide educators authentic scientific research opportunities through various components, including: - Carrying out authentic research investigations - Learning how to enter their authentic research data into the GLOBE database and visualize it on the GLOBE website - Learn how to access to NASA's Earth System Science resources via GLOBE's new online 'e-Training Program' - Exploring the connections of their soil protocol measurements and the history of the soil in their area through iPad soils app - LIDAR data exposure, Hydrology data exposure
Dynamic sample size detection in learning command line sequence for continuous authentication.
Traore, Issa; Woungang, Isaac; Nakkabi, Youssef; Obaidat, Mohammad S; Ahmed, Ahmed Awad E; Khalilian, Bijan
2012-10-01
Continuous authentication (CA) consists of authenticating the user repetitively throughout a session with the goal of detecting and protecting against session hijacking attacks. While the accuracy of the detector is central to the success of CA, the detection delay or length of an individual authentication period is important as well since it is a measure of the window of vulnerability of the system. However, high accuracy and small detection delay are conflicting requirements that need to be balanced for optimum detection. In this paper, we propose the use of sequential sampling technique to achieve optimum detection by trading off adequately between detection delay and accuracy in the CA process. We illustrate our approach through CA based on user command line sequence and naïve Bayes classification scheme. Experimental evaluation using the Greenberg data set yields encouraging results consisting of a false acceptance rate (FAR) of 11.78% and a false rejection rate (FRR) of 1.33%, with an average command sequence length (i.e., detection delay) of 37 commands. When using the Schonlau (SEA) data set, we obtain FAR = 4.28% and FRR = 12%.
Lin, Han-Yu
2013-04-01
Telecare medical information systems (TMISs) are increasingly popular technologies for healthcare applications. Using TMISs, physicians and caregivers can monitor the vital signs of patients remotely. Since the database of TMISs stores patients' electronic medical records (EMRs), only authorized users should be granted the access to this information for the privacy concern. To keep the user anonymity, recently, Chen et al. proposed a dynamic ID-based authentication scheme for telecare medical information system. They claimed that their scheme is more secure and robust for use in a TMIS. However, we will demonstrate that their scheme fails to satisfy the user anonymity due to the dictionary attacks. It is also possible to derive a user password in case of smart card loss attacks. Additionally, an improved scheme eliminating these weaknesses is also presented.
Dynamic localization in optical and Zeeman lattices in the presence of spin-orbit coupling
NASA Astrophysics Data System (ADS)
Kartashov, Yaroslav V.; Konotop, Vladimir V.; Zezyulin, Dmitry A.; Torner, Lluis
2016-12-01
The dynamic localization of a two-level atom in a periodic potential under the action of spin-orbit coupling and a weak harmonically varying linear force is studied. We consider optical and Zeeman potentials that are either in phase or out of phase in two spinor components, respectively. The expectation value for the position of the atom after one oscillation period of the linear force is recovered in authentic resonances or in pseudoresonances. The frequencies of the linear force corresponding to authentic resonances are determined by the band structure of the periodic potential and are affected by the spin-orbit coupling. The width or dispersion of the wave packet in authentic resonances is usually minimal. The frequencies corresponding to pseudoresonances do not depend on the type of potential and on the strength of the spin-orbit coupling, while the evolution of excitations at the corresponding frequencies is usually accompanied by significant dispersion. Pseudoresonances are determined by the initial phase of the linear force and by the quasimomentum of the wave packet. Due to the spinor nature of the system, the motion of the atom is accompanied by periodic, but not harmonic, spin oscillations. Under the action of spin-orbit coupling the oscillations of the wave packet can be nearly completely suppressed in optical lattices. Dynamic localization in Zeeman lattices is characterized by doubling of the resonant oscillation periods due to band crossing at the boundary of the Brillouin zone. We also show that higher harmonics in the Fourier expansion of the energy band lead to effective dispersion, which can be strong enough to prevent dynamic localization of the Bloch wave packet.
BFT replication resistant to MAC attacks
NASA Astrophysics Data System (ADS)
Zbierski, Maciej
2016-09-01
Over the last decade numerous Byzantine fault-tolerant (BFT) replication protocols have been proposed in the literature. However, the vast majority of these solutions reuse the same authentication scheme, which makes them susceptible to a so called MAC attack. Such vulnerability enables malicious clients to undetectably prevent the replicated service from processing incoming client requests, and consequently making it permanently unavailable. While some BFT protocols attempted to address this issue by using different authentication mechanisms, they at the same time significantly degraded the performance achieved in correct environments. This article presents a novel adaptive authentication mechanism which can be combined with practically any Byzantine fault-tolerant replication protocol. Unlike previous solutions, the proposed scheme dynamically switches between two operation modes to combine high performance in correct environments and liveness during MAC attacks. The experiment results presented in the article demonstrate that the proposed mechanism can sufficiently tolerate MAC attacks without introducing any observable overhead whenever no faults are present.
Cardea: Providing Support for Dynamic Resource Access in a Distributed Computing Environment
NASA Technical Reports Server (NTRS)
Lepro, Rebekah
2003-01-01
The environment framing the modem authorization process span domains of administration, relies on many different authentication sources, and manages complex attributes as part of the authorization process. Cardea facilitates dynamic access control within this environment as a central function of an inter-operable authorization framework. The system departs from the traditional authorization model by separating the authentication and authorization processes, distributing the responsibility for authorization data and allowing collaborating domains to retain control over their implementation mechanisms. Critical features of the system architecture and its handling of the authorization process differentiate the system from existing authorization components by addressing common needs not adequately addressed by existing systems. Continuing system research seeks to enhance the implementation of the current authorization model employed in Cardea, increase the robustness of current features, further the framework for establishing trust and promote interoperability with existing security mechanisms.
Mishra, Dheerendra
2015-01-01
Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.
ERIC Educational Resources Information Center
Pilarz, Matthew
2013-01-01
For this study, a research-based lab module was implemented in two high school chemistry classes for the purpose of examining classroom dynamics throughout the process of students completing the module. A research-based lab module developed for use in undergraduate laboratories by the Center for Authentic Science Practice in Education (CASPiE) was…
2013-03-01
Sequencing; and 5) Taxi Routing (with Conformance Monitoring). Third, the impact of these DSTs on tower cab operational activities, sub-activities...keystroke or interface level. Fourth, the impact of the DSTs on aptitudes required of controllers is evaluated. The importance of the following aptitudes...Analysis of Mid-Term NextGen Impact on Aptitudes Required in the ATCT Cab ---------------- 36 Mid-Term DST Impact on Tower Cab Controller Roles
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Lami, Ihsan A.
2012-06-01
This paper proposes a new technique to obfuscate an authentication-challenge program (named LocProg) using randomly generated data together with a client's current location in real-time. LocProg can be used to enable any handsetapplication on mobile-devices (e.g. mCommerce on Smartphones) that requires authentication with a remote authenticator (e.g. bank). The motivation of this novel technique is to a) enhance the security against replay attacks, which is currently based on using real-time nonce(s), and b) add a new security factor, which is location verified by two independent sources, to challenge / response methods for authentication. To assure a secure-live transaction, thus reducing the possibility of replay and other remote attacks, the authors have devised a novel technique to obtain the client's location from two independent sources of GPS on the client's side and the cellular network on authenticator's side. The algorithm of LocProg is based on obfuscating "random elements plus a client's data" with a location-based key, generated on the bank side. LocProg is then sent to the client and is designed so it will automatically integrate into the target application on the client's handset. The client can then de-obfuscate LocProg if s/he is within a certain range around the location calculated by the bank and if the correct personal data is supplied. LocProg also has features to protect against trial/error attacks. Analysis of LocAuth's security (trust, threat and system models) and trials based on a prototype implementation (on Android platform) prove the viability and novelty of LocAuth.
Current Federal Identity Management and the Dynamic Signature Biometrics Option
2009-03-01
A lack of general public knowledge on biometrics combined with a lack of open discussion and detailed product advertising has created an atmosphere...Authentication: Fingerprint Sensor Product Guidelines. Version 1.03, September 2003 http:/Avww,intel.comidesign/ mobi /e/platform
A Case Study in Web 2.0 Application Development
NASA Astrophysics Data System (ADS)
Marganian, P.; Clark, M.; Shelton, A.; McCarty, M.; Sessoms, E.
2010-12-01
Recent web technologies focusing on languages, frameworks, and tools are discussed, using the Robert C. Byrd Green Bank Telescopes (GBT) new Dynamic Scheduling System as the primary example. Within that example, we use a popular Python web framework, Django, to build the extensive web services for our users. We also use a second complimentary server, written in Haskell, to incorporate the core scheduling algorithms. We provide a desktop-quality experience across all the popular browsers for our users with the Google Web Toolkit and judicious use of JQuery in Django templates. Single sign-on and authentication throughout all NRAO web services is accomplished via the Central Authentication Service protocol, or CAS.
ERIC Educational Resources Information Center
Jaffe-Notier, Tamara
2017-01-01
In this essay, the author asserts that the dialogic pedagogy of Paulo Freire provides a good description of the dynamic of authentic learning. The author narrates one short example and one long example of Freirian dialogues occurring in a public high school, giving details that describe moments of transformation. The short narrative sketches…
Air Force Cyber Warfare: Now and the Future
2013-10-01
cyber warfare in popular culture. Most of them focus on the individual s uncanny grasp of technology the ability to exploit any system with a dizzying flurry of keystrokes or to fend off adversaries with a smartphone, a paper clip, and an ingenious plan. These socially awkward heroes and heroines fill the silver screen with visions of a new kind of warfare. Contradicting these stereotypes, Air Force cyber operations are carefully planned and controlled by disciplined, rigorously trained operators. Rather than acting alone, these professionals produce effects in support of
1988-03-01
structure of the interface is a mapping from the physical world [for example, the use of icons, which S have inherent meaning to users but represent...design alternatives. Mechanisms for linking the user to the computer include physical devices (keyboards), actions taken with the devices (keystrokes...VALUATION AIDES TEMLATEI IITCOM1I LATOR IACTICAL KNOWLEDGE ACGIUISITION MICNnII t 1 Fig. 9. INTACVAL. * OtJiCTs ARE PHYSICAL ENTITIES OR CONCEPTUAL EN
ERIC Educational Resources Information Center
Nichols, Maria
2014-01-01
What happens in classrooms when we create the time and space for authentic talk about texts? Extended, collaborative conversations that allow understanding to unfold over time can be messy and dynamic. As students wrestle with complex texts and ideas, talk can become lively--and predictable problems can arise. In this article, Marie Nichols uses…
System and method for authentication
Duerksen, Gary L.; Miller, Seth A.
2015-12-29
Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.
Authentic Teachers: Student Criteria Perceiving Authenticity of Teachers
ERIC Educational Resources Information Center
De Bruyckere, Pedro; Kirschner, Paul A.
2016-01-01
Authenticity is seen by many as a key for good learning and education. There is talk of authentic instruction, authentic learning, authentic problems, authentic assessment, authentic tools and authentic teachers. The problem is that while authenticity is an often-used adjective describing almost all aspects of teaching and learning, the concept…
Zhang, Liping; Zhu, Shaohui; Tang, Shanyu
2017-03-01
Telecare medicine information systems (TMIS) provide flexible and convenient e-health care. However, the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data. Recently, Mishra et al. proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.'s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate that Mishra et al.'s scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses of Mishra et al.'s scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient to enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.
NASA Astrophysics Data System (ADS)
Chinn, Pauline W. U.
2009-09-01
This response draws from the literature on adaptive learning, traditional ecological knowledge, and social-ecological systems to show that Brad's choice is not a simple decision between traditional ecological knowledge and authentic science. This perspective recognizes knowledge systems as dynamic, cultural and historical activities characterized by diverse worldviews and ways of constructing and legitimizing knowledge. Brad's decision is seen as an example of adaptive learning, identity development and personal/collective agency oriented to increasing tribal influence in resource management decisions and policies. I will conclude that science literacy for all is not served by a transcendent, universal, Western modern view of science.
Yamaguchi, Motonori; Logan, Gordon D; Li, Vanessa
2013-08-01
Does response selection select words or letters in skilled typewriting? Typing performance involves hierarchically organized control processes: an outer loop that controls word level processing, and an inner loop that controls letter (or keystroke) level processing. The present study addressed whether response selection occurs in the outer loop or the inner loop by using the psychological refractory period (PRP) paradigm in which Task1 required typing single words and Task2 required vocal responses to tones. The number of letters (string length) in the words was manipulated to discriminate selection of words from selection of keystrokes. In Experiment 1, the PRP effect depended on string length of words in Task1, suggesting that response selection occurs in the inner loop. To assess contributions of the outer loop, the influence of string length was examined in a lexical-decision task that also involves word encoding and lexical access (Experiment 2), or to-be-typed words were preexposed so outer-loop processing could finish before typing started (Experiment 3). Response time for Task2 (RT2) did not depend on string length with lexical decision, and RT2 still depended on string length with typing preexposed strings. These results support the inner-loop locus of the PRP effect. In Experiment 4, typing was performed as Task2, and the effect of string length on typing RT interacted with stimulus onset asynchrony superadditively, implying that another bottleneck also exists in the outer loop. We conclude that there are at least two bottleneck processes in skilled typewriting. 2013 APA, all rights reserved
Disruption of Boundary Encoding During Sensorimotor Sequence Learning: An MEG Study.
Michail, Georgios; Nikulin, Vadim V; Curio, Gabriel; Maess, Burkhard; Herrojo Ruiz, María
2018-01-01
Music performance relies on the ability to learn and execute actions and their associated sounds. The process of learning these auditory-motor contingencies depends on the proper encoding of the serial order of the actions and sounds. Among the different serial positions of a behavioral sequence, the first and last (boundary) elements are particularly relevant. Animal and patient studies have demonstrated a specific neural representation for boundary elements in prefrontal cortical regions and in the basal ganglia, highlighting the relevance of their proper encoding. The neural mechanisms underlying the encoding of sequence boundaries in the general human population remain, however, largely unknown. In this study, we examined how alterations of auditory feedback, introduced at different ordinal positions (boundary or within-sequence element), affect the neural and behavioral responses during sensorimotor sequence learning. Analysing the neuromagnetic signals from 20 participants while they performed short piano sequences under the occasional effect of altered feedback (AF), we found that at around 150-200 ms post-keystroke, the neural activities in the dorsolateral prefrontal cortex (DLPFC) and supplementary motor area (SMA) were dissociated for boundary and within-sequence elements. Furthermore, the behavioral data demonstrated that feedback alterations on boundaries led to greater performance costs, such as more errors in the subsequent keystrokes. These findings jointly support the idea that the proper encoding of boundaries is critical in acquiring sensorimotor sequences. They also provide evidence for the involvement of a distinct neural circuitry in humans including prefrontal and higher-order motor areas during the encoding of the different classes of serial order.
Developing Authentic Research Experiences in the K-12 Classroom
NASA Astrophysics Data System (ADS)
Hall, M. K.
2004-12-01
The excitement of an authentic science experiment in one's own backyard piques interest, but teachers need resources and professional development experiences to capitalize upon this excitement and create opportunities for their students' learning. Three obstacles must be overcome for success in carrying out authentic research in the classroom. First, scientists and teachers must work together to identify relevant and developmentally appropriate research questions for the target audience. Second, teachers need professional development experiences that engage them in authentic research and that provide support for introducing a similar research experience in their own classroom. Third, the outcome of the research experience must have value to the scientist, teacher and student to motivate sustained participation by all. I have directed two projects that have opened the door for teachers to conduct authentic research with their students: monitoring earthquakes with educational seismometers and investigating local environmental problems with a GIS. Classroom seismometers permit students and the public to see first-hand Earth's dynamic response to both human and natural events in their hometown and around the country. From plotting earthquakes occurring throughout the school year to reveal plate tectonic relationships, or conducting seismic hazard analysis of the local region, to analyzing patterns of foreshocks and aftershocks of major earthquakes, students have been actively engaged and motivated in their learning. GIS opens the opportunity to investigate problems of land, water and other resource uses, but presents special problems in acquiring appropriate and useful data. I will discuss the lessons learned from working with teachers in educational seismology and GIS programs and how those lessons can be applied to developing research experiences for teachers and students.
Models of Christian Leadership in Youth Ministry
ERIC Educational Resources Information Center
Canales, Arthur David
2014-01-01
This article addresses four models of leadership that Christian communities may want to adopt to help them assess and articulate a more vibrant and dynamic youth ministry. In particular, this article will demonstrate that authentic Christian leadership for youth ministry is much more than teaching young people about pastoral skills, but requires a…
Tradition, Authenticity and Context: The Case for a Dynamic Approach
ERIC Educational Resources Information Center
Schippers, Huib
2006-01-01
The encounter--and sometimes confrontation--of music with various cultural backgrounds challenges many preconceptions and prejudices on music making and learning. The rise of what is now often called "world music" has not only brought new sound worlds to Western ears, but digs deep into existing systems of belief. In discussing both…
ERIC Educational Resources Information Center
Christelle, Andrea; Dillard, Kara N.; Lindaman, Kara
2018-01-01
The Common Ground for Action (CGA) online deliberation platform is a dynamic tool designed to encourage diverse group members to identify collective responses to deeply controversial or "wicked" public problems that have no simple solution. The program promotes authentic deliberation, while minimizing the tactics of horse-trading and…
ERIC Educational Resources Information Center
Ma, Songge
2012-01-01
Purpose: This paper aims to explore what Chinese doctors have learned in authentic medical practice, what they want to learn, and the dynamics behind their professional learning in working contexts. Design/methodology/approach: The paper uses Narrative Inquiry, qualitative data which were collected by open-ended face-to-face interviews and…
A new security model for collaborative environments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Agarwal, Deborah; Lorch, Markus; Thompson, Mary
Prevalent authentication and authorization models for distributed systems provide for the protection of computer systems and resources from unauthorized use. The rules and policies that drive the access decisions in such systems are typically configured up front and require trust establishment before the systems can be used. This approach does not work well for computer software that moderates human-to-human interaction. This work proposes a new model for trust establishment and management in computer systems supporting collaborative work. The model supports the dynamic addition of new users to a collaboration with very little initial trust placed into their identity and supportsmore » the incremental building of trust relationships through endorsements from established collaborators. It also recognizes the strength of a users authentication when making trust decisions. By mimicking the way humans build trust naturally the model can support a wide variety of usage scenarios. Its particular strength lies in the support for ad-hoc and dynamic collaborations and the ubiquitous access to a Computer Supported Collaboration Workspace (CSCW) system from locations with varying levels of trust and security.« less
Engel, Erwan; Ratel, Jérémy
2007-06-22
The objective of the work was to assess the relevance for the authentication of food of a novel chemometric method developed to correct mass spectrometry (MS) data from instrumental drifts, namely, the comprehensive combinatory standard correction (CCSC). Applied to gas chromatography (GC)-MS data, the method consists in analyzing a liquid sample with a mixture of n internal standards and in using the best combination of standards to correct the MS signal provided by each compound. The paper focuses on the authentication of the type of feeding in farm animals based on the composition in volatile constituents of their adipose tissues. The first step of the work enabled on one hand to ensure the feasibility of the conversion of the adipose tissue sample into a liquid phase required for the use of the CCSC method and on the other hand, to determine the key parameters of the extraction of the volatile fraction from this liquid phase by dynamic headspace. The second step showed the relevance of the CCSC pre-processing of the MS fingerprints generated by dynamic headspace-MS analysis of lamb tissues, for the discrimination of animals fed exclusively with pasture (n=8) or concentrate (n=8). When compared with filtering of raw data, internal normalization and correction by a single standard, the CCSC method increased by 17.1-, 3.3- and 1.3-fold, respectively, the number of mass fragments which discriminated the type of feeding. The final step confirmed the advantage of the CCSC pre-processing of dynamic headspace-gas chromatography-MS data for revealing molecular tracers of the type of feeding those number (n=72) was greater when compared to the number of tracers obtained with raw data (n=42), internal normalization (n=63) and correction by a single standard (n=57). The relevance of the information gained by using the CCSC method is discussed.
Re-imagining a Stata/Python Combination
NASA Technical Reports Server (NTRS)
Fiedler, James
2013-01-01
At last year's Stata Conference, I presented some ideas for combining Stata and the Python programming language within a single interface. Two methods were presented: in one, Python was used to automate Stata; in the other, Python was used to send simulated keystrokes to the Stata GUI. The first method has the drawback of only working in Windows, and the second can be slow and subject to character input limits. In this presentation, I will demonstrate a method for achieving interaction between Stata and Python that does not suffer these drawbacks, and I will present some examples to show how this interaction can be useful.
Keylogger Application to Monitoring Users Activity with Exact String Matching Algorithm
NASA Astrophysics Data System (ADS)
Rahim, Robbi; Nurdiyanto, Heri; Saleh A, Ansari; Abdullah, Dahlan; Hartama, Dedy; Napitupulu, Darmawan
2018-01-01
The development of technology is very fast, especially in the field of Internet technology that at any time experiencing significant changes, The development also supported by the ability of human resources, Keylogger is a tool that most developed because this application is very rarely recognized a malicious program by antivirus, keylogger will record all activities related to keystrokes, the recording process is accomplished by using string matching method. The application of string matching method in the process of recording the keyboard is to help the admin in knowing what the user accessed on the computer.
ERIC Educational Resources Information Center
Brinkman, Britney G; Rabenstein, Kelly L.; Rosén, Lee A.; Zimmerman, Toni S.
2014-01-01
In the current study, 45 girls and 41 boys participated in focus groups following a program designed to teach them about social justice. The children articulated the discrepancy between their own gender identity and gender role stereotypes and discussed potential problems with conforming to gender role expectations as well as consequences of…
The Fidelity and Usability of 5-DIE: A Design Study of Enacted Cyberlearning
ERIC Educational Resources Information Center
Kern, Cindy L.; Crippen, Kent J.; Skaza, Heather
2014-01-01
This paper describes a design study of a cyberlearning instructional unit about climate change created with a new inquiry-based design framework, the 5-featured Dynamic Inquiry Enterprise (5-DIE). The 5-DIE framework was created to address the need for authentic science inquiry experiences in cyberlearning environments that leverage existing tools…
ERIC Educational Resources Information Center
Ekmekci, Adem; Gulacar, Ozcan
2015-01-01
Science education reform emphasizes innovative and constructivist views of science teaching and learning that promotes active learning environments, dynamic instructions, and authentic science experiments. Technology-based and hands-on instructional designs are among innovative science teaching and learning methods. Research shows that these two…
ERIC Educational Resources Information Center
Hwang, Gwo-Jen; Chu, Hui-Chun; Shih, Ju-Ling; Huang, Shu-Hsien; Tsai, Chin-Chung
2010-01-01
A context-aware ubiquitous learning environment is an authentic learning environment with personalized digital supports. While showing the potential of applying such a learning environment, researchers have also indicated the challenges of providing adaptive and dynamic support to individual students. In this paper, a decision-tree-oriented…
Extra! Extra! Read All about It! Teacher Scaffolds Interactive Read-Alouds of a Dynamic Text
ERIC Educational Resources Information Center
Jordan, Michelle E.
2015-01-01
Research revealing the continued dominance of narrative texts in primary-grade classrooms, coupled with shifts in the American cultural and textual landscape, have prompted educational policy urging teachers to increase the variety of informational texts students read and the authenticity with which students use those texts. The purpose of this…
Honing EAP Learners' Public Speaking Skills by Analyzing TED Talks
ERIC Educational Resources Information Center
Leopold, Lisa
2016-01-01
Despite the importance of public speaking skills for English for Academic Purposes (EAP) students' academic and professional success, few EAP textbooks incorporate authentic, professional speech models. Thus, many EAP instructors have turned to TED talks for dynamic speech models. Yet a single TED talk may be too long for viewing in class and may…
2017-01-01
Parkinson’s Disease (PD) is a progressive neurodegenerative movement disease affecting over 6 million people worldwide. Loss of dopamine-producing neurons results in a range of both motor and non-motor symptoms, however there is currently no definitive test for PD by non-specialist clinicians, especially in the early disease stages where the symptoms may be subtle and poorly characterised. This results in a high misdiagnosis rate (up to 25% by non-specialists) and people can have the disease for many years before diagnosis. There is a need for a more accurate, objective means of early detection, ideally one which can be used by individuals in their home setting. In this investigation, keystroke timing information from 103 subjects (comprising 32 with mild PD severity and the remainder non-PD controls) was captured as they typed on a computer keyboard over an extended period and showed that PD affects various characteristics of hand and finger movement and that these can be detected. A novel methodology was used to classify the subjects’ disease status, by utilising a combination of many keystroke features which were analysed by an ensemble of machine learning classification models. When applied to two separate participant groups, this approach was able to successfully discriminate between early-PD subjects and controls with 96% sensitivity, 97% specificity and an AUC of 0.98. The technique does not require any specialised equipment or medical supervision, and does not rely on the experience and skill of the practitioner. Regarding more general application, it currently does not incorporate a second cardinal disease symptom, so may not differentiate PD from similar movement-related disorders. PMID:29190695
Syroid, Noah; Liu, David; Albert, Robert; Agutter, James; Egan, Talmage D; Pace, Nathan L; Johnson, Ken B; Dowdle, Michael R; Pulsipher, Daniel; Westenskow, Dwayne R
2012-11-01
Drug administration errors are frequent and are often associated with the misuse of IV infusion pumps. One source of these errors may be the infusion pump's user interface. We used failure modes-and-effects analyses to identify programming errors and to guide the design of a new syringe pump user interface. We designed the new user interface to clearly show the pump's operating state simultaneously in more than 1 monitoring location. We evaluated anesthesia residents in laboratory and simulated environments on programming accuracy and error detection between the new user interface and the user interface of a commercially available infusion pump. With the new user interface, we observed the number of programming errors reduced by 81%, the number of keystrokes per task reduced from 9.2 ± 5.0 to 7.5 ± 5.5 (mean ± SD), the time required per task reduced from 18.1 ± 14.1 seconds to 10.9 ± 9.5 seconds and significantly less perceived workload. Residents detected 38 of 70 (54%) of the events with the new user interface and 37 of 70 (53%) with the existing user interface, despite no experience with the new user interface and extensive experience with the existing interface. The number of programming errors and workload were reduced partly because it took less time and fewer keystrokes to program the pump when using the new user interface. Despite minimal training, residents quickly identified preexisting infusion pump problems with the new user interface. Intuitive and easy-to-program infusion pump interfaces may reduce drug administration errors and infusion pump-related adverse events.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601
ERIC Educational Resources Information Center
Hadley, Bree Jamila
2012-01-01
This article investigates the role of information communication technologies (ICTs) in establishing a well-aligned, authentic learning environment for a diverse cohort of non-cognate and cognate students studying event management in a higher education context. Based on a case study which examined the way ICTs assisted in accommodating diverse…
Indexical Relations and Sound Motion Pictures in L2 Curricula: The Dynamic Role of the Teacher
ERIC Educational Resources Information Center
Chen, Liang; Oller, John W., Jr.
2005-01-01
Well-chosen sound motion pictures (SMPs) can be excellent language teaching tools for presenting facts and providing comprehensible input in the target language. They give access to content and authentic surface forms in the target language as well as to the associations between them. SMPs also allow repeated exposures, but they are rarely…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rembold, Randy Kai; Hart, Darren M.
Sandia National Laboratories has tested and evaluated Geotech SMART24BH borehole data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of two Geotech SMART24BH digitizers with a Fortezza PCMCIAmore » crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy/statistics/drift, analog bandwidth.« less
Quantum Dialogue with Authentication Based on Bell States
NASA Astrophysics Data System (ADS)
Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping
2013-06-01
We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.
ERIC Educational Resources Information Center
Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen
2008-01-01
This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…
Measuring Teacher Authenticity: Criteria Students Use in Their Perception of Teacher Authenticity
ERIC Educational Resources Information Center
De Bruyckere, Pedro; Kirschner, Paul A.
2017-01-01
Authenticity is an often-heard term with respect to education. Tasks should be authentic, the learning environment should be authentic and, above all, the teacher should be authentic. Previous qualitative research has shown that there are four primary criteria that students in formal educational settings use when forming their perceptions of…
van den Bosch, Ralph; Taris, Toon W
2014-01-01
Previous research on authenticity has mainly focused on trait conceptualizations of authenticity (e.g., Wood et al., 2008), whereas in specific environments (e.g., at work) state conceptualizations of authenticity (cf. Van den Bosch & Taris, 2013) are at least as relevant. For example, working conditions are subject to change, and this could well have consequences for employees' perceived level of authenticity at work. The current study employs a work-specific, state-like conceptualization of authenticity to investigate the relations between authenticity at work, well-being, and work outcomes. A series of ten separate hierarchical regression analyses using data from 685 participants indicated that after controlling for selected work characteristics and demographic variables, authenticity at work accounted for on average 11% of the variance of various wellbeing and work outcomes. Of the three subscales of authenticity at work (i.e., authentic living, self-alienation, and accepting influence), self-alienation was the strongest predictor of outcomes, followed by authentic living and accepting external influence, respectively. These findings are discussed in the light of their practical and theoretical implications.
Static and Dynamic Human Shape Modeling - A Review of the Literature and State of the Art
2009-04-01
Figure 60. Confluent marker-based animation (Aguiar et al. 2006). Subsequent frames showing the female scan authentically performing a soccer kick ...Infoscitex Corp. 4027 Colonel Glenn Highway Suite 210 Dayton OH 45431-1672 Kathleen Robinette Biosciences and Protection Division Biomechanics ...Biosciences and Protection Division Biomechanics Branch Wright-Patterson AFB OH 45433 Approved for public release; distribution unlimited. NOTICE
ERIC Educational Resources Information Center
Burgin, Stephen R.; Oramous, Jennifer; Kaminski, Michael; Stocker, Linda; Moradi, Mahmoud
2018-01-01
Modeling is a practice of science that is underemphasized in biology classrooms in comparison to its central focus in the physical sciences. Visualizations of the submicroscopic world of molecules are becoming increasingly sophisticated with the evolution of new technologies. With this in mind, we introduced high school biology classrooms to a…
Ties that bind, and double-bind: visual impairment, help, and the shaping of relationships.
Lourens, Heidi; Watermeyer, Brian; Swartz, Leslie
2018-03-16
Scholars agree that effective rehabilitation relies on a bedrock of reciprocity, relational trust, and authenticity. It is therefore essential for practitioners to develop insight into the complex dynamics within helping relationships. This study aims to provide an in-depth understanding of visually impaired students' experience of informal helping relationships. Ten visually impaired students at a South African university participated in one of two semi-structured focus group interviews (six and four in each group, respectively) wherein we explored their experience of informal helping relationships. Interpretive phenomenological analysis was used to make sense of the data. Help, according to the participants, can militate against visibility and complete acceptance, and has the potential to cause helpers to feel entrapped. By contrast, some students found that help offered benefits to relationships by boosting the helper's self-esteem and affording disabled students the opportunity to make friends. Decisions whether to accept help were mediated more by relationship factors than by the need for help. These findings are important for rehabilitation professionals, as deep relationship can come into being during the course of a rehabilitation process. Although this study was conducted in an informal setting, the relational dynamics that we explore are also applicable to clinical relationships between disabled persons and rehabilitation professionals. Implications for rehabilitation In this paper, we provide an overview of the intricacies involved in care and helping relationships; In order for rehabilitation to be successful, these relationships should ideally be real, trusting, and authentic; Yet, authenticity and spontaneity often get lost in helping relationships, as help-recipients may deny help when they need it, and accept help when perfectly able to cope without it. These decisions are mediated more by relationship factors than by the need for help; In their daily practice, it is essential for health professionals to be mindful of these relational intricacies within care relationships; We recommend that professionals remain motivated to continuously reflect on their own actions and on the emotional investment they might have in their role as a helper; Our last recommendation is for rehabilitation professionals to spend energy on exploring, through open and transparent discussions with their disabled patients, the relational dynamics in their relationship.
An, Younghwa
2012-01-01
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.
An, Younghwa
2012-01-01
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887
ERIC Educational Resources Information Center
Lüddecke, Florian
2016-01-01
Whereas the importance of authenticity in relation to educational contexts has been highlighted, educational authenticity (EA) has mainly referred to a real-life/world convergence or the notion of teacher authenticity, implying that authenticity can be taught and learnt. This view, however, has largely overlooked philosophical considerations so…
ERIC Educational Resources Information Center
Nematollahi, Shirin; Maghsoudi, Mojtaba
2015-01-01
In this current study the researchers have tried to investigate the possible effect of authentic and non-authentic texts on Iranian EFL learners' vocabulary retention. Despite the great deal of studies conducted in the area of EFL/ESL learning, the effect of authentic versus non-authentic texts have almost gained little attention and been…
Fulfillment of HTTP Authentication Based on Alcatel OmniSwitch 9700
NASA Astrophysics Data System (ADS)
Liu, Hefu
This paper provides a way of HTTP authentication On Alcatel OmniSwitch 9700. Authenticated VLANs control user access to network resources based on VLAN assignment and user authentication. The user can be authenticated through the switch via any standard Web browser software. Web browser client displays the username and password prompts. Then a way for HTML forms can be given to pass HTTP authentication data when it's submitted. A radius server will provide a database of user information that the switch checks whenever it tries to authenticate through the switch. Before or after authentication, the client can get an address from a Dhcp server.
Makiĭ, E A; Mantulo, P M
1984-01-01
The dynamics of strengthening of monosynaptic segmental response (MSR) in white rats has been studied after bilateral sciatic nerves cuts nearer to the spinal cord (high cut) and farther from it (low cut). 24 hours after the operation the irritation of the posterior root on the side of the high cut stimulates anterior root MSR of authentically larger amplitude than on the side of the low cut and much greater than in intact animals. 48 h, 72 h and 120 h after the operation MSR amplitude on both sides is considerably increased in comparison with the intact animals amplitude but authentically does not differ on the side of the low and high cuts. A connection may be suggested between the excitability increase process of partially deafferented motoneurons with the disturbance of axoplasmatic flow in central sections of the cut afferent fibres.
Protein sequences bound to mineral surfaces persist into deep time
Demarchi, Beatrice; Hall, Shaun; Roncal-Herrero, Teresa; Freeman, Colin L; Woolley, Jos; Crisp, Molly K; Wilson, Julie; Fotakis, Anna; Fischer, Roman; Kessler, Benedikt M; Rakownikow Jersie-Christensen, Rosa; Olsen, Jesper V; Haile, James; Thomas, Jessica; Marean, Curtis W; Parkington, John; Presslee, Samantha; Lee-Thorp, Julia; Ditchfield, Peter; Hamilton, Jacqueline F; Ward, Martyn W; Wang, Chunting Michelle; Shaw, Marvin D; Harrison, Terry; Domínguez-Rodrigo, Manuel; MacPhee, Ross DE; Kwekason, Amandus; Ecker, Michaela; Kolska Horwitz, Liora; Chazan, Michael; Kröger, Roland; Thomas-Oates, Jane; Harding, John H; Cappellini, Enrico; Penkman, Kirsty; Collins, Matthew J
2016-01-01
Proteins persist longer in the fossil record than DNA, but the longevity, survival mechanisms and substrates remain contested. Here, we demonstrate the role of mineral binding in preserving the protein sequence in ostrich (Struthionidae) eggshell, including from the palaeontological sites of Laetoli (3.8 Ma) and Olduvai Gorge (1.3 Ma) in Tanzania. By tracking protein diagenesis back in time we find consistent patterns of preservation, demonstrating authenticity of the surviving sequences. Molecular dynamics simulations of struthiocalcin-1 and -2, the dominant proteins within the eggshell, reveal that distinct domains bind to the mineral surface. It is the domain with the strongest calculated binding energy to the calcite surface that is selectively preserved. Thermal age calculations demonstrate that the Laetoli and Olduvai peptides are 50 times older than any previously authenticated sequence (equivalent to ~16 Ma at a constant 10°C). DOI: http://dx.doi.org/10.7554/eLife.17092.001 PMID:27668515
Xu, Xin; Zhu, Ping; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua; He, Lian
2014-01-01
In the field of the Telecare Medicine Information System, recent researches have focused on consummating more convenient and secure healthcare delivery services for patients. In order to protect the sensitive information, various attempts such as access control have been proposed to safeguard patients' privacy in this system. However, these schemes suffered from some certain security defects and had costly consumption, which were not suitable for the telecare medicine information system. In this paper, based on the elliptic curve cryptography, we propose a secure and efficient two-factor mutual authentication and key agreement scheme to reduce the computational cost. Such a scheme enables to provide the patient anonymity by employing the dynamic identity. Compared with other related protocols, the security analysis and performance evaluation show that our scheme overcomes some well-known attacks and has a better performance in the telecare medicine information system.
Blinking characterization from high speed video records. Application to biometric authentication
2018-01-01
The evaluation of eye blinking has been used for the diagnosis of neurological disorders and fatigue. Despite the extensive literature, no objective method has been found to analyze its kinematic and dynamic behavior. A non-contact technique based on the high-speed recording of the light reflected by the eyelid in the blinking process and the off-line processing of the sequence is presented. It allows for objectively determining the start and end of a blink, besides obtaining different physical magnitudes: position, speed, eyelid acceleration as well as the power, work and mechanical impulse developed by the muscles involved in the physiological process. The parameters derived from these magnitudes provide a unique set of features that can be used to biometric authentication. This possibility has been tested with a limited number of subjects with a correct identification rate of up to 99.7%, thus showing the potential application of the method. PMID:29734389
Effective utilization of gravity during arm downswing in keystrokes by expert pianists.
Furuya, S; Osu, R; Kinoshita, H
2009-12-01
The present study investigated a skill-level-dependent interaction between gravity and muscular force when striking piano keys. Kinetic analysis of the arm during the downswing motion performed by expert and novice piano players was made using an inverse dynamic technique. The corresponding activities of the elbow agonist and antagonist muscles were simultaneously recorded using electromyography (EMG). Muscular torque at the elbow joint was computed while excluding the effects of gravitational and motion-dependent interaction torques. During descending the forearm to strike the keys, the experts kept the activation of the triceps (movement agonist) muscle close to the resting level, and decreased anti-gravity activity of the biceps muscle across all loudness levels. This suggested that elbow extension torque was produced by gravity without the contribution of agonist muscular work. For the novices, on the other hand, a distinct activity in the triceps muscle appeared during the middle of the downswing, and its amount and duration were increased with increasing loudness. Therefore, for the novices, agonist muscular force was the predominant contributor to the acceleration of elbow extension during the downswing. We concluded that a balance shift from muscular force dependency to gravity dependency for the generation of a target joint torque occurs with long-term piano training. This shift would support the notion of non-muscular force utilization for improving physiological efficiency of limb movement with respect to the effective use of gravity.
Graph State-Based Quantum Group Authentication Scheme
NASA Astrophysics Data System (ADS)
Liao, Longxia; Peng, Xiaoqi; Shi, Jinjing; Guo, Ying
2017-02-01
Motivated by the elegant structure of the graph state, we design an ingenious quantum group authentication scheme, which is implemented by operating appropriate operations on the graph state and can solve the problem of multi-user authentication. Three entities, the group authentication server (GAS) as a verifier, multiple users as provers and the trusted third party Trent are included. GAS and Trent assist the multiple users in completing the authentication process, i.e., GAS is responsible for registering all the users while Trent prepares graph states. All the users, who request for authentication, encode their authentication keys on to the graph state by performing Pauli operators. It demonstrates that a novel authentication scheme can be achieved with the flexible use of graph state, which can synchronously authenticate a large number of users, meanwhile the provable security can be guaranteed definitely.
22 CFR 92.36 - Authentication defined.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication defined. 92.36 Section 92.36... Notarial Acts § 92.36 Authentication defined. An authentication is a certification of the genuineness of... recognized in another jurisdiction. Documents which may require authentication include legal instruments...
Authentic feminist? Authenticity and feminist identity in teenage feminists' talk.
Calder-Dawe, Octavia; Gavey, Nicola
2017-12-01
This article explores how young people's feminist identities take shape in conjunction with a contemporary ideal of personal authenticity: to know and to express the 'real me'. Drawing from interviews with 18 teenagers living in Auckland, New Zealand, we examine a novel convergence of authenticity and feminism in participants' identity talk. For social psychologists interested in identity and politics, this convergence is intriguing: individualizing values such as authenticity are generally associated with disengagement with structural critique and with a repudiation of politicized and activist identities. Rather than seeking to categorize authentic feminism as an instance of either 'good/collective' or 'bad/individualized' feminist politics, we use discourse analysis to examine how the identity position of authentic feminist was constructed and to explore implications for feminist politics. On one hand, interviewees mobilized authentic feminism to affirm their commitment to normative liberal values of authenticity and self-expression. At the same time, the position of authentic feminist appeared to authorize risky feminist identifications and to justify counter-normative feelings, desires, and actions. To conclude, we explore how encountering others' intolerance of authentic feminism exposed interviewees to the limits of authenticity discourse, propelling some towards new understandings of the social world and their space for action within it. © 2017 The British Psychological Society.
Science Classroom Inquiry (SCI) Simulations: A Novel Method to Scaffold Science Learning
Peffer, Melanie E.; Beckler, Matthew L.; Schunn, Christian; Renken, Maggie; Revak, Amanda
2015-01-01
Science education is progressively more focused on employing inquiry-based learning methods in the classroom and increasing scientific literacy among students. However, due to time and resource constraints, many classroom science activities and laboratory experiments focus on simple inquiry, with a step-by-step approach to reach predetermined outcomes. The science classroom inquiry (SCI) simulations were designed to give students real life, authentic science experiences within the confines of a typical classroom. The SCI simulations allow students to engage with a science problem in a meaningful, inquiry-based manner. Three discrete SCI simulations were created as website applications for use with middle school and high school students. For each simulation, students were tasked with solving a scientific problem through investigation and hypothesis testing. After completion of the simulation, 67% of students reported a change in how they perceived authentic science practices, specifically related to the complex and dynamic nature of scientific research and how scientists approach problems. Moreover, 80% of the students who did not report a change in how they viewed the practice of science indicated that the simulation confirmed or strengthened their prior understanding. Additionally, we found a statistically significant positive correlation between students’ self-reported changes in understanding of authentic science practices and the degree to which each simulation benefitted learning. Since SCI simulations were effective in promoting both student learning and student understanding of authentic science practices with both middle and high school students, we propose that SCI simulations are a valuable and versatile technology that can be used to educate and inspire a wide range of science students on the real-world complexities inherent in scientific study. PMID:25786245
Science classroom inquiry (SCI) simulations: a novel method to scaffold science learning.
Peffer, Melanie E; Beckler, Matthew L; Schunn, Christian; Renken, Maggie; Revak, Amanda
2015-01-01
Science education is progressively more focused on employing inquiry-based learning methods in the classroom and increasing scientific literacy among students. However, due to time and resource constraints, many classroom science activities and laboratory experiments focus on simple inquiry, with a step-by-step approach to reach predetermined outcomes. The science classroom inquiry (SCI) simulations were designed to give students real life, authentic science experiences within the confines of a typical classroom. The SCI simulations allow students to engage with a science problem in a meaningful, inquiry-based manner. Three discrete SCI simulations were created as website applications for use with middle school and high school students. For each simulation, students were tasked with solving a scientific problem through investigation and hypothesis testing. After completion of the simulation, 67% of students reported a change in how they perceived authentic science practices, specifically related to the complex and dynamic nature of scientific research and how scientists approach problems. Moreover, 80% of the students who did not report a change in how they viewed the practice of science indicated that the simulation confirmed or strengthened their prior understanding. Additionally, we found a statistically significant positive correlation between students' self-reported changes in understanding of authentic science practices and the degree to which each simulation benefitted learning. Since SCI simulations were effective in promoting both student learning and student understanding of authentic science practices with both middle and high school students, we propose that SCI simulations are a valuable and versatile technology that can be used to educate and inspire a wide range of science students on the real-world complexities inherent in scientific study.
22 CFR 92.38 - Forms of certificate of authentication.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Forms of certificate of authentication. 92.38... SERVICES Specific Notarial Acts § 92.38 Forms of certificate of authentication. The form of a certificate of authentication depends on the statutory requirements of the jurisdiction where the authenticated...
18 CFR 375.102 - Custody and authentication of Commission records.
Code of Federal Regulations, 2010 CFR
2010-04-01
... authentication of Commission records. 375.102 Section 375.102 Conservation of Power and Water Resources FEDERAL... Provisions § 375.102 Custody and authentication of Commission records. (a) Custody of official records. (1...) Authentication of Commission action. All orders and other actions of the Commission shall be authenticated or...
ERIC Educational Resources Information Center
Bialystok, Lauren
2015-01-01
Authenticity is often touted as an important virtue for teachers. But what do we mean when we say that a teacher ought to be "authentic"? Research shows that discussions of teacher authenticity frequently refer to other character traits or simply to teacher effectiveness, but authenticity is a unique concept with a long philosophical…
Richard Peters and Valuing Authenticity
ERIC Educational Resources Information Center
Degenhardt, M. A. B.
2009-01-01
Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…
Defining the questions: a research agenda for nontraditional authentication in arms control
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hauck, Danielle K; Mac Arthur, Duncan W; Smith, Morag K
Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidencesmore » in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.« less
Do We Need to Design Course-Based Undergraduate Research Experiences for Authenticity?
Rowland, Susan; Pedwell, Rhianna; Lawrie, Gwen; Lovie-Toon, Joseph; Hung, Yu
2016-01-01
The recent push for more authentic teaching and learning in science, technology, engineering, and mathematics indicates a shared agreement that undergraduates require greater exposure to professional practices. There is considerable variation, however, in how “authentic” science education is defined. In this paper we present our definition of authenticity as it applies to an “authentic” large-scale undergraduate research experience (ALURE); we also look to the literature and the student voice for alternate perceptions around this concept. A metareview of science education literature confirmed the inconsistency in definitions and application of the notion of authentic science education. An exploration of how authenticity was explained in 604 reflections from ALURE and traditional laboratory students revealed contrasting and surprising notions and experiences of authenticity. We consider the student experience in terms of alignment with 1) the intent of our designed curriculum and 2) the literature definitions of authentic science education. These findings contribute to the conversation surrounding authenticity in science education. They suggest two things: 1) educational experiences can have significant authenticity for the participants, even when there is no purposeful design for authentic practice, and 2) the continuing discussion of and design for authenticity in UREs may be redundant. PMID:27909029
ERIC Educational Resources Information Center
Hogervorst, Susan
2015-01-01
This article analyses three local educational projects about the Nazi bombing of Rotterdam in May 1940, all of which took place from 1980 to the present day in the context of the dynamic memory culture of the bombardment. These three contexts testify to a process by which memory, increasingly derived from authentic locations and objects instead of…
Lossef, S V; Schwartz, L H
1990-09-01
A computerized reference system for radiology journal articles was developed by using an IBM-compatible personal computer with a hand-held optical scanner and optical character recognition software. This allows direct entry of scanned text from printed material into word processing or data-base files. Additionally, line diagrams and photographs of radiographs can be incorporated into these files. A text search and retrieval software program enables rapid searching for keywords in scanned documents. The hand scanner and software programs are commercially available, relatively inexpensive, and easily used. This permits construction of a personalized radiology literature file of readily accessible text and images requiring minimal typing or keystroke entry.
Transforming the back office with a single keystroke.
Kaplan, Charles
2011-09-01
Intelligent data capture is an application that can provide electronic access to data contained in any type of document, including clinical records and financial documents, thereby reducing or eliminating the need for manual data entry. Before implementing this technology, however, healthcare leaders should: Evaluate technology in the context of a business case to ensure a measurable ROI. Communicate with employees throughout the process so they are prepared for and embrace the inevitable changes that will come with automation. Implement the solution in phases, focusing on those document types that can deliver for a safer, less disruptive approach. Achieve maximum benefit to the organization by reengineering business processes to fully leverage technology rather than simply automating existing manual processes.
Hamlet, Jason R; Pierson, Lyndon G
2014-10-21
Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.
Examining the relationship between authenticity and self-handicapping.
Akin, Ahmet; Akin, Umran
2014-12-01
Self-handicapping includes strategies of externalization in which people excuse failure and internalize success, but which also prevents them from behaving in an authentic way. The goal was to investigate the relation of authenticity with self-handicapping. The study was conducted with 366 university students (176 men, 190 women; M age = 20.2 yr.). Participants completed the Turkish version of the Authenticity Scale and the Self-handicapping Scale. Self-handicapping was correlated positively with two factors of authenticity, accepting external influence and self-alienation, and negatively with the authentic living factor. A multiple regression analysis indicated that self-handicapping was predicted positively by self-alienation and accepting external influence and negatively by authentic living, accounting for 21% of the variance collectively. These results demonstrated the negative association of authenticity with self-handicapping.
An Authentication Protocol for Future Sensor Networks.
Bilal, Muhammad; Kang, Shin-Gak
2017-04-28
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.
An Authentication Protocol for Future Sensor Networks
Bilal, Muhammad; Kang, Shin-Gak
2017-01-01
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols. PMID:28452937
Image authentication using distributed source coding.
Lin, Yao-Chung; Varodayan, David; Girod, Bernd
2012-01-01
We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.
Cardea: Dynamic Access Control in Distributed Systems
NASA Technical Reports Server (NTRS)
Lepro, Rebekah
2004-01-01
Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.
Wang, Wei; Wang, Chunqiu; Zhao, Min
2014-03-01
To ease the burdens on the hospitalization capacity, an emerging swallowable-capsule technology has evolved to serve as a remote gastrointestinal (GI) disease examination technique with the aid of the wireless body sensor network (WBSN). Secure multimedia transmission in such a swallowable-capsule-based WBSN faces critical challenges including energy efficiency and content quality guarantee. In this paper, we propose a joint resource allocation and stream authentication scheme to maintain the best possible video quality while ensuring security and energy efficiency in GI-WBSNs. The contribution of this research is twofold. First, we establish a unique signature-hash (S-H) diversity approach in the authentication domain to optimize video authentication robustness and the authentication bit rate overhead over a wireless channel. Based on the full exploration of S-H authentication diversity, we propose a new two-tier signature-hash (TTSH) stream authentication scheme to improve the video quality by reducing authentication dependence overhead while protecting its integrity. Second, we propose to combine this authentication scheme with a unique S-H oriented unequal resource allocation (URA) scheme to improve the energy-distortion-authentication performance of wireless video delivery in GI-WBSN. Our analysis and simulation results demonstrate that the proposed TTSH with URA scheme achieves considerable gain in both authenticated video quality and energy efficiency.
Authentic leadership: application to women leaders
Hopkins, Margaret M.; O’Neil, Deborah A.
2015-01-01
The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women. PMID:26236254
Xavier's Take on Authentic Writing: Structuring Choices for Expression and Impact
ERIC Educational Resources Information Center
Behizadeh, Nadia
2015-01-01
Because authenticity in education is a subjective judgment regarding the meaningfulness of an activity, a need exists to co-investigate with students classroom factors increasing authenticity of writing. In this case study, one 8th grade student's needs for authentic writing are explored in detail. Xavier's take on authentic writing…
Authentic leadership: application to women leaders.
Hopkins, Margaret M; O'Neil, Deborah A
2015-01-01
The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women.
Localized lossless authentication watermark (LAW)
NASA Astrophysics Data System (ADS)
Celik, Mehmet U.; Sharma, Gaurav; Tekalp, A. Murat; Saber, Eli S.
2003-06-01
A novel framework is proposed for lossless authentication watermarking of images which allows authentication and recovery of original images without any distortions. This overcomes a significant limitation of traditional authentication watermarks that irreversibly alter image data in the process of watermarking and authenticate the watermarked image rather than the original. In particular, authenticity is verified before full reconstruction of the original image, whose integrity is inferred from the reversibility of the watermarking procedure. This reduces computational requirements in situations when either the verification step fails or the zero-distortion reconstruction is not required. A particular instantiation of the framework is implemented using a hierarchical authentication scheme and the lossless generalized-LSB data embedding mechanism. The resulting algorithm, called localized lossless authentication watermark (LAW), can localize tampered regions of the image; has a low embedding distortion, which can be removed entirely if necessary; and supports public/private key authentication and recovery options. The effectiveness of the framework and the instantiation is demonstrated through examples.
How to Speak an Authentication Secret Securely from an Eavesdropper
NASA Astrophysics Data System (ADS)
O'Gorman, Lawrence; Brotman, Lynne; Sammon, Michael
When authenticating over the telephone or mobile headphone, the user cannot always assure that no eavesdropper hears the password or authentication secret. We describe an eavesdropper-resistant, challenge-response authentication scheme for spoken authentication where an attacker can hear the user’s voiced responses. This scheme entails the user to memorize a small number of plaintext-ciphertext pairs. At authentication, these are challenged in random order and interspersed with camouflage elements. It is shown that the response can be made to appear random so that no information on the memorized secret can be learned by eavesdroppers. We describe the method along with parameter value tradeoffs of security strength, authentication time, and memory effort. This scheme was designed for user authentication of wireless headsets used for hands-free communication by healthcare staff at a hospital.
NASA Astrophysics Data System (ADS)
Sridevi, B.; Supriya, T. S.; Rajaram, S.
2013-01-01
The current generation of wireless networks has been designed predominantly to support voice and more recently data traffic. WiMAX is currently one of the hottest technologies in wireless. The main motive of the mobile technologies is to provide seamless cost effective mobility. But this is affected by Authentication cost and handover delay since on each handoff the Mobile Station (MS) has to undergo all steps of authentication. Pre-Authentication is used to reduce the handover delay and increase the speed of the Intra-ASN Handover. Proposed Pre-Authentication method is intended to reduce the authentication delay by getting pre authenticated by central authority called Pre Authentication Authority (PAA). MS requests PAA for Pre Authentication Certificate (PAC) before performing handoff. PAA verifies the identity of MS and provides PAC to MS and also to the neighboring target Base Stations (tBSs). MS having time bound PAC can skip the authentication process when recognized by target BS during handoff. It also prevents the DOS (Denial Of Service) attack and Replay attack. It has no wastage of unnecessary key exchange of the resources. The proposed work is simulated by NS2 model and by MATLAB.
Scalable Engineering of Quantum Optical Information Processing Architectures (SEQUOIA)
2016-12-13
arrays. Figure 4: An 8-channel fiber-coupled SNSPD array. 1.4 Post -fabrication-tunable linear optic fabrication We have analyzed the...performance of the programmable nanophotonic processor (PNP) that is dynamically tunable via post -fabrication active phase tuning to predict the scaling of...various device losses. PACS numbers: 42.50. Ex , 03.67.Dd, 03.67.Lx, 42.50.Dv I. INTRODUCTION Quantum key distribution (QKD) enables two distant authenticated
Schwartze, J; Haarbrandt, B; Fortmeier, D; Haux, R; Seidel, C
2014-01-01
Integration of electronic signatures embedded in health care processes in Germany challenges health care service and supply facilities. The suitability of the signature level of an eligible authentication procedure is confirmed for a large part of documents in clinical practice. However, the concrete design of such a procedure remains unclear. To create a summary of usable user authentication systems suitable for clinical workflows. A Systematic literature review based on nine online bibliographic databases. Search keywords included authentication, access control, information systems, information security and biometrics with terms user authentication, user identification and login in title or abstract. Searches were run between 7 and 12 September 2011. Relevant conference proceedings were searched manually in February 2013. Backward reference search of selected results was done. Only publications fully describing authentication systems used or usable were included. Algorithms or purely theoretical concepts were excluded. Three authors did selection independently. DATA EXTRACTION AND ASSESSMENT: Semi-structured extraction of system characteristics was done by the main author. Identified procedures were assessed for security and fulfillment of relevant laws and guidelines as well as for applicability. Suitability for clinical workflows was derived from the assessments using a weighted sum proposed by Bonneau. Of 7575 citations retrieved, 55 publications meet our inclusion criteria. They describe 48 different authentication systems; 39 were biometric and nine graphical password systems. Assessment of authentication systems showed high error rates above European CENELEC standards and a lack of applicability of biometric systems. Graphical passwords did not add overall value compared to conventional passwords. Continuous authentication can add an additional layer of safety. Only few systems are suitable partially or entirely for use in clinical processes. Suitability strongly depends on national or institutional requirements. Four authentication systems seem to fulfill requirements of authentication procedures for clinical workflows. Research is needed in the area of continuous authentication with biometric methods. A proper authentication system should combine all factors of authentication implementing and connecting secure individual measures.
NASA Astrophysics Data System (ADS)
Gong, Tao; Shuai, Lan; Wu, Yicheng
2014-12-01
By analyzing complex networks constructed from authentic language data, Cong and Liu [1] advance linguistics research into the big data era. The network approach has revealed many intrinsic generalities and crucial differences at both the macro and micro scales between human languages. The axiom behind this research is that language is a complex adaptive system [2]. Although many lexical, semantic, or syntactic features have been discovered by means of analyzing the static and dynamic linguistic networks of world languages, available network-based language studies have not explicitly addressed the evolutionary dynamics of language systems and the correlations between language and human cognition. This commentary aims to provide some insights on how to use the network approach to study these issues.
Authentic leadership: a new theory for nursing or back to basics?
Wong, Carol; Cummings, Greta
2009-01-01
Authentic leadership is an emerging theoretical model purported to focus on the root component of effective leadership. The purpose of this paper is to describe the relevance of authentic leadership to the advancement of nursing leadership practice and research and address the question of whether this is a new theory for leadership or an old one in new packaging. The paper outlines the origins and key elements of the model, assesses the theoretical, conceptual and measurement issues associated with authentic leadership and compares it with other leadership theories frequently reported in the nursing literature. The emerging authentic leadership theory holds promise for explaining the underlying processes by which authentic leaders and followers influence work outcomes and organizational performance. Construct validity of authentic leadership has preliminary documentation and a few studies have shown positive relationships between authenticity and trust. Furthermore, the clarity of the authenticity construct and comprehensiveness of the overall theoretical framework provide a fruitful base for future research examining the relationship between authentic leadership and the creation of healthier work environments. A clear focus on the relational aspects of leadership, the foundational moral/ethical component, a potential linkage of positive psychological capital to work engagement and the emphasis on leader and follower development in the authentic leadership framework are closely aligned to current and future nursing leadership practice and research priorities for the creation of sustainable changes in nursing work environments.
Drolet, Matthis; Schubotz, Ricarda I; Fischer, Julia
2013-06-01
Context has been found to have a profound effect on the recognition of social stimuli and correlated brain activation. The present study was designed to determine whether knowledge about emotional authenticity influences emotion recognition expressed through speech intonation. Participants classified emotionally expressive speech in an fMRI experimental design as sad, happy, angry, or fearful. For some trials, stimuli were cued as either authentic or play-acted in order to manipulate participant top-down belief about authenticity, and these labels were presented both congruently and incongruently to the emotional authenticity of the stimulus. Contrasting authentic versus play-acted stimuli during uncued trials indicated that play-acted stimuli spontaneously up-regulate activity in the auditory cortex and regions associated with emotional speech processing. In addition, a clear interaction effect of cue and stimulus authenticity showed up-regulation in the posterior superior temporal sulcus and the anterior cingulate cortex, indicating that cueing had an impact on the perception of authenticity. In particular, when a cue indicating an authentic stimulus was followed by a play-acted stimulus, additional activation occurred in the temporoparietal junction, probably pointing to increased load on perspective taking in such trials. While actual authenticity has a significant impact on brain activation, individual belief about stimulus authenticity can additionally modulate the brain response to differences in emotionally expressive speech.
Ragert, Marie; Schroeder, Tim; Keller, Peter E.
2013-01-01
Expert ensemble musicians produce exquisitely coordinated sounds, but rehearsal is typically required to do so. Ensemble coordination may thus be influenced by the degree to which individuals are familiar with each other's parts. Such familiarity may affect the ability to predict and synchronize with co-performers' actions. Internal models related to action simulation and anticipatory musical imagery may be affected by knowledge of (1) the musical structure of a co-performer's part (e.g., in terms of its rhythm and phrase structure) and/or (2) the co-performer's idiosyncratic playing style (e.g., expressive micro-timing variations). The current study investigated the effects of familiarity on interpersonal coordination in piano duos. Skilled pianists were required to play several duets with different partners. One condition included duets for which co-performers had previously practiced both parts, while another condition included duets for which each performer had practiced only their own part. Each piece was recorded six times without joint rehearsal or visual contact to examine the effects of increasing familiarity. Interpersonal coordination was quantified by measuring asynchronies between pianists' keystroke timing and the correlation of their body (head and torso) movements, which were recorded with a motion capture system. The results suggest that familiarity with a co-performer's part, in the absence of familiarity with their playing style, engenders predictions about micro-timing variations that are based instead upon one's own playing style, leading to a mismatch between predictions and actual events at short timescales. Predictions at longer timescales—that is, those related to musical measures and phrases, and reflected in head movements and body sway—are, however, facilitated by familiarity with the structure of a co-performer's part. These findings point to a dissociation between interpersonal coordination at the level of keystrokes and body movements. PMID:23805116
Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.
He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk
2014-10-01
The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.
Optical authentication based on moiré effect of nonlinear gratings in phase space
NASA Astrophysics Data System (ADS)
Liao, Meihua; He, Wenqi; Wu, Jiachen; Lu, Dajiang; Liu, Xiaoli; Peng, Xiang
2015-12-01
An optical authentication scheme based on the moiré effect of nonlinear gratings in phase space is proposed. According to the phase function relationship of the moiré effect in phase space, an arbitrary authentication image can be encoded into two nonlinear gratings which serve as the authentication lock (AL) and the authentication key (AK). The AL is stored in the authentication system while the AK is assigned to the authorized user. The authentication procedure can be performed using an optoelectronic approach, while the design process is accomplished by a digital approach. Furthermore, this optical authentication scheme can be extended for multiple users with different security levels. The proposed scheme can not only verify the legality of a user identity, but can also discriminate and control the security levels of legal users. Theoretical analysis and simulation experiments are provided to verify the feasibility and effectiveness of the proposed scheme.
Vein matching using artificial neural network in vein authentication systems
NASA Astrophysics Data System (ADS)
Noori Hoshyar, Azadeh; Sulaiman, Riza
2011-10-01
Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.
Kerberos authentication: The security answer for unsecured networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Engert, D.E.
1995-06-01
Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.
SSO - Single-Sign-On Profile: Authentication Mechanisms Version 2.0
NASA Astrophysics Data System (ADS)
Taffoni, Giuliano; Schaaf, André; Rixon, Guy; Major, Brian; Taffoni, Giuliano
2017-05-01
Approved client-server authentication mechanisms are described for the IVOA single-sign-on profile: No Authentication; HTTP Basic Authentication; TLS with passwords; TLS with client certificates; Cookies; Open Authentication; Security Assertion Markup Language; OpenID. Normative rules are given for the implementation of these mechanisms, mainly by reference to pre-existing standards. The Authorization mechanisms are out of the scope of this document.
22 CFR 92.40 - Authentication of foreign extradition papers.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission. ...
NASA Astrophysics Data System (ADS)
Gharami, Snigdha; Dinakaran, M.
2017-11-01
We see challenges in authenticating each aspect of electronic usage, starting from transaction to social interaction the authenticity and availability of correct information is guided in various ways. Authentication and authorization follow one another; a process of authentication is calculated on multiple layers of steps. In this paper we discuss various possibilities of modifying and using ways to deal with authentication and authorization mechanism. Idea is to work through authentication with mathematical calculations. We will go through various scenarios and find out the system of information that fits best at the moment of need. We will take account of new approaches of authentication and authorization while working on mathematical paradigm of information. The paper also takes an eye on quantum cryptography and discusses on how it could help one in the present scenario. This paper is divided into sections discussing on various paradigm of authentication and how one can achieve it in secure way, this paper is part of research work where analysis of various constraints are to be followed in the extended research work.
Phone, Email and Video Interactions with Characters in an Epidemiology Game: Towards Authenticity
NASA Astrophysics Data System (ADS)
Ney, Muriel; Gonçalves, Celso; Blacheff, Nicolas; Schwartz, Claudine; Bosson, Jean-Luc
A key concern in game-based learning is the level of authenticity that the game requires in order to have an accurate match of what the learners can expect in the real world with what they need to learn. In this paper, we show how four challenges to the designer of authentic games have been addressed in a game for an undergraduate course in a medical school. We focus in particular on the system of interaction with different characters of the game, namely, the patients and a number of professionals. Students use their personal phone and email application, as well as various web sites. First, we analyze the authenticity of the game through four attributes, authenticity of the character, of the content of the feedback, of the mode and channel of communication and of the constraints. Second, the perceived authenticity (by students) is analyzed. The later is threefold and defined by an external authenticity (perceived likeness with a real life reference), an internal authenticity (perceived internal coherence of the proposed situations) and a didactical authenticity (perceived relevance with respect to learning goals).
22 CFR 131.1 - Certification of documents.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Foreign Relations DEPARTMENT OF STATE MISCELLANEOUS CERTIFICATES OF AUTHENTICATION § 131.1 Certification of documents. The Authentication Officer, Acting Authentication Officer, or any Assistant Authentication Officer designated by either of the former officers may, and is hereby authorized to, sign and...
Study on a Biometric Authentication Model based on ECG using a Fuzzy Neural Network
NASA Astrophysics Data System (ADS)
Kim, Ho J.; Lim, Joon S.
2018-03-01
Traditional authentication methods use numbers or graphic passwords and thus involve the risk of loss or theft. Various studies are underway regarding biometric authentication because it uses the unique biometric data of a human being. Biometric authentication technology using ECG from biometric data involves signals that record electrical stimuli from the heart. It is difficult to manipulate and is advantageous in that it enables unrestrained measurements from sensors that are attached to the skin. This study is on biometric authentication methods using the neural network with weighted fuzzy membership functions (NEWFM). In the biometric authentication process, normalization and the ensemble average is applied during preprocessing, characteristics are extracted using Haar-wavelets, and a registration process called “training” is performed in the fuzzy neural network. In the experiment, biometric authentication was performed on 73 subjects in the Physionet Database. 10-40 ECG waveforms were tested for use in the registration process, and 15 ECG waveforms were deemed the appropriate number for registering ECG waveforms. 1 ECG waveforms were used during the authentication stage to conduct the biometric authentication test. Upon testing the proposed biometric authentication method based on 73 subjects from the Physionet Database, the TAR was 98.32% and FAR was 5.84%.
Bland, Andrew J; Topping, Annie; Tobbell, Jane
2014-07-01
High-fidelity patient simulation is a method of education increasingly utilised by educators of nursing to provide authentic learning experiences. Fidelity and authenticity, however, are not conceptually equivalent. Whilst fidelity is important when striving to replicate a life experience such as clinical practice, authenticity can be produced with low fidelity. A challenge for educators of undergraduate nursing is to ensure authentic representation of the clinical situation which is a core component for potential success. What is less clear is the relationship between fidelity and authenticity in the context of simulation based learning. Authenticity does not automatically follow fidelity and as a result, educators of nursing cannot assume that embracing the latest technology-based educational tools will in isolation provide a learning environment perceived authentic by the learner. As nursing education programmes increasingly adopt simulators that offer the possibility of representing authentic real world situations, there is an urgency to better articulate and understand the terms fidelity and authenticity. Without such understanding there is a real danger that simulation as a teaching and learning resource in nurse education will never reach its potential and be misunderstood, creating a potential barrier to learning. This paper examines current literature to promote discussion within nurse education, concluding that authenticity in the context of simulation-based learning is complex, relying on far more than engineered fidelity. Copyright © 2014 Elsevier Ltd. All rights reserved.
Location-assured, multifactor authentication on smartphones via LTE communication
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham
2013-05-01
With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using Smartphones. Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about the client itself (via PIN/biometric) as well as the client's current location, thus defines the important aspects of "who", "when", and "where" of the authentication attempt without eaves dropping or man on the middle attacks. To securely integrate location as an authentication factor into the remote authentication scheme, client's location must be verified independently, i.e. the authenticator should not solely rely on the location determined on and reported by the client's Smartphone. The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement of independent location verification. LTE's Control Plane LBS provisions, when integrated with user-based authentication and independent source of localisation factors ensures secure efficient, continuous location tracking of the Smartphone. This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location more securely and accurately. Trials and experiments show that such algorithm implementation is viable for nowadays Smartphone-based banking via LTE communication.
22 CFR 61.3 - Certification and authentication criteria.
Code of Federal Regulations, 2014 CFR
2014-04-01
... AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall certify or authenticate audio-visual materials submitted for review as educational, scientific and... of the material. (b) The Department will not certify or authenticate any audio-visual material...
22 CFR 61.3 - Certification and authentication criteria.
Code of Federal Regulations, 2013 CFR
2013-04-01
... AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall certify or authenticate audio-visual materials submitted for review as educational, scientific and... of the material. (b) The Department will not certify or authenticate any audio-visual material...
22 CFR 61.3 - Certification and authentication criteria.
Code of Federal Regulations, 2012 CFR
2012-04-01
... AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall certify or authenticate audio-visual materials submitted for review as educational, scientific and... of the material. (b) The Department will not certify or authenticate any audio-visual material...
Managing authenticity: the paradox of great leadership.
Goffee, Rob; Jones, Gareth
2005-12-01
Leaders and followers both associate authenticity with sincerity, honesty, and integrity. It's the real thing--the attribute that uniquely defines great managers. But while the expression of a genuine self is necessary for great leadership, the concept of authenticity is often misunderstood, not least by leaders themselves. They often assume that authenticity is an innate quality--that a person is either genuine or not. In fact, the authors say, authenticity is largely defined by what other people see in you and, as such, can to a great extent be controlled by you. In this article, the authors explore the qualities of authentic leadership. To illustrate their points, they recount the experiences of some of the authentic leaders they have known and studied, including the BBC's Greg Dyke, Nestlé's Peter Brabeck-Letmathe, and Marks & Spencer's Jean Tomlin. Establishing your authenticity as a leader is a two-part challenge. You have to consistently match your words and deeds; otherwise, followers will never accept you as authentic. But it is not enough just to practice what you preach. To get people to follow you, you also have to get them to relate to you. This means presenting different faces to different audiences--a requirement that many people find hard to square with authenticity. But authenticity is not the product of manipulation. It accurately reflects aspects of the leader's inner self, so it can't be an act. Authentic leaders seem to know which personality traits they should reveal to whom, and when. Highly attuned to their environments, authentic leaders rely on an intuition born of formative, sometimes harsh experiences to understand the expectations and concerns of the people they seek to influence. They retain their distinctiveness as individuals, yet they know how to win acceptance in strong corporate and social cultures and how to use elements of those cultures as a basis for radical change.
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.
Rajeswari, S Raja; Seenivasagam, V
2016-01-01
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
Rajeswari, S. Raja; Seenivasagam, V.
2016-01-01
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272
Emmerich, Astrid I; Rigotti, Thomas
2017-01-01
This study investigates the role of context-specific authenticity at work for work-related outcomes (intrinsic motivation, work ability) and depressivity. Furthermore reciprocal relations between work-related authenticity and healthy psychological functioning are investigated. Longitudinal data from 1,243 employees from 63 subsidiaries of a non-profit organization in the social sector were analyzed using multilevel structural equation modeling. Work-related authenticity at T1 predicted work ability and depressivity, but not intrinsic motivation at T2, about 6 months later. Work-related authenticity at T2 was predicted by intrinsic motivation and depressivity, but not by work ability at T1. We conclude that work-related authenticity and healthy psychological functioning are positively reinforcing each other. Thus, enabling employees to be authentic supposedly increases their well-being and is a pivotal opportunity for organizations to foster health and performance-related indicators like work ability and prevent negative health indicators like depressivity. At the same time, authenticity of employees can be fostered through workplace health promotion.
Study on the security of the authentication scheme with key recycling in QKD
NASA Astrophysics Data System (ADS)
Li, Qiong; Zhao, Qiang; Le, Dan; Niu, Xiamu
2016-09-01
In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero.
Compelling teaching with the four Cs: caring, comedy, creativity, and challenging.
Story, Lachel; Butts, Janie B
2010-05-01
The traditional classroom, particularly in nursing, often is stifling to students and teachers. A dynamic co-learning experience creates a potential to move students from merely obtaining knowledge to practice. This article presents an exemplar of the transformative learning process within the nursing education setting. The concepts forming this compelling teaching approach are caring, comedy, creativity, and challenging (the four Cs). Through this innovative teaching method, opportunities are created for authentic co-learning to occur.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 1 2013-01-01 2013-01-01 false Authentication. 1.22 Section 1.22 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.22 Authentication. When a request is received for an authenticated copy of a document that the agency determines to make...
Authentic Montessori: The Teacher Makes the Difference
ERIC Educational Resources Information Center
Huxel, Alexa C.
2013-01-01
What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…
36 CFR 1275.66 - Reproduction and authentication of other materials.
Code of Federal Regulations, 2010 CFR
2010-07-01
... authentication of other materials. 1275.66 Section 1275.66 Parks, Forests, and Public Property NATIONAL ARCHIVES... Reproduction and authentication of other materials. (a) Copying of materials, including tape recordings... materials when necessary for the purpose of the research. (c) The fees for reproduction and authentication...
22 CFR 92.37 - Authentication procedure.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication procedure. 92.37 Section 92.37... Notarial Acts § 92.37 Authentication procedure. (a) The consular officer must compare the foreign official...) Where the State law requires the consular officer's certificate of authentication to show that the...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 1 2010-01-01 2010-01-01 false Authentication. 1.22 Section 1.22 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.22 Authentication. When a request is received for an authenticated copy of a document that the agency determines to make...
Authentic leadership: becoming and remaining an authentic nurse leader.
Murphy, Lin G
2012-11-01
This article explores how chief nurse executives became and remained authentic leaders. Using narrative inquiry, this qualitative study focused on the life stories of participants. Results demonstrate the importance of reframing, reflection in alignment with values, and the courage needed as nurse leaders progress to authenticity.
Ninth Grade Student Responses to Authentic Science Instruction
NASA Astrophysics Data System (ADS)
Ellison, Michael Steven
This mixed methods case study documents an effort to implement authentic science and engineering instruction in one teacher's ninth grade science classrooms in a science-focused public school. The research framework and methodology is a derivative of work developed and reported by Newmann and others (Newmann & Associates, 1996). Based on a working definition of authenticity, data were collected for eight months on the authenticity in the experienced teacher's pedagogy and in student performance. Authenticity was defined as the degree to which a classroom lesson, an assessment task, or an example of student performance demonstrates construction of knowledge through use of the meaning-making processes of science and engineering, and has some value to students beyond demonstrating success in school (Wehlage et al., 1996). Instruments adapted for this study produced a rich description of the authenticity of the teacher's instruction and student performance. The pedagogical practices of the classroom teacher were measured as moderately authentic on average. However, the authenticity model revealed the teacher's strategy of interspersing relatively low authenticity instructional units focused on building science knowledge with much higher authenticity tasks requiring students to apply these concepts and skills. The authenticity of the construction of knowledge and science meaning-making processes components of authentic pedagogy were found to be greater, than the authenticity of affordances for students to find value in classroom activities beyond demonstrating success in school. Instruction frequently included one aspect of value beyond school, connections to the world outside the classroom, but students were infrequently afforded the opportunity to present their classwork to audiences beyond the teacher. When the science instruction in the case was measured to afford a greater level of authentic intellectual work, a higher level of authentic student performance on science classwork was also measured. In addition, direct observation measures of student behavioral engagement showed that behavioral engagement was generally high, but not associated with the authenticity of the pedagogy. Direct observation measures of student self-regulation found evidence that when instruction focused on core science and engineering concepts and made stronger connections to the student's world beyond the classroom, student self-regulated learning was greater, and included evidence of student ownership. In light of the alignment between the model of authenticity used in this study and the Next Generation Science Standards (NGSS), the results suggest that further research on the value beyond school component of the model could improve understanding of student engagement and performance in response to the implementation of the NGSS. In particular, it suggests a unique role environmental education can play in affording student success in K-12 science and a tool to measure that role.
Lee, Tian-Fu; Liu, Chuan-Ming
2013-06-01
A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.
Kent, Alexander Dale [Los Alamos, NM
2008-09-02
Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.
ERIC Educational Resources Information Center
Gulikers, Judith T. M.; Bastiaens, Theo J.; Kirschner, Paul A.; Kester, Liesbeth
2006-01-01
This article examines the relationships between perceptions of authenticity and alignment on study approach and learning outcome. Senior students of a vocational training program performed an authentic assessment and filled in a questionnaire about the authenticity of various assessment characteristics and the alignment between the assessment and…
School Principals' Authentic Leadership and Teachers' Psychological Capital: Teachers' Perspectives
ERIC Educational Resources Information Center
Feng, Feng-I
2016-01-01
This study examined teachers' perceptions of principals' authentic leadership and the relationship of authentic leadership to teachers' psychological capital in Taiwan. A total of 1,429 elementary and secondary school teachers were surveyed. The results showed that teachers perceived their principals' authentic leadership as moderate and that the…
21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.
Code of Federal Regulations, 2010 CFR
2010-04-01
... substance prescriptions and who has obtained a two-factor authentication credential as provided in § 1311... his two-factor authentication credential to satisfy the logical access controls. The second individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised. Such...
31 CFR 363.21 - When may you require offline authentication and documentary evidence?
Code of Federal Regulations, 2010 CFR
2010-07-01
... authentication and documentary evidence? 363.21 Section 363.21 Money and Finance: Treasury Regulations Relating... TreasuryDirect § 363.21 When may you require offline authentication and documentary evidence? We may require offline authentication and documentary evidence at our option. [74 FR 19419, Apr. 29, 2009] ...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for obtaining an authentication... Prescriptions § 1311.110 Requirements for obtaining an authentication credential—Individual practitioners... credentialing office) may conduct identity proofing and authorize the issuance of the authentication credential...
Toward Developing Authentic Leadership: Team-Based Simulations
ERIC Educational Resources Information Center
Shapira-Lishchinsky, Orly
2014-01-01
Although there is a consensus that authentic leadership should be an essential component in educational leadership, no study to date has ever tried to find whether team-based simulations may promote authentic leadership. The purpose of this study was to identify whether principal trainees can develop authentic leadership through ethical decision…
Learning How to Lead: A Lifetime Journey
ERIC Educational Resources Information Center
Baugher, Shirley L.
2005-01-01
Much has been written about theories of leadership, leadership qualities, and the development of leadership. In this article, the author focuses on the work of Kevin Cashman, who proposed the following "Five Touchstones" that are crucial to authentic leadership: (1) Know Yourself Authentically; (2) Listen Authentically; (3) Express Authentically;…
Authenticity in the Bureau-Enterprise Culture: The Struggle for Authentic Meaning
ERIC Educational Resources Information Center
Woods, Philip A.
2007-01-01
This article emphasizes the extent to which conceptions of authenticity are forged through social interaction and socially mediated identities and how, in turn, authentic leadership involves the transformation of the organizational, social or cultural order in which leadership is situated. The overarching context for this exploration of authentic…
Teachers' Development Model to Authentic Assessment by Empowerment Evaluation Approach
ERIC Educational Resources Information Center
Charoenchai, Charin; Phuseeorn, Songsak; Phengsawat, Waro
2015-01-01
The purposes of this study were 1) Study teachers authentic assessment, teachers comprehension of authentic assessment and teachers needs for authentic assessment development. 2) To create teachers development model. 3) Experiment of teachers development model. 4) Evaluate effectiveness of teachers development model. The research is divided into 4…
Trustworthiness and Authenticity: Alternate Ways To Judge Authentic Assessments.
ERIC Educational Resources Information Center
Hipps, Jerome A.
New methods are needed to judge the quality of alternative student assessment, methods which complement the philosophy underlying authentic assessments. This paper examines assumptions underlying validity, reliability, and objectivity, and why they are not matched to authentic assessment, concentrating on the constructivist paradigm of E. Guba and…
[Causes for change in producing areas of geo-authentic herbs].
Liang, Fei; Li, Jian; Zhang, Wei; Zhang, Rui-Xian
2013-05-01
Geo-authentic herbs lay stress on their producing areas. The producing areas of most geo-authentic herbs have never changed since the ancient times. However, many other geo-authentic herbs have experienced significant changes in the long history. There are two main causes for the change in producing areas of herbs-change of natural environment and development of human society, which are restricted by each other and play a great role throughout the development process of geo-authentic herbs.
An Efficient Authenticated Key Transfer Scheme in Client-Server Networks
NASA Astrophysics Data System (ADS)
Shi, Runhua; Zhang, Shun
2017-10-01
In this paper, we presented a novel authenticated key transfer scheme in client-server networks, which can achieve two secure goals of remote user authentication and the session key establishment between the remote user and the server. Especially, the proposed scheme can subtly provide two fully different authentications: identity-base authentication and anonymous authentication, while the remote user only holds a private key. Furthermore, our scheme only needs to transmit 1-round messages from the remote user to the server, thus it is very efficient in communication complexity. In addition, the most time-consuming computation in our scheme is elliptic curve scalar point multiplication, so it is also feasible even for mobile devices.
Gjersoe, Nathalia L.; Newman, George E.; Chituc, Vladimir; Hood, Bruce
2014-01-01
The current studies examine how valuation of authentic items varies as a function of culture. We find that U.S. respondents value authentic items associated with individual persons (a sweater or an artwork) more than Indian respondents, but that both cultures value authentic objects not associated with persons (a dinosaur bone or a moon rock) equally. These differences cannot be attributed to more general cultural differences in the value assigned to authenticity. Rather, the results support the hypothesis that individualistic cultures place a greater value on objects associated with unique persons and in so doing, offer the first evidence for how valuation of certain authentic items may vary cross-culturally. PMID:24658437
Gjersoe, Nathalia L; Newman, George E; Chituc, Vladimir; Hood, Bruce
2014-01-01
The current studies examine how valuation of authentic items varies as a function of culture. We find that U.S. respondents value authentic items associated with individual persons (a sweater or an artwork) more than Indian respondents, but that both cultures value authentic objects not associated with persons (a dinosaur bone or a moon rock) equally. These differences cannot be attributed to more general cultural differences in the value assigned to authenticity. Rather, the results support the hypothesis that individualistic cultures place a greater value on objects associated with unique persons and in so doing, offer the first evidence for how valuation of certain authentic items may vary cross-culturally.
NASA Astrophysics Data System (ADS)
Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo
2016-12-01
Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.
A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks
Chen, Huifang; Ge, Linlin; Xie, Lei
2015-01-01
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224
A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.
Chen, Huifang; Ge, Linlin; Xie, Lei
2015-07-14
The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.
Secure ADS-B authentication system and method
NASA Technical Reports Server (NTRS)
Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)
2010-01-01
A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.
Reconciling Divisions in the Field of Authentic Education
ERIC Educational Resources Information Center
Sarid, Ariel
2015-01-01
The aim of this article is twofold: first, to identify and address three central divisions in the field of authentic education that introduce ambiguity and at times inconsistencies within the field of authentic education. These divisions concern a) the relationship between autonomy and authenticity; b) the division between the two basic attitudes…
ERIC Educational Resources Information Center
Ramezanzadeh, Akram; Adel, Seyyed Mohammad Reza; Zareian, Gholamreza
2016-01-01
This study probed the conceptualization of authenticity in teaching and its link to teachers' emotional life through critical emotional praxis because emotions are integral to discovering who we really are (McCarthy, E. D. 2009. "Emotional Performances as Dramas of Authenticity." In "Authenticity in Culture, Self, and Society,"…
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Authentication and certification... Suspension and Revocation Hearings § 20.1303 Authentication and certification of extracts from shipping...) Authentication and certification must include a statement that the person acting has seen the original, compared...
An Examination of Teacher Authenticity in the College Classroom
ERIC Educational Resources Information Center
Johnson, Zac D.; LaBelle, Sara
2017-01-01
This study sought to generate a more robust understanding of teacher (in)authenticity. In other contexts, authenticity is regarded as a display of true self and has been positively linked to beneficial psychological (e.g., increased self-esteem) and social outcomes (e.g., higher relational satisfaction). However, what it means to be authentic in…
Commonalities and Specificities of Authentic Leadership in Ghana and New Zealand
ERIC Educational Resources Information Center
Owusu-Bempah, Justice; Addison, Ramzi; Fairweather, John
2014-01-01
The authentic leadership literature suggests that there are three critical elements that precede the bestowal of authentic leadership: first, the espoused values and actions of authentic leaders must be congruent; second, the expectation of the leaders and the followers must be congruent; and, third, the leaders must behave with high moral…
ERIC Educational Resources Information Center
Everett, Donna R.
This guide presents performance-based authentic assessment ideas, samples, and suggestions to help marketing teachers and students respond to changes and pressures from outside the classroom. It contains 21 activities, each accompanied by a method of authentic assessment. In most cases, the authentic assessment method is a scoring device. The…
ERIC Educational Resources Information Center
Stone, Anne H.
2012-01-01
Purpose: The purpose of this study was to identify what leadership coaches perceive to be the benefits of authenticity to their clients' success. Another purpose was to identify what barriers leadership coaches perceive as preventing their clients from developing authenticity. A final purpose of this study was to identify which strategies…
Authentic e-Learning in a Multicultural Context: Virtual Benchmarking Cases from Five Countries
ERIC Educational Resources Information Center
Leppisaari, Irja; Herrington, Jan; Vainio, Leena; Im, Yeonwook
2013-01-01
The implementation of authentic learning elements at education institutions in five countries, eight online courses in total, is examined in this paper. The International Virtual Benchmarking Project (2009-2010) applied the elements of authentic learning developed by Herrington and Oliver (2000) as criteria to evaluate authenticity. Twelve…
Developmental Changes in Judgments of Authentic Objects
ERIC Educational Resources Information Center
Frazier, Brandy N.; Gelman, Susan A.
2009-01-01
This study examined the development of an understanding of authenticity among 112 children (preschoolers, kindergarten, 1st graders, and 4th graders) and 119 college students. Participants were presented with pairs of photographs depicting authentic and non-authentic objects and asked to pick which one belongs in a museum and which one they would…
Using Horses to Teach Authentic Leadership Skills to At-Risk Youth
ERIC Educational Resources Information Center
Adams, Brittany Lee
2013-01-01
The primary purpose of this study was to determine the impact of an equine-facilitated authentic leadership development program on at-risk youth. Participants were asked to participate in two focus groups and a 3-day equine-facilitated authentic leadership development program based on Bill George's Model of Authentic Leadership. Participants were…
Emmerich, Astrid I.; Rigotti, Thomas
2017-01-01
This study investigates the role of context-specific authenticity at work for work-related outcomes (intrinsic motivation, work ability) and depressivity. Furthermore reciprocal relations between work-related authenticity and healthy psychological functioning are investigated. Longitudinal data from 1,243 employees from 63 subsidiaries of a non-profit organization in the social sector were analyzed using multilevel structural equation modeling. Work-related authenticity at T1 predicted work ability and depressivity, but not intrinsic motivation at T2, about 6 months later. Work-related authenticity at T2 was predicted by intrinsic motivation and depressivity, but not by work ability at T1. We conclude that work-related authenticity and healthy psychological functioning are positively reinforcing each other. Thus, enabling employees to be authentic supposedly increases their well-being and is a pivotal opportunity for organizations to foster health and performance-related indicators like work ability and prevent negative health indicators like depressivity. At the same time, authenticity of employees can be fostered through workplace health promotion. PMID:28316581
Manticore and CS mode : parallelizable encryption with joint cipher-state authentication.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Torgerson, Mark Dolan; Draelos, Timothy John; Schroeppel, Richard Crabtree
2004-10-01
We describe a new mode of encryption with inexpensive authentication, which uses information from the internal state of the cipher to provide the authentication. Our algorithms have a number of benefits: (1) the encryption has properties similar to CBC mode, yet the encipherment and authentication can be parallelized and/or pipelined, (2) the authentication overhead is minimal, and (3) the authentication process remains resistant against some IV reuse. We offer a Manticore class of authenticated encryption algorithms based on cryptographic hash functions, which support variable block sizes up to twice the hash output length and variable key lengths. A proof ofmore » security is presented for the MTC4 and Pepper algorithms. We then generalize the construction to create the Cipher-State (CS) mode of encryption that uses the internal state of any round-based block cipher as an authenticator. We provide hardware and software performance estimates for all of our constructions and give a concrete example of the CS mode of encryption that uses AES as the encryption primitive and adds a small speed overhead (10-15%) compared to AES alone.« less
A Key Establishment Protocol for RFID User in IPTV Environment
NASA Astrophysics Data System (ADS)
Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho
In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.
The influence of authentic leadership on safety climate in nursing.
Dirik, Hasan Fehmi; Seren Intepeler, Seyda
2017-07-01
This study analysed nurses' perceptions of authentic leadership and safety climate and examined the contribution of authentic leadership to the safety climate. It has been suggested and emphasised that authentic leadership should be used as a guidance to ensure quality care and the safety of patients and health-care personnel. This predictive study was conducted with 350 nurses in three Turkish hospitals. The data were collected using the Authentic Leadership Questionnaire and the Safety Climate Survey and analysed using hierarchical regression analysis. The mean authentic leadership perception and the safety climate scores of the nurses were 2.92 and 3.50, respectively. The percentage of problematic responses was found to be less than 10% for only four safety climate items. Hierarchical regression analysis revealed that authentic leadership significantly predicted the safety climate. Procedural and political improvements are required in terms of the safety climate in institutions, where the study was conducted, and authentic leadership increases positive perceptions of safety climate. Exhibiting the characteristics of authentic leadership, or improving them and reflecting them on to personnel can enhance the safety climate. Planning information sharing meetings to raise the personnel's awareness of safety climate and systemic improvements can contribute to creating safe care climates. © 2017 John Wiley & Sons Ltd.
Limitations and requirements of content-based multimedia authentication systems
NASA Astrophysics Data System (ADS)
Wu, Chai W.
2001-08-01
Recently, a number of authentication schemes have been proposed for multimedia data such as images and sound data. They include both label based systems and semifragile watermarks. The main requirement for such authentication systems is that minor modifications such as lossy compression which do not alter the content of the data preserve the authenticity of the data, whereas modifications which do modify the content render the data not authentic. These schemes can be classified into two main classes depending on the model of image authentication they are based on. One of the purposes of this paper is to look at some of the advantages and disadvantages of these image authentication schemes and their relationship with fundamental limitations of the underlying model of image authentication. In particular, we study feature-based algorithms which generate an authentication tag based on some inherent features in the image such as the location of edges. The main disadvantage of most proposed feature-based algorithms is that similar images generate similar features, and therefore it is possible for a forger to generate dissimilar images that have the same features. On the other hand, the class of hash-based algorithms utilizes a cryptographic hash function or a digital signature scheme to reduce the data and generate an authentication tag. It inherits the security of digital signatures to thwart forgery attacks. The main disadvantage of hash-based algorithms is that the image needs to be modified in order to be made authenticatable. The amount of modification is on the order of the noise the image can tolerate before it is rendered inauthentic. The other purpose of this paper is to propose a multimedia authentication scheme which combines some of the best features of both classes of algorithms. The proposed scheme utilizes cryptographic hash functions and digital signature schemes and the data does not need to be modified in order to be made authenticatable. Several applications including the authentication of images on CD-ROM and handwritten documents will be discussed.
NASA Astrophysics Data System (ADS)
Dohaney, J. A.; kennedy, B.; Brogt, E.; Gravley, D.; Wilson, T.; O'Steen, B.
2011-12-01
This qualitative study investigates behaviors and experiences of upper-year geosciences undergraduate students during an intensive role-play simulation, in which the students interpret geological data streams and manage a volcanic crisis event. We present the development of the simulation, its academic tasks, (group) role assignment strategies and planned facilitator interventions over three iterations. We aim to develop and balance an authentic, intensive and highly engaging capstone activity for volcanology and geo-hazard courses. Interview data were collected from academic and professional experts in the fields of Volcanology and Hazard Management (n=11) in order to characterize expertise in the field, characteristics of key roles in the simulation, and to validate the authenticity of tasks and scenarios. In each iteration, observations and student artifacts were collected (total student participants: 68) along with interviews (n=36) and semi-structured, open-ended questionnaires (n=26). Our analysis of these data indicates that increasing the structure (i.e. organization, role-specific tasks and responsibilities) lessens non-productive group dynamics, which allows for an increase in difficulty of academic tasks within the simulation without increasing the cognitive load on students. Under these conditions, students exhibit professional expert-like behaviours, in particular in the quality of decision-making, communication skills and task-efficiency. In addition to illustrating the value of using this simulation to teach geosciences concepts, this study has implications for many complex situated-learning activities.
ERIC Educational Resources Information Center
Smith, Jane; Wiese, Patricia
2006-01-01
This article discusses the importance of authentic picture-storybook adaptations of multicultural folktales and describes an action research project through which a children's picture-book adaptation of a traditional tale can be authenticated using an inquiry-based process. In addition to modeling an actual authentication project using "The Golden…
21 CFR 20.3 - Certification and authentication of Food and Drug Administration records.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Certification and authentication of Food and Drug... authentication of Food and Drug Administration records. (a) Upon request, the Food and Drug Administration will... or for authentication of records shall be sent in writing to the Freedom of Information Staff (HFI-35...
Children's and Adolescents' Perception of the Authenticity of Smiles
ERIC Educational Resources Information Center
Thibault, Pascal; Gosselin, Pierre; Brunel, Marie-Lise; Hess, Ursula
2009-01-01
Recently, Thibault and colleagues described the Duchenne marker as a cultural dialect for the perception of smile authenticity. The current study had the goal to follow up on this finding and to investigate the cues that French Canadian children use to evaluate the authenticity of smiles from members of three ethnic groups. The authenticity of six…
Meeting EFL Learners Halfway by Using Locally Relevant Authentic Materials
ERIC Educational Resources Information Center
Thomas, Catherine
2014-01-01
The author defines and describes authentic materials and discusses their benefits--citing the Input Hypothesis and the Output Principle in support of such materials--as well as some challenges of using authentic materials. Five categories of authentic materials are presented, and sources for materials and ways to use them in the EFL classroom are…
Service Oriented Architecture Security Risks and their Mitigation
2012-10-01
this section can be mitigated by making use of suitable authentication , confidentiality, integrity, and authorisation standards such as Security...for authorisation . Machines/non-human users should be clearly identified and authenticated by the identity provision and authentication services... authentication , any security related attributes for the subject, and the authorisation decisions given based on the security and privilege attributes
A Framework for Determining the Authenticity of Assessment Tasks: Applied to an Example in Law
ERIC Educational Resources Information Center
Burton, Kelley
2011-01-01
Authentic assessment tasks enhance engagement, retention and the aspirations of students. This paper explores the discipline-generic features of authentic assessment, which reflect what students need to achieve in the real world. Some assessment tasks are more authentic than others and this paper designs a proposed framework supported by the…
ERIC Educational Resources Information Center
Hardre, Patricia L.
2013-01-01
Authenticity is a key to using technology for instruction in ways that enhance learning and support learning transfer. Simply put, a representation is authentic when it shows learners clearly what a task, context, or experience will be like in real practice. More authentic representations help people learn and understand better. They support…
Authentic leadership: develop the leader within.
Yasinski, Lesia
2014-03-01
Great leadership usually starts with a willing heart, a positive attitude, and a desire to make a difference. Strong leadership is important, in today's health care climate, to ensure optimal patient outcomes and the fostering of future generations of knowledgeable, motivated and enthusiastic perioperative nurses. This article will explore key elements necessary for the development of authentic leadership. While highlighting the role that personal development plays in leadership skills, this article will also discuss ways to cultivate authenticity in leadership. The following questions will be addressed: What is authentic leadership? How does one become an authentic leader?
[Brief introduction of geo-authentic herbs].
Liang, Fei; Li, Jian; Zhang, Wei; Zhang, Rui-Xian
2013-05-01
The science of geo-authentic herbs is a characteristic discipline of traditional Chinese medicine established during thousands of years of clinical practices. It has a long history under the guidance of profound theories of traditional Chinese medicine. The words of "geo-authentic product" were derived from an administrative division unit in the ancient times, which layed stress on the good quality of products in particular regions. In ancient records of traditional Chinese medicine, the words of "geo-authentic product" were first found in Concise Herbal Foundation Compilation of the Ming dynasty, and the words of "geo-authentic herbs" were first discovered in Peony Pavilion of the late Ming dynasty. After all, clinical effect is the fundamental evaluation standard of geo-authentic herbs.
Women outperform men in distinguishing between authentic and nonauthentic smiles.
Spies, Maren; Sevincer, A Timur
2017-11-28
Women tend to be more accurate in decoding facial expressions than men. We hypothesized that women's better performance in decoding facial expressions extends to distinguishing between authentic and nonauthentic smiles. We showed participants portrait photos of persons who smiled because either they saw a pleasant picture (authentic smile) or were instructed to smile by the experimenter (nonauthentic smile) and asked them to identify the smiles. Participants judged single photos of persons depicting either an authentic or a nonauthentic smile, and they judged adjacent photos of the same person depicting an authentic smile and a nonauthentic smile. Women outperformed men in identifying the smiles when judging the adjacent photos. We discuss implications for judging smile authenticity in real life and limitations for the observed sex difference.
A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography
NASA Astrophysics Data System (ADS)
Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan
Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.
Relationship authenticity partially mediates the effects of attachment on relationship satisfaction.
Rasco, Danney; Warner, Rebecca M
2017-01-01
Individuals with anxious and avoidant attachment tend to experience less satisfaction in their relationships. Past research suggests the negative effects of attachment on relationship satisfaction may be partially mediated by self-disclosure and self-concealment; the present study evaluated relationship authenticity as a potential additional mediator. Confirmatory factor analysis indicated that relationship authenticity is distinct from self-disclosure and self-concealment. Relationship authenticity predicted additional variance in relationship satisfaction controlling for attachment, self-disclosure, and self-concealment. The results were consistent with relationship authenticity, along with self-disclosure and self-concealment, partially mediating the effects of attachment on relationship satisfaction. These findings suggest that relationship authenticity may play a unique role in understanding how attachment influences relationship satisfaction. Theoretical and clinical implications are discussed.
NASA Astrophysics Data System (ADS)
Hardyanti, R. C.; Hartono; Fianti
2018-03-01
Physics Learning in Curriculum of 2013 is closely related to the implementation of scientific approach and authentic assessment in learning. This study aims to analyze the implementation of scientific approaches and authentic assessment in physics learning, as well as to analyze the constraints of scientific approach and authentic assessment in physics learning. The data collection techniques used in this study are questionnaires, observations, interviews, and documentation. The calculation results used are percentage techniques and analyzed by using qualitative descriptive approach. Based on the results of research and discussion, the implementation of physics learning based on the scientific approach goes well with the percentage of 84.60%. Physical learning activity based on authentic assessment also goes well with the percentage of 88%. The results of the percentage of scientific approaches and authentic assessment approaches are less than 100%. It shows that there are obstacles to the implementation of the scientific approach and the constraints of authentic assessment. The obstacles to the implementation of scientific approach include time, heavy load of material, input or ability of learners, the willingness of learners in asking questions, laboratory support, and the ability of students to process data. While the obstacles to the implementation of authentic assessment include the limited time for carrying out of authentic assessment, the components of the criteria in carrying out the authentic assessment, the lack of discipline in administering the administration, the difficulty of changing habits in carrying out the assessment from traditional assessment to the authentic assessment, the obstacle to process the score in accordance with the format Curriculum of 2013.
Discovering your authentic leadership.
George, Bill; Sims, Peter; McLean, Andrew N; Mayer, Diana
2007-02-01
The ongoing problems in business leadership over the past five years have underscored the need for a new kind of leader in the twenty-first century: the authentic leader. Author Bill George, a Harvard Business School professor and the former chairman and CEO of Medtronic, and his colleagues, conducted the largest leadership development study ever undertaken. They interviewed 125 business leaders from different racial, religious, national, and socioeconomic backgrounds to understand how leaders become and remain authentic. Their interviews showed that you do not have to be born with any particular characteristics or traits to lead. You also do not have to be at the top of your organization. Anyone can learn to be an authentic leader. The journey begins with leaders understanding their life stories. Authentic leaders frame their stories in ways that allow them to see themselves not as passive observers but as individuals who learn from their experiences. These leaders make time to examine their experiences and to reflect on them, and in doing so they grow as individuals and as leaders. Authentic leaders also work hard at developing self-awareness through persistent and often courageous self-exploration. Denial can be the greatest hurdle that leaders face in becoming self-aware, but authentic leaders ask for, and listen to, honest feedback. They also use formal and informal support networks to help them stay grounded and lead integrated lives. The authors argue that achieving business results over a sustained period of time is the ultimate mark of authentic leadership. It may be possible to drive short-term outcomes without being authentic, but authentic leadership is the only way to create long-term results.
A Continuous Identity Authentication Scheme Based on Physiological and Behavioral Characteristics.
Wu, Guannan; Wang, Jian; Zhang, Yongrong; Jiang, Shuai
2018-01-10
Wearable devices have flourished over the past ten years providing great advantages to people and, recently, they have also been used for identity authentication. Most of the authentication methods adopt a one-time authentication manner which cannot provide continuous certification. To address this issue, we present a two-step authentication method based on an own-built fingertip sensor device which can capture motion data (e.g., acceleration and angular velocity) and physiological data (e.g., a photoplethysmography (PPG) signal) simultaneously. When the device is worn on the user's fingertip, it will automatically recognize whether the wearer is a legitimate user or not. More specifically, multisensor data is collected and analyzed to extract representative and intensive features. Then, human activity recognition is applied as the first step to enhance the practicability of the authentication system. After correctly discriminating the motion state, a one-class machine learning algorithm is applied for identity authentication as the second step. When a user wears the device, the authentication process is carried on automatically at set intervals. Analyses were conducted using data from 40 individuals across various operational scenarios. Extensive experiments were executed to examine the effectiveness of the proposed approach, which achieved an average accuracy rate of 98.5% and an F1-score of 86.67%. Our results suggest that the proposed scheme provides a feasible and practical solution for authentication.
A Continuous Identity Authentication Scheme Based on Physiological and Behavioral Characteristics
Wu, Guannan; Wang, Jian; Zhang, Yongrong; Jiang, Shuai
2018-01-01
Wearable devices have flourished over the past ten years providing great advantages to people and, recently, they have also been used for identity authentication. Most of the authentication methods adopt a one-time authentication manner which cannot provide continuous certification. To address this issue, we present a two-step authentication method based on an own-built fingertip sensor device which can capture motion data (e.g., acceleration and angular velocity) and physiological data (e.g., a photoplethysmography (PPG) signal) simultaneously. When the device is worn on the user’s fingertip, it will automatically recognize whether the wearer is a legitimate user or not. More specifically, multisensor data is collected and analyzed to extract representative and intensive features. Then, human activity recognition is applied as the first step to enhance the practicability of the authentication system. After correctly discriminating the motion state, a one-class machine learning algorithm is applied for identity authentication as the second step. When a user wears the device, the authentication process is carried on automatically at set intervals. Analyses were conducted using data from 40 individuals across various operational scenarios. Extensive experiments were executed to examine the effectiveness of the proposed approach, which achieved an average accuracy rate of 98.5% and an F1-score of 86.67%. Our results suggest that the proposed scheme provides a feasible and practical solution for authentication. PMID:29320463
42 CFR 401.140 - Fees and charges.
Code of Federal Regulations, 2010 CFR
2010-10-01
... for records; and (3) Certification or authentication of records. (b) Fee schedules. The fee schedule.... (3) Certification or authentication of records. Three dollars per certification or authentication. (4...
Code of Federal Regulations, 2010 CFR
2010-07-01
... that my password or other form of authentication has become compromised? 363.19 Section 363.19 Money... that my password or other form of authentication has become compromised? If you become aware that your password has become compromised, that any other form of authentication has been compromised, lost, stolen...
ERIC Educational Resources Information Center
Mattord, Herbert J.
2012-01-01
Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS). It developed an Authentication Method System Index (AMSI) to analyze collected data from…
ERIC Educational Resources Information Center
Thompson, Merlin B.
2015-01-01
The problem with authenticity--the idea of being "true to one's self"--is that its somewhat checkered reputation garners a complete range of favorable and unfavorable reactions. In educational settings, authenticity is lauded as one of the top two traits students desire in their teachers. Yet, authenticity is criticized for its tendency…
Robust authentication through stochastic femtosecond laser filament induced scattering surfaces
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Haisu; Tzortzakis, Stelios, E-mail: stzortz@iesl.forth.gr; Materials Science and Technology Department, University of Crete, 71003 Heraklion
2016-05-23
We demonstrate a reliable authentication method by femtosecond laser filament induced scattering surfaces. The stochastic nonlinear laser fabrication nature results in unique authentication robust properties. This work provides a simple and viable solution for practical applications in product authentication, while also opens the way for incorporating such elements in transparent media and coupling those in integrated optical circuits.
Obfuscated authentication systems, devices, and methods
Armstrong, Robert C; Hutchinson, Robert L
2013-10-22
Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu
2016-01-01
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
Girls' relationship authenticity and self-esteem across adolescence.
Impett, Emily A; Sorsoli, Lynn; Schooler, Deborah; Henson, James M; Tolman, Deborah L
2008-05-01
Feminist psychologists have long posited that relationship authenticity (i.e., the congruence between what one thinks and feels and what one does and says in relational contexts) is integral to self-esteem and well-being. Guided by a feminist developmental framework, the authors investigated the role of relationship authenticity in promoting girls' self-esteem over the course of adolescence. Latent growth curve modeling was used to test the association between relationship authenticity and self-esteem with data from a 5-year, 3-wave longitudinal study of 183 adolescent girls. Results revealed that both relationship authenticity and self-esteem increased steadily in a linear fashion from the 8th to the 12th grade. Girls who scored high on the measure of relationship authenticity in the 8th grade experienced greater increases in self-esteem over the course of adolescence than girls who scored low on relationship authenticity. Further, girls who increased in authenticity also tended to increase in self-esteem over the course of adolescence. The importance of a feminist developmental framework for identifying and understanding salient dimensions of female adolescence is discussed. (PsycINFO Database Record (c) 2008 APA, all rights reserved).
Frazier, Brandy N; Gelman, Susan A; Wilson, Alice; Hood, Bruce
2009-01-01
Authentic objects are those that have an historical link to a person, event, time, or place of some significance (e.g., original Picasso painting; gown worn by Princess Diana; your favorite baby blanket). The current study examines everyday beliefs about authentic objects, with three primary goals: to determine the scope of adults' evaluation of authentic objects, to examine such evaluation in two distinct cultural settings, and to determine whether a person's attachment history (i.e., whether or not they owned an attachment object as a child) predicts evaluation of authentic objects. We found that college students in the U.K. (N = 125) and U.S. (N = 119) consistently evaluate a broad range of authentic items as more valuable than matched control (inauthentic) objects, more desirable to keep, and more desirable to touch, though only non-personal authentic items were judged to be more appropriate for display in a museum. These patterns were remarkably similar across the two cultural contexts. Additionally, those who had an attachment object as a child evaluated objects more favorably, and in particular judged authentic objects to be more valuable. Altogether, these results demonstrate broad endorsement of "positive contagion" among college-educated adults.
Frazier, Brandy N.; Gelman, Susan A.; Wilson, Alice; Hood, Bruce
2010-01-01
Authentic objects are those that have an historical link to a person, event, time, or place of some significance (e.g., original Picasso painting; gown worn by Princess Diana; your favorite baby blanket). The current study examines everyday beliefs about authentic objects, with three primary goals: to determine the scope of adults’ evaluation of authentic objects, to examine such evaluation in two distinct cultural settings, and to determine whether a person’s attachment history (i.e., whether or not they owned an attachment object as a child) predicts evaluation of authentic objects. We found that college students in the U.K. (N = 125) and U.S. (N = 119) consistently evaluate a broad range of authentic items as more valuable than matched control (inauthentic) objects, more desirable to keep, and more desirable to touch, though only non-personal authentic items were judged to be more appropriate for display in a museum. These patterns were remarkably similar across the two cultural contexts. Additionally, those who had an attachment object as a child evaluated objects more favorably, and in particular judged authentic objects to be more valuable. Altogether, these results demonstrate broad endorsement of "positive contagion" among college-educated adults. PMID:20631919
Mishra, Raghavendra; Barnwal, Amit Kumar
2015-05-01
The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.
Spell, Rachelle M.; Guinan, Judith A.; Miller, Kristen R.; Beck, Christopher W.
2014-01-01
Incorporating authentic research experiences in introductory biology laboratory classes would greatly expand the number of students exposed to the excitement of discovery and the rigor of the scientific process. However, the essential components of an authentic research experience and the barriers to their implementation in laboratory classes are poorly defined. To guide future reform efforts in this area, we conducted a national survey of biology faculty members to determine 1) their definitions of authentic research experiences in laboratory classes, 2) the extent of authentic research experiences currently experienced in their laboratory classes, and 3) the barriers that prevent incorporation of authentic research experiences into these classes. Strikingly, the definitions of authentic research experiences differ among faculty members and tend to emphasize either the scientific process or the discovery of previously unknown data. The low level of authentic research experiences in introductory biology labs suggests that more development and support is needed to increase undergraduate exposure to research experiences. Faculty members did not cite several barriers commonly assumed to impair pedagogical reform; however, their responses suggest that expanded support for development of research experiences in laboratory classes could address the most common barrier. PMID:24591509
Spell, Rachelle M; Guinan, Judith A; Miller, Kristen R; Beck, Christopher W
2014-01-01
Incorporating authentic research experiences in introductory biology laboratory classes would greatly expand the number of students exposed to the excitement of discovery and the rigor of the scientific process. However, the essential components of an authentic research experience and the barriers to their implementation in laboratory classes are poorly defined. To guide future reform efforts in this area, we conducted a national survey of biology faculty members to determine 1) their definitions of authentic research experiences in laboratory classes, 2) the extent of authentic research experiences currently experienced in their laboratory classes, and 3) the barriers that prevent incorporation of authentic research experiences into these classes. Strikingly, the definitions of authentic research experiences differ among faculty members and tend to emphasize either the scientific process or the discovery of previously unknown data. The low level of authentic research experiences in introductory biology labs suggests that more development and support is needed to increase undergraduate exposure to research experiences. Faculty members did not cite several barriers commonly assumed to impair pedagogical reform; however, their responses suggest that expanded support for development of research experiences in laboratory classes could address the most common barrier.
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.
Authentic leadership and its effect on employees' organizational citizenship behaviours.
Edú Valsania, Sergio; Moriano León, Juan A; Molero Alonso, Fernando; Topa Cantisano, Gabriela
2012-11-01
The studies that have verified the positive association of authentic leadership with organizational citizenship behaviours (OCBs), have used global measures of both constructs. Therefore, the goal of this work is to analyze the effect of authentic leadership on employees' OCBs, specifically focusing on the relations of the four components of authentic leadership with the individual and organizational dimensions of the OCBs. The participants of this study were 220 Spanish employees (30.9% men and 69.1% women) who completed a questionnaire that included the variables of interest in this study: Authentic Leadership, OCB and Sociobiographical control variables. The results, obtained with stepwise multiple regression analysis, show that two components of authentic leadership-moral perspective and relational transparency-present significant relationships with OCB. Moreover, authentic leadership is a better predictor of employees' OCB when these behaviors are impersonal and directed towards the organization than when they are directed towards other people. These results have practical implications for human resources management in organizations, especially in selection processes and when training top executives.
Security of fragile authentication watermarks with localization
NASA Astrophysics Data System (ADS)
Fridrich, Jessica
2002-04-01
In this paper, we study the security of fragile image authentication watermarks that can localize tampered areas. We start by comparing the goals, capabilities, and advantages of image authentication based on watermarking and cryptography. Then we point out some common security problems of current fragile authentication watermarks with localization and classify attacks on authentication watermarks into five categories. By investigating the attacks and vulnerabilities of current schemes, we propose a variation of the Wong scheme18 that is fast, simple, cryptographically secure, and resistant to all known attacks, including the Holliman-Memon attack9. In the new scheme, a special symmetry structure in the logo is used to authenticate the block content, while the logo itself carries information about the block origin (block index, the image index or time stamp, author ID, etc.). Because the authentication of the content and its origin are separated, it is possible to easily identify swapped blocks between images and accurately detect cropped areas, while being able to accurately localize tampered pixels.
Schmader, Toni; Sedikides, Constantine
2017-10-01
People seek out situations that "fit," but the concept of fit is not well understood. We introduce State Authenticity as Fit to the Environment (SAFE), a conceptual framework for understanding how social identities motivate the situations that people approach or avoid. Drawing from but expanding the authenticity literature, we first outline three types of person-environment fit: self-concept fit, goal fit, and social fit. Each type of fit, we argue, facilitates cognitive fluency, motivational fluency, and social fluency that promote state authenticity and drive approach or avoidance behaviors. Using this model, we assert that contexts subtly signal social identities in ways that implicate each type of fit, eliciting state authenticity for advantaged groups but state inauthenticity for disadvantaged groups. Given that people strive to be authentic, these processes cascade down to self-segregation among social groups, reinforcing social inequalities. We conclude by mapping out directions for research on relevant mechanisms and boundary conditions.
22 CFR 61.5 - Authentication procedures-Imports.
Code of Federal Regulations, 2012 CFR
2012-04-01
... AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking Department authentication of foreign produced audio-visual materials shall submit to the Department a bona fide foreign...
22 CFR 61.5 - Authentication procedures-Imports.
Code of Federal Regulations, 2013 CFR
2013-04-01
... AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking Department authentication of foreign produced audio-visual materials shall submit to the Department a bona fide foreign...
22 CFR 61.5 - Authentication procedures-Imports.
Code of Federal Regulations, 2014 CFR
2014-04-01
... AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking Department authentication of foreign produced audio-visual materials shall submit to the Department a bona fide foreign...
[Inheritance and innovation of traditional Chinese medicinal authentication].
Zhao, Zhong-zhen; Chen, Hu-biao; Xiao, Pei-gen; Guo, Ping; Liang, Zhi-tao; Hung, Fanny; Wong, Lai-lai; Brand, Eric; Liu, Jing
2015-09-01
Chinese medicinal authentication is fundamental for the standardization and globalization of Chinese medicine. The discipline of authentication addresses difficult issues that have remained unresolved for thousands of years, and is essential for preserving safety. Chinese medicinal authentication has both scientific and traditional cultural connotations; the use of scientific methods to elucidate traditional experience-based differentiation carries the legacy of Chinese medicine forward, and offers immediate practical significance and long-term scientific value. In this paper, a path of inheritance and innovation is explored through the scientific exposition of Chinese medicinal authentication, featuring a review of specialized publications, the establishment of a Chinese medicine specimen center and Chinese medicinal image databases, the expansion of authentication technologies, and the formation of a cultural project dedicated to the Compedium of Materia Medica.
Biometric iris image acquisition system with wavefront coding technology
NASA Astrophysics Data System (ADS)
Hsieh, Sheng-Hsun; Yang, Hsi-Wen; Huang, Shao-Hung; Li, Yung-Hui; Tien, Chung-Hao
2013-09-01
Biometric signatures for identity recognition have been practiced for centuries. Basically, the personal attributes used for a biometric identification system can be classified into two areas: one is based on physiological attributes, such as DNA, facial features, retinal vasculature, fingerprint, hand geometry, iris texture and so on; the other scenario is dependent on the individual behavioral attributes, such as signature, keystroke, voice and gait style. Among these features, iris recognition is one of the most attractive approaches due to its nature of randomness, texture stability over a life time, high entropy density and non-invasive acquisition. While the performance of iris recognition on high quality image is well investigated, not too many studies addressed that how iris recognition performs subject to non-ideal image data, especially when the data is acquired in challenging conditions, such as long working distance, dynamical movement of subjects, uncontrolled illumination conditions and so on. There are three main contributions in this paper. Firstly, the optical system parameters, such as magnification and field of view, was optimally designed through the first-order optics. Secondly, the irradiance constraints was derived by optical conservation theorem. Through the relationship between the subject and the detector, we could estimate the limitation of working distance when the camera lens and CCD sensor were known. The working distance is set to 3m in our system with pupil diameter 86mm and CCD irradiance 0.3mW/cm2. Finally, We employed a hybrid scheme combining eye tracking with pan and tilt system, wavefront coding technology, filter optimization and post signal recognition to implement a robust iris recognition system in dynamic operation. The blurred image was restored to ensure recognition accuracy over 3m working distance with 400mm focal length and aperture F/6.3 optics. The simulation result as well as experiment validates the proposed code apertured imaging system, where the imaging volume was 2.57 times extended over the traditional optics, while keeping sufficient recognition accuracy.
Backup key generation model for one-time password security protocol
NASA Astrophysics Data System (ADS)
Jeyanthi, N.; Kundu, Sourav
2017-11-01
The use of one-time password (OTP) has ushered new life into the existing authentication protocols used by the software industry. It introduced a second layer of security to the traditional username-password authentication, thus coining the term, two-factor authentication. One of the drawbacks of this protocol is the unreliability of the hardware token at the time of authentication. This paper proposes a simple backup key model that can be associated with the real world applications’user database, which would allow a user to circumvent the second authentication stage, in the event of unavailability of the hardware token.
LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP
NASA Astrophysics Data System (ADS)
Chenait, Manel
Mobile IP represents a simple and scalable global mobility solution. However, it inhibits various vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. In this paper, we discuss two authentication schemes suggested for Mobile IP: standard authentication and Mobile IP/AAA authentication. In order to provide Mobile IP roaming services including identity verication, we propose an improvement to Mobile/AAA authentication scheme by applying a local politic key management in each domain, hence we reduce hando latency by avoiding the involvement of AAA infrastructure during mobile node roaming.
Antecedents, mediators, and outcomes of authentic leadership in healthcare: A systematic review.
Alilyyani, Bayan; Wong, Carol A; Cummings, Greta
2018-07-01
Leaders are essential in every organization to achieve patient safety and healthy work environments. Authentic leadership is a relational leadership style purported to promote healthy work environments that influence staff performance and organizational outcomes. Given recent growth in authentic leadership research in healthcare and the importance of new knowledge to inform leadership development, there is an obligation to determine what is known about the antecedents and outcomes of authentic leadership in healthcare settings and clarify mechanisms by which authentic leadership affects healthcare staff and patient outcomes. The aim of this systematic review was to examine the antecedents, mediators and outcomes associated with authentic leadership in healthcare. Systematic review. The search strategy included 11 electronic databases: ABI Inform Dateline, Academic Search Complete, Cochrane Database of Systematic Reviews, PubMed, CINAHL, Embase, ERIC, PsycINFO, Scopus, Web of Science, and ProQuest Dissertations & Theses. The search was conducted in January 2017. Published English-only quantitative research that examined the antecedents, mediators and outcomes of authentic leadership practices of leaders in healthcare settings was included. Quality assessment, data extractions, and analysis were completed on all included studies. Data extracted from included studies were analyzed through descriptive and narrative syntheses. Content analysis was used to group antecedents, outcomes and mediators into categories which were then compared to authentic leadership theory. 1036 titles and abstracts were screened yielding 136 manuscripts for full-text review which resulted in 21 included studies reported in 38 manuscripts. Significant associations between authentic leadership and 43 outcomes were grouped into two major themes: healthcare staff outcomes with 5 subthemes (personal psychological states, satisfaction with work, work environment factors, health & well-being, and performance) and patient outcomes. There were 23 mediators between authentic leadership and 35 different outcomes in the included studies and one antecedent of authentic leadership. Findings of this review provide support for authentic leadership theory and suggest need for additional testing in future studies using longitudinal and interventional designs in more varied healthcare settings with diverse and interprofessional healthcare samples. Knowledge generated through this systematic review provides a more comprehensive understanding of authentic leadership, which can be used to educate future leaders and has the potential to improve leadership development strategies and positive outcomes in healthcare workplaces. Copyright © 2018 Elsevier Ltd. All rights reserved.
Policy reconciliation for access control in dynamic cross-enterprise collaborations
NASA Astrophysics Data System (ADS)
Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.
2018-03-01
In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.
A machine-learning apprentice for the completion of repetitive forms
NASA Technical Reports Server (NTRS)
Hermens, Leonard A.; Schlimmer, Jeffrey C.
1994-01-01
Forms of all types are used in businesses and government agencies, and most of them are filled in by hand. Yet much time and effort has been expended to automate form-filling by programming specific systems or computers. The high cost of programmers and other resources prohibits many organizations from benefiting from efficient office automation. A learning apprentice can be used for such repetitious form-filling tasks. In this paper, we establish the need for learning apprentices, describe a framework for such a system, explain the difficulties of form-filling, and present empirical results of a form-filling system used in our department from September 1991 to April 1992. The form-filling apprentice saves up to 87 percent in keystroke effort and correctly predicts nearly 90 percent of the values on the form.
NASA Astrophysics Data System (ADS)
Baig, Mohammad Saad; Chakraborty, Brahmananda; Ramaniah, Lavanya M.
2016-05-01
NaF-ZrF4 is used as a waste incinerator and as a coolant in Generation IV reactors.Structural and dynamical properties of molten NaF-ZrF4 system were studied along with Onsagercoefficients and Maxwell-Stefan (MS) Diffusivities applying Green-Kubo formalism and molecular dynamics (MD) simulations. The zirconium ions are found to be 8 fold coordinated with fluoride ions for all temperatures and concentrations. All the diffusive flux correlations show back-scattering. Even though the MS diffusivities are expected to depend very lightly on the composition because of decoupling of thermodynamic factor, the diffusivity ĐNa-F shows interesting behavior with the increase in concentration of ZrF4. This is because of network formation in NaF-ZrF4. Positive entropy constraints have been plotted to authenticate negative diffusivities observed.
38 CFR 3.202 - Evidence from foreign countries.
Code of Federal Regulations, 2010 CFR
2010-07-01
... country, such authentication may be made as follows: (1) By a consular agent of a friendly government... of the investigation concerning its authenticity. (b) Authentication will not be required: (1) On...
Secure Biometric Multi-Logon System Based on Current Authentication Technologies
NASA Astrophysics Data System (ADS)
Tait, Bobby L.
The need for accurate authentication in the current IT world is of utmost importance. Users rely on current IT technologies to facilitate in day to day interactions with nearly all environments. Strong authentication technologies like the various biometric technologies have been in existence for many years. Many of these technologies, for instance fingerprint biometrics, have reached maturity. However, passwords and pins are still the most commonly used authentication mechanisms at this stage. An average user has to be authenticated in various situations during daily interaction with his or her environment, by means of a pin or a password. This results in many different passwords and pins that the user has to remember. The user will eventually either start documenting these passwords and pins, or often, simply use the same password and pin for all authentication situations.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng
2015-11-01
To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.
Authentic leaders creating healthy work environments for nursing practice.
Shirey, Maria R
2006-05-01
Implementation of authentic leadership can affect not only the nursing workforce and the profession but the healthcare delivery system and society as a whole. Creating a healthy work environment for nursing practice is crucial to maintain an adequate nursing workforce; the stressful nature of the profession often leads to burnout, disability, and high absenteeism and ultimately contributes to the escalating shortage of nurses. Leaders play a pivotal role in retention of nurses by shaping the healthcare practice environment to produce quality outcomes for staff nurses and patients. Few guidelines are available, however, for creating and sustaining the critical elements of a healthy work environment. In 2005, the American Association of Critical-Care Nurses released a landmark publication specifying 6 standards (skilled communication, true collaboration, effective decision making, appropriate staffing, meaningful recognition, and authentic leadership) necessary to establish and sustain healthy work environments in healthcare. Authentic leadership was described as the "glue" needed to hold together a healthy work environment. Now, the roles and relationships of authentic leaders in the healthy work environment are clarified as follows: An expanded definition of authentic leadership and its attributes (eg, genuineness, trustworthiness, reliability, compassion, and believability) is presented. Mechanisms by which authentic leaders can create healthy work environments for practice (eg, engaging employees in the work environment to promote positive behaviors) are described. A practical guide on how to become an authentic leader is advanced. A research agenda to advance the study of authentic leadership in nursing practice through collaboration between nursing and business is proposed.
Attacks on quantum key distribution protocols that employ non-ITS authentication
NASA Astrophysics Data System (ADS)
Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.
2016-01-01
We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.
ERIC Educational Resources Information Center
Abe, D.; And Others
This discussion shows that "authentic documents" are a basic tool for the acquisition of communicative competence in a second language. An authentic document is a sort of photograph of discourse produced at a given time and in a given place. Like a cliche, it has its own existence. Two reasons for choosing authentic documents in second language…
Efficient authentication scheme based on near-ring root extraction problem
NASA Astrophysics Data System (ADS)
Muthukumaran, V.; Ezhilmaran, D.
2017-11-01
An authentication protocolis the type of computer communication protocol or cryptography protocol specifically designed for transfer of authentication data between two entities. We have planned a two new entity authentication scheme on the basis of root extraction problem near-ring in this article. We suggest that this problem is suitably difficult to serve as a cryptographic assumption over the platform of near-ring N. The security issues also discussed.
NASA Astrophysics Data System (ADS)
Komogortsev, Oleg V.; Karpov, Alexey; Holland, Corey D.
2012-06-01
The widespread use of computers throughout modern society introduces the necessity for usable and counterfeit-resistant authentication methods to ensure secure access to personal resources such as bank accounts, e-mail, and social media. Current authentication methods require tedious memorization of lengthy pass phrases, are often prone to shouldersurfing, and may be easily replicated (either by counterfeiting parts of the human body or by guessing an authentication token based on readily available information). This paper describes preliminary work toward a counterfeit-resistant usable eye movement-based (CUE) authentication method. CUE does not require any passwords (improving the memorability aspect of the authentication system), and aims to provide high resistance to spoofing and shoulder-surfing by employing the combined biometric capabilities of two behavioral biometric traits: 1) oculomotor plant characteristics (OPC) which represent the internal, non-visible, anatomical structure of the eye; 2) complex eye movement patterns (CEM) which represent the strategies employed by the brain to guide visual attention. Both OPC and CEM are extracted from the eye movement signal provided by an eye tracking system. Preliminary results indicate that the fusion of OPC and CEM traits is capable of providing a 30% reduction in authentication error when compared to the authentication accuracy of individual traits.
Choi, Han Gyo; Ahn, Sung Hee
2016-02-01
The aim of this study was to examine the mediating effect of empowerment in the relationship of nurse managers' authentic leadership, with nurses' organizational commitment and job satisfaction. The participants in this study were 273 registered nurses working in five University hospitals located in Seoul and Gyeonggi Province. The measurements included the Authentic Leadership Questionnaire, Condition of Work Effectiveness Questionnaire-II, Organizational Commitment Questionnaire and Korea-Minnesota Satisfaction Questionnaire. Data were analyzed using t-test, ANOVA, Scheffé test, Pearson correlation coefficients, simple and multiple regression techniques with the SPSS 18.0 program. Mediation analysis was performed according to the Baron and Kenny method and Sobel test. There were significant correlations among authentic leadership, empowerment, organizational commitment and job satisfaction. Empowerment showed perfect mediating effects in the relationship between authentic leadership and organizational commitment. It had partial mediating effects in the relationship between authentic leadership and job satisfaction. In this study, nurse managers' authentic leadership had significant influences on nurses organizational commitment and job satisfaction via empowerment. Therefore, to enhance nurses' organizational commitment and job satisfaction, it is necessary to build effective strategies to enhance nurse manager's authentic leadership and to develop empowering education programs for nurses.
User Authentication in Smartphones for Telehealth
SMITH, KATHERINE A.; ZHOU, LEMING; WATZLAF, VALERIE J. M.
2017-01-01
Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed. PMID:29238444
User Authentication in Smartphones for Telehealth.
Smith, Katherine A; Zhou, Leming; Watzlaf, Valerie J M
2017-01-01
Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.
Counterfeit-resistant materials and a method and apparatus for authenticating materials
Ramsey, J. Michael; Klatt, Leon N.
2001-01-01
Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&
Counterfeit-resistant materials and a method and apparatus for authenticating materials
Ramsey, J. Michael; Klatt, Leon N.
2000-01-01
Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.
Finding the authentic self in a communal culture: developmental goals in emerging adulthood.
Scharf, Miri; Mayseless, Ofra
2010-01-01
Finding and cultivating a sense of authentic self is an important life goal for emerging adults. In collectivist cultures, youngsters might need to distance themselves to find and discover their authentic selves separate of the expectations of society and significant others. Creating an autonomous time bubble that focuses on the present allows youngsters to forge a sense of personal meaning and authenticity that subsequently paves the way to reintegration into long-term life goals. The results focusing on Israeli emerging adults demonstrate that a sense of authentic self plays a central role in their well-being and socioemotional functioning. © Wiley Periodicals, Inc.
Analysis of MD5 authentication in various routing protocols using simulation tools
NASA Astrophysics Data System (ADS)
Dinakaran, M.; Darshan, K. N.; Patel, Harsh
2017-11-01
Authentication being an important paradigm of security and Computer Networks require secure paths to make the flow of the data even more secure through some security protocols. So MD-5(Message Digest 5) helps in providing data integrity to the data being sent through it and authentication to the network devices. This paper gives a brief introduction to the MD-5, simulation of the networks by including MD-5 authentication using various routing protocols like OSPF, EIGRP and RIPv2. GNS3 is being used to simulate the scenarios. Analysis of the MD-5 authentication is done in the later sections of the paper.
Medical tourism in the backcountry: alternative health and healing in the Arkansas Ozarks.
Nolan, Justin M; Schneider, Mary Jo
2011-01-01
Tourists travel to Arkansas' mountain regions to experience, appreciate, and consume multiple aspects of otherness, including sacred sites and pristine and authentic peoples and environments. A largely unexplored aspect of this consumption of authenticity is alternative medicine, provided to tourists and day travelers in search of physical and emotional restoration. Traditional forms of medicine are deeply rooted in women's social roles as community healers in the region and are perpetuated in part because of the lack of readily accessible forms of so-called modern medicine. Contemporary medical tourism in Arkansas has promoted access to folk health systems, preserving them by incorporating them into tourists' health care services, and also has attracted new and dynamic alternative medical practices while encouraging the transformation of existing forms of traditional medicine. Ultimately, the blend of alternative, folk, and conventional medicine in the Arkansas highlands is evidence of globalizing forces at work in a regional culture. It also serves to highlight a renewed appreciation for the historic continuity and the efficacy of traditional knowledge in the upper South.
Unlocking data: federated identity with LSDMA and dCache
NASA Astrophysics Data System (ADS)
Millar, AP; Behrmann, G.; Bernardt, C.; Fuhrmann, P.; Hardt, M.; Hayrapetyan, A.; Litvintsev, D.; Mkrtchyan, T.; Rossi, A.; Schwank, K.
2015-12-01
X.509, the dominant identity system from grid computing, has proved unpopular for many user communities. More popular alternatives generally assume the user is interacting via their web-browser. Such alternatives allow a user to authenticate with many services with the same credentials (user-name and password). They also allow users from different organisations form collaborations quickly and simply. Scientists generally require that their custom analysis software has direct access to the data. Such direct access is not currently supported by alternatives to X.509, as they require the use of a web-browser. Various approaches to solve this issue are being investigated as part of the Large Scale Data Management and Analysis (LSDMA) project, a German funded national R&D project. These involve dynamic credential translation (creating an X.509 credential) to allow backwards compatibility in addition to direct SAML- and OpenID Connect-based authentication. We present a summary of the current state of art and the current status of the federated identity work funded by the LSDMA project along with the future road map.
Authentication techniques for smart cards
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nelson, R.A.
1994-02-01
Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thoroughmore » understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.« less
Authentication of meat and meat products.
Ballin, N Z
2010-11-01
In recent years, interest in meat authenticity has increased. Many consumers are concerned about the meat they eat and accurate labelling is important to inform consumer choice. Authentication methods can be categorised into the areas where fraud is most likely to occur: meat origin, meat substitution, meat processing treatment and non-meat ingredient addition. Within each area the possibilities for fraud can be subcategorised as follows: meat origin-sex, meat cuts, breed, feed intake, slaughter age, wild versus farmed meat, organic versus conventional meat, and geographic origin; meat substitution-meat species, fat, and protein; meat processing treatment-irradiation, fresh versus thawed meat and meat preparation; non-meat ingredient addition-additives and water. Analytical methods used in authentication are as diverse as the authentication problems, and include a diverse range of equipment and techniques. This review is intended to provide an overview of the possible analytical methods available for meat and meat products authentication. In areas where no authentication methods have been published, possible strategies are suggested. Copyright © 2010 The American Meat Science Association. Published by Elsevier Ltd. All rights reserved.
[Molecular authentication of Jinyinhua formula granule by using allele-specific PCR].
Jiang, Chao; Tu, Li-Chan; Yuan, Yuan; Huang, Lu-Qi; Gao, Wei; Jin, Yan
2017-07-01
Traditional authentication method is hard to identify herb's authenticity of traditional Chinese medicine(TCM) formula granules because they have lost all their morphological characteristics. In this study, a new allele-specific PCR method was established for identifying the authentication of Jinyinhua formula granule (made from Lonicerae Japonicae Flos) based on an SNP site in trnL-trnF fragment. Genomic DNA was successfully extracted from Lonicerae Japonicae Flos and its formula granules by using an improved spin column method and then PCR was performed with the designed primer. Approximately 110 bp specific bands was obtained only in the authentic Lonicerae Japonicae Flos and its formula granules, while no bands were found in fake mixed products. In addition, the PCR product sequence was proved from Lonicerae Japonicae Flos trnL-trnF sequence by using BLAST method. Therefore, DNA molecular authentication method could make up the limitations of character identification method and microscopic identification, and quickly identify herb's authenticity of TCM formula granules, with enormous potential for market supervision and quality control. Copyright© by the Chinese Pharmaceutical Association.
Developmental Changes in Judgments of Authentic Objects
Frazier, Brandy N.; Gelman, Susan A.
2009-01-01
This study examined the development of an understanding of authenticity among 112 children (preschoolers, kindergarten, 1st-graders, and 4th-graders) and 119 college students. Participants were presented with pairs of photographs depicting authentic and non-authentic objects and asked to pick which one belongs in a museum and which one they would want to have. Results suggest that both children and adults recognize the special nature of authentic objects by reporting that they belong in a museum. However, this belief broadens with age, at first just for famous associations (preschool), then also for original creations (kindergarten), and finally for personal associations as well (4th grade). At all ages, an object's authentic nature is distinct from its desirability. Thus, from an early age, children appear to understand that the historical path of an authentic object affects its nature. This work demonstrates the importance of non-obvious properties in children's concepts. For preschool as well as older children, history (a non-visible property) adds meaning beyond the material or functional worth of an object. PMID:20160988
A Generic Authentication LoA Derivation Model
NASA Astrophysics Data System (ADS)
Yao, Li; Zhang, Ning
One way of achieving a more fine-grained access control is to link an authentication level of assurance (LoA) derived from a requester’s authentication instance to the authorisation decision made to the requester. To realise this vision, there is a need for designing a LoA derivation model that supports the use and quantification of multiple LoA-effecting attributes, and analyse their composite effect on a given authentication instance. This paper reports the design of such a model, namely a generic LoA derivation model (GEA- LoADM). GEA-LoADM takes into account of multiple authentication attributes along with their relationships, abstracts the composite effect by the multiple attributes into a generic value, authentication LoA, and provides algorithms for the run-time derivation of LoA. The algorithms are tailored to reflect the relationships among the attributes involved in an authentication instance. The model has a number of valuable properties, including flexibility and extensibility; it can be applied to different application contexts and support easy addition of new attributes and removal of obsolete ones.
Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho
2017-01-01
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572
Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho
2017-03-21
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847
Lister, Jamey J; Wohl, Michael J A; Davis, Christopher G
2015-09-01
Engaging in activities that make people feel authentic or real is typically associated with a host of positive psychological and physiological outcomes (i.e., being authentic serves to increase well-being). In the current study, we tested the idea that authenticity might have a dark side among people engaged in an addictive or risky behavior (gambling). To test this possibility, we assessed gamblers (N = 61) who were betting on the National Hockey League playoff games at a sports bar. As predicted, people who felt authentic when gambling reported behavior associated with problem gambling (high frequency of betting) as well as problematic play (a big monetary loss and a big monetary win). Moreover, such behavior and gambling outcomes were particularly high among people who were motivated to gamble for the purpose of enhancement. The interaction of feeling authentic when betting and gambling for purposes of enhancing positive emotions proved especially troublesome for problematic forms of play. Implications of authenticity as a potential vulnerability factor for sports betting and other types of gambling are discussed.
36 CFR 1012.10 - What must I, as an employee, do upon receiving a request?
Code of Federal Regulations, 2010 CFR
2010-07-01
... you can grant a request for authentication of records; and (2) Consult the General Counsel concerning the proper form of the authentication (as authentication requirements may vary by jurisdiction). ...
Authentic Assessment of Special Learners: Problem or Promise?
ERIC Educational Resources Information Center
Choate, Joyce S.; Evans, Susan S.
1992-01-01
This article outlines differences between traditional assessment and authentic assessment procedures, discusses problems with each type of assessment in relation to special learners, and offers certain cautions that must be observed when implementing authentic assessment. (JDD)
Research on user behavior authentication model based on stochastic Petri nets
NASA Astrophysics Data System (ADS)
Zhang, Chengyuan; Xu, Haishui
2017-08-01
A behavioural authentication model based on stochastic Petri net is proposed to meet the randomness, uncertainty and concurrency characteristics of user behaviour. The use of random models in the location, changes, arc and logo to describe the characteristics of a variety of authentication and game relationships, so as to effectively implement the graphical user behaviour authentication model analysis method, according to the corresponding proof to verify the model is valuable.
Creating contextually authentic science in a low-performing urban elementary school
NASA Astrophysics Data System (ADS)
Buxton, Cory A.
2006-09-01
This article reports on a 2-year collaborate project to reform the teaching and learning of science in the context of Mae Jemison Elementary, the lowest performing elementary school in the state of Louisiana. I outline a taxonomy of authentic science inquiry experiences and then use the resulting framework to focus on how project participants interpreted and enacted ideas about collaboration and authenticity. The resulting contextually authentic science inquiry model links the strengths of a canonically authentic model of science inquiry (grounded in the Western scientific canon) with the strengths of a youth-centered model of authenticity (grounded in student-generated inquiry), thus bringing together relevant content standards and topics with critical social relevance. I address the question of how such enactments may or may not promote doing science together and consider the implications of this model for urban science education.
Alexander, Catherine; Lopez, Ruth Palan
2018-01-01
The aim of this study is to understand the behaviors experienced nurse executives use to create healthy work environments (HWEs). The constructs of authentic leadership formed the conceptual framework for the study. The American Association of Critical-Care Nurses recommends authentic leadership as the preferred style of leadership for creating and sustaining HWEs. Behaviors associated with authentic leadership in nursing are not well understood. A purposive sample of 17 experienced nurse executives were recruited from across the United States for this qualitative study. Thematic analysis was used to analyze the in-depth, semistructured interviews. Four constructs of authentic leaders were supported and suggest unique applications of each including self-awareness (a private and professional self), balanced processing (open hearted), transparency (limiting exposure), and moral leadership (nursing compass). Authentic leadership may provide a sound foundation to support nursing leadership practices; however, its application to the discipline requires additional investigation.
Disambiguating authenticity: Interpretations of value and appeal.
O'Connor, Kieran; Carroll, Glenn R; Kovács, Balázs
2017-01-01
While shaping aesthetic judgment and choice, socially constructed authenticity takes on some very different meanings among observers, consumers, producers and critics. Using a theoretical framework positing four distinct meanings of socially constructed authenticity-type, moral, craft, and idiosyncratic-we aim to document empirically the unique appeal of each type. We develop predictions about the relationships between attributed authenticity and corresponding increases in the value ascribed to it through: (1) consumer value ratings, (2) willingness to pay, and (3) behavioral choice. We report empirical analyses from a research program of three multi-method studies using (1) archival data from voluntary consumer evaluations of restaurants in an online review system, (2) a university-based behavioral lab experiment, and (3) an online survey-based experiment. Evidence is consistent across the studies and suggests that perceptions of four distinct subtypes of socially constructed authenticity generate increased appeal and value even after controlling for option quality. Findings suggest additional directions for research on authenticity.
Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept
NASA Astrophysics Data System (ADS)
Damousis, Ioannis G.; Tzovaras, Dimitrios; Bekiaris, Evangelos
2008-12-01
Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO) (2007) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.
NASA Technical Reports Server (NTRS)
Lyle, Stacey D.
2009-01-01
A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time has been developed. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server. The Geospatial Authentication software has two parts Server and Client. The server software is a virtual private network (VPN) developed in Linux operating system using Perl programming language. The server can be a stand-alone VPN server or can be combined with other applications and services. The client software is a GUI Windows CE software, or Mobile Graphical Software, that allows users to authenticate into a network. The purpose of the client software is to pass the needed satellite information to the server for authentication.
Laschinger, Heather K S; Smith, Lesley Marie
2013-01-01
The aim of this study was to examine new-graduate nurses' perceptions of the influence of authentic leadership and structural empowerment on the quality of interprofessional collaboration in healthcare work environments. Although the challenges associated with true interprofessional collaboration are well documented, new-graduate nurses may feel particularly challenged in becoming contributing members. Little research exists to inform nurse leaders' efforts to facilitate effective collaboration in acute care settings. A predictive nonexperimental design was used to test a model integrating authentic leadership and workplace empowerment as resources that support interprofessional collaboration. Multiple regression analysis revealed that 24% of the variance in perceived interprofessional collaboration was explained by unit-leader authentic leadership and structural empowerment (R = 0.24, F = 29.55, P = .001). Authentic leadership (β = .294) and structural empowerment (β = .288) were significant independent predictors. Results suggest that authentic leadership and structural empowerment may promote interprofessional collaborative practice in new nurses.
Authenticity and Relationship Satisfaction: Two Distinct Ways of Directing Power to Self-Esteem.
Wang, Yi Nan
2015-01-01
Possessing power contributes to high self-esteem, but how power enhances self-esteem is still unknown. As power is associated with both self-oriented goals and social-responsibility goals, we proposed that power predicts self-esteem through two positive personal and interpersonal results: authenticity and relationship satisfaction. Three studies were carried out with a total of 505 Chinese participants, including college students and adults, who completed surveys that assessed personal power, self-esteem, authenticity, relationship satisfaction, communal orientation, and social desirability. Hierarchical multiple regression analyses demonstrated that power, authenticity, and relationship satisfaction each uniquely contributed to self-esteem. More importantly, multiple mediation analysis showed that authenticity and relationship satisfaction both mediated the effects of power on self-esteem, even when controlling for participants' communal orientation and social desirability. Our findings demonstrate that authenticity and relationship satisfaction represent two key mechanisms by which power is associated with self-esteem.
Authenticity and Relationship Satisfaction: Two Distinct Ways of Directing Power to Self-Esteem
Wang, Yi Nan
2015-01-01
Possessing power contributes to high self-esteem, but how power enhances self-esteem is still unknown. As power is associated with both self-oriented goals and social-responsibility goals, we proposed that power predicts self-esteem through two positive personal and interpersonal results: authenticity and relationship satisfaction. Three studies were carried out with a total of 505 Chinese participants, including college students and adults, who completed surveys that assessed personal power, self-esteem, authenticity, relationship satisfaction, communal orientation, and social desirability. Hierarchical multiple regression analyses demonstrated that power, authenticity, and relationship satisfaction each uniquely contributed to self-esteem. More importantly, multiple mediation analysis showed that authenticity and relationship satisfaction both mediated the effects of power on self-esteem, even when controlling for participants’ communal orientation and social desirability. Our findings demonstrate that authenticity and relationship satisfaction represent two key mechanisms by which power is associated with self-esteem. PMID:26720814
Three-party authenticated key agreements for optimal communication
Lee, Tian-Fu; Hwang, Tzonelih
2017-01-01
Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications. PMID:28355253
A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments
Huang, Yuanfei; Ma, Fangchao
2017-01-01
In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050
A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.
Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao
2017-01-01
In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.
Spectroscopically Enhanced Method and System for Multi-Factor Biometric Authentication
NASA Astrophysics Data System (ADS)
Pishva, Davar
This paper proposes a spectroscopic method and system for preventing spoofing of biometric authentication. One of its focus is to enhance biometrics authentication with a spectroscopic method in a multifactor manner such that a person's unique ‘spectral signatures’ or ‘spectral factors’ are recorded and compared in addition to a non-spectroscopic biometric signature to reduce the likelihood of imposter getting authenticated. By using the ‘spectral factors’ extracted from reflectance spectra of real fingers and employing cluster analysis, it shows how the authentic fingerprint image presented by a real finger can be distinguished from an authentic fingerprint image embossed on an artificial finger, or molded on a fingertip cover worn by an imposter. This paper also shows how to augment two widely used biometrics systems (fingerprint and iris recognition devices) with spectral biometrics capabilities in a practical manner and without creating much overhead or inconveniencing their users.
Report #11-P-0597, September 9, 2011. Vulnerability testing of EPA’s directory service system authentication and authorization servers conducted in March 2011 identified authentication and authorization servers with numerous vulnerabilities.
NASA Astrophysics Data System (ADS)
Klug Boonstra, S. L.; Swann, J.; Manfredi, L.; Zippay, A.; Boonstra, D.
2014-12-01
The Next Generation Science Standards (NGSS) brought many dynamic opportunities and capabilities to the K-12 science classroom - especially with the inclusion of engineering. Using science as a context to help students engage in the engineering practices and engineering disciplinary core ideas is an essential step to students' understanding of how science drives engineering and how engineering enables science. Real world examples and applications are critical for students to see how these disciplines are integrated. Furthermore, the interface of science and engineering raise the level of science understanding, and facilitate higher order thinking skills through relevant experiences. Astrobiobound! is designed for the NGSS (Next Generation Science Standards) and CCSS (Common Core State Standards). Students also practice and build 21st Century Skills. Astrobiobound! help students see how science and systems engineering are integrated to achieve a focused scientific goal. Students engage in the engineering design process to design a space mission which requires them to balance the return of their science data with engineering limitations such as power, mass and budget. Risk factors also play a role during this simulation and adds to the excitement and authenticity. Astrobiobound! presents the authentic first stages of NASA mission design process. This simulation mirrors the NASA process in which the science goals, type of mission, and instruments to return required data to meet mission goals are proposed within mission budget before any of the construction part of engineering can begin. NASA scientists and engineers were consulted in the development of this activity as an authentic simulation of their mission proposal process.
Password-free network security through joint use of audio and video
NASA Astrophysics Data System (ADS)
Civanlar, Mehmet R.; Chen, Tsuhan
1997-01-01
REmote authentication is vital for many network based applications. As the number of such applications increases, user friendliness of the authentication process, particularly as it relates to password management, becomes as important as its reliability. The multimedia capabilities of the modern terminal equipment can provide the basis for a dependable and easy to use authentication system which does not require the user to memorize passwords. This paper outlines our implementation of an authentication system based on the joint use of the speech and facial video of a user. Our implementation shows that the voice and the video of the associated lip movements, when used together, can be very effective for password free authentication.
Hardware device binding and mutual authentication
Hamlet, Jason R; Pierson, Lyndon G
2014-03-04
Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.
HERMA-Heartbeat Microwave Authentication
NASA Technical Reports Server (NTRS)
Haque, Salman-ul Mohammed (Inventor); Chow, Edward (Inventor); McKee, Michael Ray (Inventor); Tkacenko, Andre (Inventor); Lux, James Paul (Inventor)
2018-01-01
Systems and methods for identifying and/or authenticating individuals utilizing microwave sensing modules are disclosed. A HEaRtbeat Microwave Authentication (HERMA) system can enable the active identification and/or authentication of a user by analyzing reflected RF signals that contain a person's unique characteristics related to their heartbeats. An illumination signal is transmitted towards a person where a reflected signal captures the motion of the skin and tissue (i.e. displacement) due to the person's heartbeats. The HERMA system can utilize existing transmitters in a mobile device (e.g. Wi-Fi, Bluetooth, Cellphone signals) as the illumination source with at least one external receive antenna. The received reflected signals can be pre-processed and analyzed to identify and/or authenticate a user.
[Application of rapid PCR to authenticate medicinal snakes].
Chen, Kang; Jiang, Chao; Yuan, Yuan; Huang, Lu-Qi; Li, Man
2014-10-01
To obtained an accurate, rapid and efficient method for authenticate medicinal snakes listed in Chinese Pharmacopoeia (Zaocysd humnades, Bungarus multicinctus, Agkistrodon acutus), a rapid PCR method for authenticate snakes and its adulterants was established based on the classic molecular authentication methods. DNA was extracted by alkaline lysis and the specific primers were amplified by two-steps PCR amplification method. The denatured and annealing temperature and cycle numbers were optimized. When 100 x SYBR Green I was added in the PCR product, strong green fluorescence was visualized under 365 nm UV whereas adulterants without. The whole process can complete in 30-45 minutes. The established method provides the technical support for authentication of the snakes on field.
NASA Astrophysics Data System (ADS)
Fathirad, Iraj; Devlin, John; Jiang, Frank
2012-09-01
The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.
Decolonizing Researcher Authenticity
ERIC Educational Resources Information Center
Daza, Stephanie Lynn
2008-01-01
This article examines the ways in which researcher authenticity is negotiated along three axes of difference, ethno-linguistic affiliation, sexual orientation and race/skin color. Ultimately, it analyzes how researcher authenticity is produced and played out within research, via interactions between participants, researchers and others who…
A Trusted Portable Computing Device
NASA Astrophysics Data System (ADS)
Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang
A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.
Mathematical and information maintenance of biometric systems
NASA Astrophysics Data System (ADS)
Boriev, Z.; Sokolov, S.; Nyrkov, A.; Nekrasova, A.
2016-04-01
This article describes the different mathematical methods for processing biometric data. A brief overview of methods for personality recognition by means of a signature is conducted. Mathematical solutions of a dynamic authentication method are considered. Recommendations on use of certain mathematical methods, depending on specific tasks, are provided. Based on the conducted analysis of software and the choice made in favor of the wavelet analysis, a brief basis for its use in the course of software development for biometric personal identification is given for the purpose of its practical application.
Giallonardo, Lisa M; Wong, Carol A; Iwasiw, Carroll L
2010-11-01
To examine the relationships between new graduate nurses' perceptions of preceptor authentic leadership, work engagement and job satisfaction. During a time when the retention of new graduate nurses is of the upmost importance, the reliance on preceptors to facilitate the transition of new graduate nurses is paramount. A predictive non-experimental survey design was used to examine the relationships between study variables. The final sample consisted of 170 randomly selected Registered Nurses (RNs) with <3 years experience and who worked in an acute care setting. Hierarchical multiple regression demonstrated that 20% of the variance in job satisfaction was explained by authentic leadership and work engagement. Furthermore, work engagement was found to partially mediate the relationship between authentic leadership of preceptors and engagement of new graduate nurses. New graduate nurses paired with preceptors who demonstrate high levels of authentic leadership feel more engaged and are more satisfied. Engagement is an important mechanism by which authentic leadership affects job satisfaction. Managers must be aware of the role preceptors' authentic leadership plays in promoting work engagement and job satisfaction of new nurses. © 2010 The Authors. Journal compilation © 2010 Blackwell Publishing Ltd.
A Multifactor Secure Authentication System for Wireless Payment
NASA Astrophysics Data System (ADS)
Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip
Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.
44 CFR 5.85 - Authentication and attestation of copies.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Authentication and attestation of copies. 5.85 Section 5.85 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT... Authentication and attestation of copies. The Administrator, Deputy Administrators, Regional Administrators...
46 CFR 201.42 - Subscription, authentication of documents.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 8 2010-10-01 2010-10-01 false Subscription, authentication of documents. 201.42 Section 201.42 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION POLICY, PRACTICE AND... Subscription, authentication of documents. (a) Documents filed shall be subscribed: (1) By the person or...
Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt
NASA Astrophysics Data System (ADS)
Wong, M. L. Dennis; Goh, Antionette W.-T.; Chua, Hong Siang
Secure authentication of digital medical image content provides great value to the e-Health community and medical insurance industries. Fragile Watermarking has been proposed to provide the mechanism to authenticate digital medical image securely. Transform Domain based Watermarking are typically slower than spatial domain watermarking owing to the overhead in calculation of coefficients. In this paper, we propose a new Discrete Pascal Transform based watermarking technique. Preliminary experiment result shows authentication capability. Possible improvements on the proposed scheme are also presented before conclusions.
Software and the Virus Threat: Providing Authenticity in Distribution
1991-03-01
Classification) SOFTWARE A" D THE VIRUS THREAT: PROVIDING AUTHENTICITY IN DISTRIBUTION 12. PERSONAL AUTHOR( S ) LAVUNTURE, GEORGE M. 13&. TYPE OF REPORT 1 3b...swapping open the code ampering. Re -authentication would then be required prior to regaining ;ntrol. 30 V . AUTHENTICATION MIRTHODS This section examines...x. n/a v mis 15) .. . ... x x ... .074 I .r ..... x . . x x x.x. 3880 S amno 3) . • ..... .. . I. ... 2000 .d0O (3) x x x x I . . . x x
Authenticated communication from quantum readout of PUFs
NASA Astrophysics Data System (ADS)
Škorić, Boris; Pinkse, Pepijn W. H.; Mosk, Allard P.
2017-08-01
Quantum readout of physical unclonable functions (PUFs) is a recently introduced method for remote authentication of objects. We present an extension of the protocol to enable the authentication of data: A verifier can check if received classical data were sent by the PUF holder. We call this modification QR-d or, in the case of the optical-PUF implementation, QSA-d. We discuss how QSA-d can be operated in a parallel way. We also present a protocol for authenticating quantum states.
Dawel, Amy; Palermo, Romina; O'Kearney, Richard; McKone, Elinor
2015-01-01
Much is known about development of the ability to label facial expressions of emotion (e.g., as happy or sad), but rather less is known about the emergence of more complex emotional face processing skills. The present study investigates one such advanced skill: the ability to tell if someone is genuinely feeling an emotion or just pretending (i.e., authenticity discrimination). Previous studies have shown that children can discriminate authenticity of happy faces, using expression intensity as an important cue, but have not tested the negative emotions of sadness or fear. Here, children aged 8-12 years (n = 85) and adults (n = 57) viewed pairs of faces in which one face showed a genuinely-felt emotional expression (happy, sad, or scared) and the other face showed a pretend version. For happy faces, children discriminated authenticity above chance, although they performed more poorly than adults. For sad faces, for which our pretend and genuine images were equal in intensity, adults could discriminate authenticity, but children could not. Neither age group could discriminate authenticity of the fear faces. Results also showed that children judged authenticity based on intensity information alone for all three expressions tested, while adults used a combination of intensity and other factor/s. In addition, novel results show that individual differences in empathy (both cognitive and affective) correlated with authenticity discrimination for happy faces in adults, but not children. Overall, our results indicate late maturity of skills needed to accurately determine the authenticity of emotions from facial information alone, and raise questions about how this might affect social interactions in late childhood and the teenage years.
Dawel, Amy; Palermo, Romina; O’Kearney, Richard; McKone, Elinor
2015-01-01
Much is known about development of the ability to label facial expressions of emotion (e.g., as happy or sad), but rather less is known about the emergence of more complex emotional face processing skills. The present study investigates one such advanced skill: the ability to tell if someone is genuinely feeling an emotion or just pretending (i.e., authenticity discrimination). Previous studies have shown that children can discriminate authenticity of happy faces, using expression intensity as an important cue, but have not tested the negative emotions of sadness or fear. Here, children aged 8–12 years (n = 85) and adults (n = 57) viewed pairs of faces in which one face showed a genuinely-felt emotional expression (happy, sad, or scared) and the other face showed a pretend version. For happy faces, children discriminated authenticity above chance, although they performed more poorly than adults. For sad faces, for which our pretend and genuine images were equal in intensity, adults could discriminate authenticity, but children could not. Neither age group could discriminate authenticity of the fear faces. Results also showed that children judged authenticity based on intensity information alone for all three expressions tested, while adults used a combination of intensity and other factor/s. In addition, novel results show that individual differences in empathy (both cognitive and affective) correlated with authenticity discrimination for happy faces in adults, but not children. Overall, our results indicate late maturity of skills needed to accurately determine the authenticity of emotions from facial information alone, and raise questions about how this might affect social interactions in late childhood and the teenage years. PMID:25999868
Optical identity authentication technique based on compressive ghost imaging with QR code
NASA Astrophysics Data System (ADS)
Wenjie, Zhan; Leihong, Zhang; Xi, Zeng; Yi, Kang
2018-04-01
With the rapid development of computer technology, information security has attracted more and more attention. It is not only related to the information and property security of individuals and enterprises, but also to the security and social stability of a country. Identity authentication is the first line of defense in information security. In authentication systems, response time and security are the most important factors. An optical authentication technology based on compressive ghost imaging with QR codes is proposed in this paper. The scheme can be authenticated with a small number of samples. Therefore, the response time of the algorithm is short. At the same time, the algorithm can resist certain noise attacks, so it offers good security.
38 CFR 10.46 - Authentication of statements supporting claims.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Authentication of statements supporting claims. 10.46 Section 10.46 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS ADJUSTED COMPENSATION Adjusted Compensation; General § 10.46 Authentication of statements...
22 CFR 61.5 - Authentication procedures-Imports.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Authentication procedures-Imports. 61.5 Section 61.5 Foreign Relations DEPARTMENT OF STATE PUBLIC DIPLOMACY AND EXCHANGES WORLD-WIDE FREE FLOW OF AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking Department...
Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho
2015-01-01
In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.
[Development of indel markers for molecular authentication of Panax ginseng and P. quinquefolius].
Wang, Rong-Bo; Tian, Hui-Li; Wang, Hong-Tao; Li, Gui-Sheng
2018-04-01
Panax ginseng and P. quinquefolius are two kinds of important medicinal herbs. They are morphologically similar but have different pharmacological effects. Therefore, botanical origin authentication of these two ginsengs is of great importance for ensuring pharmaceutical efficacy and food safety. Based on the fact that intron position in orthologous genes is highly conserved across plant species, intron length polymorphisms were exploited from unigenes of ginseng. Specific primers were respectively designed for these two species based on their insertion/deletion sequences of cytochrome P450 and glyceraldehyde 3-phosphate dehydrogenase, and multiplex PCR was conducted for molecular authentication of P.ginseng and P. quinquefolius. The results showed that the developed multiplex PCR assay was effective for molecular authentication of P.ginseng and P. quinquefolius without strict PCR condition and the optimization of reaction system.This study provides a preferred ideal marker system for molecular authentication of ginseng,and the presented method can be employed in origin authentication of other herbal preparations. Copyright© by the Chinese Pharmaceutical Association.
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks
Wang, Changji; Yuan, Yuan; Wu, Jiayuan
2017-01-01
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication. PMID:28632171
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.
Wang, Changji; Yuan, Yuan; Wu, Jiayuan
2017-06-20
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.
NASA Astrophysics Data System (ADS)
Zeitz, Christian; Scheidat, Tobias; Dittmann, Jana; Vielhauer, Claus; González Agulla, Elisardo; Otero Muras, Enrique; García Mateo, Carmen; Alba Castro, José L.
2008-02-01
Beside the optimization of biometric error rates the overall security system performance in respect to intentional security attacks plays an important role for biometric enabled authentication schemes. As traditionally most user authentication schemes are knowledge and/or possession based, firstly in this paper we present a methodology for a security analysis of Internet-based biometric authentication systems by enhancing known methodologies such as the CERT attack-taxonomy with a more detailed view on the OSI-Model. Secondly as proof of concept, the guidelines extracted from this methodology are strictly applied to an open source Internet-based biometric authentication system (BioWebAuth). As case studies, two exemplary attacks, based on the found security leaks, are investigated and the attack performance is presented to show that during the biometric authentication schemes beside biometric error performance tuning also security issues need to be addressed. Finally, some design recommendations are given in order to ensure a minimum security level.
Fang, Wanping; Meinhardt, Lyndel W; Mischke, Sue; Bellato, Cláudia M; Motilal, Lambert; Zhang, Dapeng
2014-01-15
Cacao (Theobroma cacao L.), the source of cocoa, is an economically important tropical crop. One problem with the premium cacao market is contamination with off-types adulterating raw premium material. Accurate determination of the genetic identity of single cacao beans is essential for ensuring cocoa authentication. Using nanofluidic single nucleotide polymorphism (SNP) genotyping with 48 SNP markers, we generated SNP fingerprints for small quantities of DNA extracted from the seed coat of single cacao beans. On the basis of the SNP profiles, we identified an assumed adulterant variety, which was unambiguously distinguished from the authentic beans by multilocus matching. Assignment tests based on both Bayesian clustering analysis and allele frequency clearly separated all 30 authentic samples from the non-authentic samples. Distance-based principle coordinate analysis further supported these results. The nanofluidic SNP protocol, together with forensic statistical tools, is sufficiently robust to establish authentication and to verify gourmet cacao varieties. This method shows significant potential for practical application.
Is pride a prosocial emotion? Interpersonal effects of authentic and hubristic pride.
Wubben, Maarten J J; De Cremer, David; van Dijk, Eric
2012-01-01
Pride is associated with both prosocial and antisocial behaviour. Do others also infer such behaviours when pride is expressed and does this affect their own prosocial behaviour? We expected that authentic pride (i.e., confidence, accomplishment) would signal and elicit more prosocial behaviour than hubristic pride (i.e., arrogance, conceit). In a first laboratory experiment, a target in a public-good dilemma was inferred to have acted less prosocially when displaying a nonverbal expression of pride versus no emotion. As predicted, inferences of hubristic pride-but not authentic pride-mediated this effect. Participants themselves also responded less prosocially. A second laboratory experiment where a target verbally expressed authentic pride, hubristic pride, or no emotion replicated the effects of hubristic pride and showed that authentically proud targets were assumed to have acted prosocially, but especially by perceivers with a dispositional tendency to take the perspective of others. We conclude that authentic pride is generally perceived as a more prosocial emotion than hubristic pride.
Fleeson, William; Wilt, Joshua
2010-01-01
Individuals vary their behavior from moment to moment a great deal, often acting “out of character” for their traits. This article investigates the consequences for authenticity. We compared two hypotheses—trait consistency: individuals feel most authentic when acting in a way consistent with their traits; and state-content significance: some ways of acting feel more authentic because of their content and consequences, regardless of the actor’s corresponding traits. Three studies using experience-sampling methodology in laboratory and natural settings, with participants aged 18–51, strongly supported the state-content significance hypothesis and did not support the trait-consistency hypothesis. Authenticity was consistently associated with acting highly extraverted, agreeable, conscientious, emotionally stable, and intellectual, regardless of the actor’s traits. Discussion focuses on possible implications for within-person variability in behavior and for the nature of the self-concept. PMID:20545814
Evaluation of a New Patient Record System Using the Optical Card
Brown, J.H.U.; Vallbona, Carlos; Shoda, Junji; Albin, Jean
1989-01-01
A new form of patient record has been devised in which a laser imprinted card is coupled to a p.c. for data input and output. Entry of data is simple and recall of any datum requires only a keystroke. Any part of the data can be readily accessed through a software system which encompasses a variety of screens and menus to summarize and combine data. The complete system has been under test in a community health clinic and at NASA and results to date are satisfactory. Preliminary evaluation indicates that the system has no hardware problems, that the software is suitable for the purpose, that patients carry the card and return with it at succeeding visits, that physicians accept that card for a medical record and are pleased with the speed of access and the organization of the data.
FTAP: a Linux-based program for tapping and music experiments.
Finney, S A
2001-02-01
This paper describes FTAP, a flexible data collection system for tapping and music experiments. FTAP runs on standard PC hardware with the Linux operating system and can process input keystrokes and auditory output with reliable millisecond resolution. It uses standard MIDI devices for input and output and is particularly flexible in the area of auditory feedback manipulation. FTAP can run a wide variety of experiments, including synchronization/continuation tasks (Wing & Kristofferson, 1973), synchronization tasks combined with delayed auditory feedback (Aschersleben & Prinz, 1997), continuation tasks with isolated feedback perturbations (Wing, 1977), and complex alterations of feedback in music performance (Finney, 1997). Such experiments have often been implemented with custom hardware and software systems, but with FTAP they can be specified by a simple ASCII text parameter file. FTAP is available at no cost in source-code form.
Fingerstroke time estimates for touchscreen-based mobile gaming interaction.
Lee, Ahreum; Song, Kiburm; Ryu, Hokyoung Blake; Kim, Jieun; Kwon, Gyuhyun
2015-12-01
The growing popularity of gaming applications and ever-faster mobile carrier networks have called attention to an intriguing issue that is closely related to command input performance. A challenging mirroring game service, which simultaneously provides game service to both PC and mobile phone users, allows them to play games against each other with very different control interfaces. Thus, for efficient mobile game design, it is essential to apply a new predictive model for measuring how potential touch input compares to the PC interfaces. The present study empirically tests the keystroke-level model (KLM) for predicting the time performance of basic interaction controls on the touch-sensitive smartphone interface (i.e., tapping, pointing, dragging, and flicking). A modified KLM, tentatively called the fingerstroke-level model (FLM), is proposed using time estimates on regression models. Copyright © 2015 Elsevier B.V. All rights reserved.
The fast and the slow of skilled bimanual rhythm production: parallel versus integrated timing.
Krampe, R T; Kliegl, R; Mayr, U; Engbert, R; Vorberg, D
2000-02-01
Professional pianists performed 2 bimanual rhythms at a wide range of different tempos. The polyrhythmic task required the combination of 2 isochronous sequences (3 against 4) between the hands; in the syncopated rhythm task successive keystrokes formed intervals of identical (isochronous) durations. At slower tempos, pianists relied on integrated timing control merging successive intervals between the hands into a common reference frame. A timer-motor model is proposed based on the concepts of rate fluctuation and the distinction between target specification and timekeeper execution processes as a quantitative account of performance at slow tempos. At rapid rates expert pianists used hand-independent, parallel timing control. In alternative to a model based on a single central clock, findings support a model of flexible control structures with multiple timekeepers that can work in parallel to accommodate specific task constraints.
Proteomics for the authentication of fish species.
Mazzeo, Maria Fiorella; Siciliano, Rosa Anna
2016-09-16
Assessment of seafood authenticity and origin, mainly in the case of processed products (fillets, sticks, baby food) represents the crucial point to prevent fraudulent deceptions thus guaranteeing market transparency and consumers health. The most dangerous practice that jeopardies fish safety is intentional or unintentional mislabeling, originating from the substitution of valuable fish species with inferior ones. Conventional analytical methods for fish authentication are becoming inadequate to comply with the strict regulations issued by the European Union and with the increase of mislabeling due to the introduction on the market of new fish species and market globalization. This evidence prompts the development of high-throughput approaches suitable to identify unambiguous biomarkers of authenticity and screen a large number of samples with minimal time consumption. Proteomics provides suitable and powerful tools to investigate main aspects of food quality and safety and has given an important contribution in the field of biomarkers discovery applied to food authentication. This report describes the most relevant methods developed to assess fish identity and offers a perspective on their potential in the evaluation of fish quality and safety thus depicting the key role of proteomics in the authentication of fish species and processed products. The assessment of fishery products authenticity is a main issue in the control quality process as deceptive practices could imply severe health risks. Proteomics based methods could significantly contribute to detect falsification and frauds, thus becoming a reliable operative first-line testing resource in food authentication. Copyright © 2016 Elsevier B.V. All rights reserved.
26 CFR 301.6064-1 - Signature presumed authentic.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Signature presumed authentic. 301.6064-1 Section 301.6064-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED....6064-1 Signature presumed authentic. An individual's name signed to a return, statement, or other...
36 CFR 1275.66 - Reproduction and authentication of other materials.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 36 Parks, Forests, and Public Property 3 2011-07-01 2011-07-01 false Reproduction and... Reproduction and authentication of other materials. (a) Copying of materials, including tape recordings... materials when necessary for the purpose of the research. (c) The fees for reproduction and authentication...
77 FR 65477 - Repeal of Regulations on Marriages
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-29
... outdated and duplicative of other authorities that detail procedures for authentications and documentation... authentication of marriage documents. This section is unnecessary because the laws and regulations that apply to authentications in general also apply to marriage documents, and these functions are already covered in 22 CFR 92...
43 CFR 2.89 - What must I, as an employee, do upon receiving a request?
Code of Federal Regulations, 2010 CFR
2010-10-01
... grant a request for authentication of records; and (2) Consult the Solicitor's Office or, in the case of the Office of Inspector General, its General Counsel, concerning the proper form of the authentication (as authentication requirements may vary by jurisdiction). ...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-28
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-697] In the Matter of Certain Authentication Systems, Including Software and Handheld Electronic Devices; Notice of Commission Decision Not to... importation of certain authentication systems, including software and handheld electronic devices, by reason...
21 CFR 1311.140 - Requirements for signing a controlled substance prescription.
Code of Federal Regulations, 2010 CFR
2010-04-01
... following statement or its substantial equivalent is displayed: “By completing the two-factor authentication... above information to the pharmacy for dispensing. The two-factor authentication protocol may only be... section remain displayed, the practitioner must be prompted to complete the two-factor authentication...
User Authentication and Authorization Challenges in a Networked Library Environment.
ERIC Educational Resources Information Center
Machovec, George S.
1997-01-01
Discusses computer user authentication and authorization issues when libraries need to let valid users access databases and information services without making the process too difficult for either party. Common solutions are explained, including filtering, passwords, and kerberos (cryptographic authentication scheme for secure use over public…
22 CFR 92.40 - Authentication of foreign extradition papers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication of foreign extradition papers. 92.40 Section 92.40 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign...
Authentic Discourse and the Survival English Curriculum.
ERIC Educational Resources Information Center
Cathcart, Ruth Larimer
1989-01-01
In-depth analysis of topic distribution, utterance functions, and structural and lexical elements in a doctor-patient interaction revealed significant differences between authentic discourse and English-as-a-Second-Language text discourse, suggesting a need for better collection of more authentic data, for a distributional analysis of…
Leader Authenticity in Intercultural School Contexts
ERIC Educational Resources Information Center
Walker, Allan; Shuangye, Chen
2007-01-01
This article proposes that effective leadership in intercultural schools requires authentic understanding and related action; and that this can only be sought through a dedication to ongoing leadership learning. After briefly introducing the metaphor of authentic leadership, outlining the influence of culture on school leadership and the context…
76 FR 31671 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-01
... Credentialing and Authentication Process--20 CFR 401.45--0960-NEW. Social Security is introducing a stronger citizen authentication process that will enable a new user to experience and access more electronic services. Background: Authentication is the foundation for secure, online transactions. Identity...
Authentic Assessment: Creating a Blueprint for Course Design
ERIC Educational Resources Information Center
Villarroel, Verónica; Bloxham, Susan; Bruna, Daniela; Bruna, Carola; Herrera-Seda, Constanza
2018-01-01
Authenticity has been identified as a key characteristic of assessment design which promotes learning. Authentic assessment aims to replicate the tasks and performance standards typically found in the world of work, and has been found to have a positive impact on student learning, autonomy, motivation, self-regulation and metacognition; abilities…
Girls' Relationship Authenticity and Self-Esteem across Adolescence
ERIC Educational Resources Information Center
Impett, Emily A.; Sorsoli, Lynn; Schooler, Deborah; Henson, James M.; Tolman; Deborah L.
2008-01-01
Feminist psychologists have long posited that relationship authenticity (i.e., the congruence between what one thinks and feels and what one does and says in relational contexts) is integral to self-esteem and well-being. Guided by a feminist developmental framework, the authors investigated the role of relationship authenticity in promoting…
22 CFR 92.43 - Fees for notarial services and authentications.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Fees for notarial services and authentications. 92.43 Section 92.43 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.43 Fees for notarial services and authentications. The fees...
46 CFR 201.3 - Authentication of rules, orders, determinations and decisions of the Administration.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 8 2010-10-01 2010-10-01 false Authentication of rules, orders, determinations and decisions of the Administration. 201.3 Section 201.3 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF....3 Authentication of rules, orders, determinations and decisions of the Administration. All rules...
Authentication Projects for Historical Fiction: Do You Believe It?
ERIC Educational Resources Information Center
McTigue, Erin; Thornton, Elaine; Wiese, Patricia
2013-01-01
Authentication projects, particularly for historical fiction, provide a means for students to explore literature and history while practicing critical literacy skills. The authors 1) present benefits and cautions for historical fiction use in elementary classrooms, 2) introduce authentication projects as a means to mitigate risks and enhance…
45 CFR 2.6 - Certification and authentication of records.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Certification and authentication of records. 2.6 Section 2.6 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION TESTIMONY BY... Certification and authentication of records. Upon request, DHHS agencies will certify, pursuant to 42 U.S.C...
40 CFR 1612.4 - Requests for authentication or certification of records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Requests for authentication or certification of records. 1612.4 Section 1612.4 Protection of Environment CHEMICAL SAFETY AND HAZARD INVESTIGATION BOARD PRODUCTION OF RECORDS IN LEGAL PROCEEDINGS § 1612.4 Requests for authentication or...
47 CFR 1.359 - Proof of official record; authentication of copy.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 1 2010-10-01 2010-10-01 false Proof of official record; authentication of copy. 1.359 Section 1.359 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND PROCEDURE Hearing Proceedings Evidence § 1.359 Proof of official record; authentication of copy. An official...
22 CFR 131.2 - Refusal of certification for unlawful purpose.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... 131.2 Section 131.2 Foreign Relations DEPARTMENT OF STATE MISCELLANEOUS CERTIFICATES OF AUTHENTICATION... purpose. It is therefore the duty of the Authentication Officer to examine not only the document which the... certifications may have been affixed by other authorities. The Authentication Officer shall request such...
Developing (Authentic?) Academic Writers
ERIC Educational Resources Information Center
Badley, Graham
2008-01-01
Purpose: This paper seeks to consider whether the notion of authenticity is useful or meaningful in the context of developing academics as writers. Design/methodology/approach: The approach taken is that of a reflective essay. Recent texts on authenticity in higher education are examined whilst a transactional theory of writing is also considered…
Authentic Learning and Multimedia in History Education
ERIC Educational Resources Information Center
Hillis, Peter
2008-01-01
The momentum gathering behind authentic learning/critical skills raises fundamental issues concerning teaching and learning. This article discusses some of the more general arguments surrounding authentic learning with particular reference to an in-depth evaluation of its impact on schools in one part of Great Britain. It then moves on to describe…
Authentic Leadership Development in the Classroom: A Narrative Approach
ERIC Educational Resources Information Center
Albert, Joseph F.; Vadla, Kaitlin
2009-01-01
This paper examines how a classroom designed process of constructing narratives about oneself, a group, and others helps students develop an authentic leadership voice. We begin by describing the theoretical framework behind our paper, which includes an overview of the notion of authenticity and the linkage between narrative and authentic…
22 CFR 52.2 - Authentication of marriage and divorce documents.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Authentication of marriage and divorce documents. 52.2 Section 52.2 Foreign Relations DEPARTMENT OF STATE NATIONALITY AND PASSPORTS MARRIAGES § 52.2 Authentication of marriage and divorce documents. (a) Whenver a consular officer is requested to...
22 CFR 52.2 - Authentication of marriage and divorce documents.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication of marriage and divorce documents. 52.2 Section 52.2 Foreign Relations DEPARTMENT OF STATE NATIONALITY AND PASSPORTS MARRIAGES § 52.2 Authentication of marriage and divorce documents. (a) Whenver a consular officer is requested to...
22 CFR 52.2 - Authentication of marriage and divorce documents.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Authentication of marriage and divorce documents. 52.2 Section 52.2 Foreign Relations DEPARTMENT OF STATE NATIONALITY AND PASSPORTS MARRIAGES § 52.2 Authentication of marriage and divorce documents. (a) Whenver a consular officer is requested to...
36 CFR 703.19 - Requests for authenticated copies of Library documents.
Code of Federal Regulations, 2010 CFR
2010-07-01
... copies of Library documents. 703.19 Section 703.19 Parks, Forests, and Public Property LIBRARY OF... Documents in Certain Legal Proceedings Where the Library Is Not a Party § 703.19 Requests for authenticated copies of Library documents. Requests for authenticated copies of Library documents for purposes of...
36 CFR 703.19 - Requests for authenticated copies of Library documents.
Code of Federal Regulations, 2011 CFR
2011-07-01
... copies of Library documents. 703.19 Section 703.19 Parks, Forests, and Public Property LIBRARY OF... Documents in Certain Legal Proceedings Where the Library Is Not a Party § 703.19 Requests for authenticated copies of Library documents. Requests for authenticated copies of Library documents for purposes of...
36 CFR 703.19 - Requests for authenticated copies of Library documents.
Code of Federal Regulations, 2012 CFR
2012-07-01
... copies of Library documents. 703.19 Section 703.19 Parks, Forests, and Public Property LIBRARY OF... Documents in Certain Legal Proceedings Where the Library Is Not a Party § 703.19 Requests for authenticated copies of Library documents. Requests for authenticated copies of Library documents for purposes of...
36 CFR 703.19 - Requests for authenticated copies of Library documents.
Code of Federal Regulations, 2014 CFR
2014-07-01
... copies of Library documents. 703.19 Section 703.19 Parks, Forests, and Public Property LIBRARY OF... Documents in Certain Legal Proceedings Where the Library Is Not a Party § 703.19 Requests for authenticated copies of Library documents. Requests for authenticated copies of Library documents for purposes of...
47 CFR 64.2010 - Safeguards on the disclosure of customer proprietary network information.
Code of Federal Regulations, 2013 CFR
2013-10-01
... authenticate a customer prior to disclosing CPNI based on customer-initiated telephone contact, online account... customer. (c) Online access to CPNI. A telecommunications carrier must authenticate a customer without the... customer online access to CPNI related to a telecommunications service account. Once authenticated, the...
47 CFR 64.2010 - Safeguards on the disclosure of customer proprietary network information.
Code of Federal Regulations, 2012 CFR
2012-10-01
... authenticate a customer prior to disclosing CPNI based on customer-initiated telephone contact, online account... customer. (c) Online access to CPNI. A telecommunications carrier must authenticate a customer without the... customer online access to CPNI related to a telecommunications service account. Once authenticated, the...
47 CFR 64.2010 - Safeguards on the disclosure of customer proprietary network information.
Code of Federal Regulations, 2014 CFR
2014-10-01
... authenticate a customer prior to disclosing CPNI based on customer-initiated telephone contact, online account... customer. (c) Online access to CPNI. A telecommunications carrier must authenticate a customer without the... customer online access to CPNI related to a telecommunications service account. Once authenticated, the...
22 CFR 61.3 - Certification and authentication criteria.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Certification and authentication criteria. 61.3 Section 61.3 Foreign Relations DEPARTMENT OF STATE PUBLIC DIPLOMACY AND EXCHANGES WORLD-WIDE FREE FLOW OF AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall...
ERIC Educational Resources Information Center
Klipfel, Kevin Michael
2015-01-01
This article articulates and defends a student-centered approach to reference and instructional librarianship defined by authentic engagement with students' interests. A review of the history of the construct of authenticity in philosophy, humanistic and existential psychology, and contemporary educational psychology is traced. Connections are…
Preliminary Development and Validation of a Measure of Relationship Authenticity
ERIC Educational Resources Information Center
Lopez, Frederick G.; Rice, Kenneth G.
2006-01-01
The authors describe the preliminary development and validation of the Authenticity in Relationships Scale. An initial pool of 37 items addressing various elements of the proposed definition of "relationship authenticity" was administered to 2 independent samples of undergraduates (N = 487) who acknowledged being in a current romantic…
Use of Authentic Materials in the ESP Classroom
ERIC Educational Resources Information Center
Benavent, Gabriela Torregrosa; Penamaria, Sonsoles Sanchez-Reyes
2011-01-01
Authentic materials are especially important for ESP trainees, since they reproduce an immersion environment and provide a realistic context for tasks that relate to learners' needs. Realia and authentic materials increase learners' motivation but are difficult to adapt to the learner's level of language, especially at the beginning level. It is…
Authentic Language Opportunities: An Alternative Dual Language Model (ADLM)
ERIC Educational Resources Information Center
Winstead, Lisa
2006-01-01
This paper addresses an important topic--the isolation and or lack of inclusion of immigrant children in U.S. schools. Immigrant children constantly pour into U.S. schools and, especially as newcomers, their opportunities for authentic interaction with mainstream peers are limited. How can schools provide authentic language opportunities for…
Do We Need to Design Course-Based Undergraduate Research Experiences for Authenticity?
ERIC Educational Resources Information Center
Rowland, Susan; Pedwell, Rhianna; Lawrie, Gwen; Lovie-Toon, Joseph; Hung, Yu
2016-01-01
The recent push for more authentic teaching and learning in science, technology, engineering, and mathematics indicates a shared agreement that undergraduates require greater exposure to professional practices. There is considerable variation, however, in how "authentic" science education is defined. In this paper we present our…
Authentic Text Types and Corresponding Activities: A List for the Foreign Language Instructor.
ERIC Educational Resources Information Center
Geltrich-Ludgate, Brigitta; Tovar, Deanna
1987-01-01
The study of authentic texts gives students the opportunity to become functional in target-language situations. An exhaustive alphabetical list of authentic text types and corresponding learning activities are presented. Text types include: advertisements, bank materials, bills and receipts, calendars, captions, comics, commercials, decals, forms,…
Warszewska-Makuch, Magdalena; Bedyńska, Sylwia; Żołnierczyk-Zreda, Dorota
2015-01-01
The aim of this study was to show how authentic leadership is related to social support and exposure to workplace bullying and how these variables are related to mental health. For our sample of 820 office workers employed in different Polish organizations and sectors, social support from supervisors moderated the relationship between authentic leadership and workplace bullying. Social support from co-workers moderated the relationship between workplace bullying and mental health and authentic leadership moderated the relationship between workplace bullying and mental health. PMID:26323771
Warszewska-Makuch, Magdalena; Bedyńska, Sylwia; Żołnierczyk-Zreda, Dorota
2015-01-01
The aim of this study was to show how authentic leadership is related to social support and exposure to workplace bullying and how these variables are related to mental health. For our sample of 820 office workers employed in different Polish organizations and sectors, social support from supervisors moderated the relationship between authentic leadership and workplace bullying. Social support from co-workers moderated the relationship between workplace bullying and mental health and authentic leadership moderated the relationship between workplace bullying and mental health.
The research and implementation of a unified identity authentication in e-government network
NASA Astrophysics Data System (ADS)
Feng, Zhou
Current problem existing in e-government network is that the applications of information system are developed independently by various departments, and each has its own specific set of authentication and access control mechanism. To build a comprehensive information system in favor of sharing and exchanging information, a sound and secure unified e-government authentication system is firstly needed. The paper, combining with practical development of e-government network, carries out a thorough discussion on how to achieve data synchronization between unified authentication system and related application systems.
Identity-Based Authentication for Cloud Computing
NASA Astrophysics Data System (ADS)
Li, Hongwei; Dai, Yuanshun; Tian, Ling; Yang, Haomiao
Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.
Carver, Charles S.; Johnson, Sheri L.
2010-01-01
This study examines the relationships of trait-like tendencies towards authentic and hubristic pride (Tracy & Robins, 2004) with goal-regulation tendencies, affective tendencies, and impulsive traits. Undergraduates (n = 936) completed the 14-item measure of authentic and hubristic pride (Tracy & Robins, 2007b) and a battery of other self-report measures. The two types of pride correlated with distinct profiles of goal regulation tendencies, affective tendencies, and self-control. Authentic pride correlated with measures of self-control, whereas hubristic pride was related to measures of impulsivity and aggression. Overall, the differential pattern of correlations fits with a model in which authentic pride is tied to adaptive achievement and goal engagement, whereas hubristic pride is tied to extrinsic values of public recognition and social dominance. PMID:21769159
Weeks, Keith W; Meriel Hutton, B; Coben, Diana; Clochesy, John M; Pontin, David
2013-03-01
When designing learning and assessment environments it is essential to articulate the underpinning education philosophy, theory, model and learning style support mechanisms that inform their structure and content. We elaborate on original PhD research that articulates the design rationale of authentic medication dosage calculation problem-solving (MDC-PS) learning and diagnostic assessment environments. These environments embody the principles of authenticity, building knowledge and skills and competency assessment and are designed to support development of competence and bridging of the theory-practice gap. Authentic learning and diagnostic assessment environments capture the features and expert practices that are located in real world practice cultures and recreate them in authentic virtual clinical environments. We explore how this provides students with a safe virtual authentic environment to actively experience, practice and undertake MDC-PS learning and assessment activities. We argue that this is integral to the construction and diagnostic assessment of schemata validity (mental constructions and frameworks that are an individual's internal representation of their world), bridging of the theory-practice gap and cognitive and functional competence development. We illustrate these principles through the underpinning pedagogical design of two online virtual authentic learning and diagnostic assessment environments (safeMedicate and eDose™). Copyright © 2012. Published by Elsevier Ltd.
Martinez, Larry R; Sawyer, Katina B; Thoroughgood, Christian N; Ruggs, Enrica N; Smith, Nicholas A
2017-02-01
The present research examined the relation between authentic identity expression and transgender employees' work-related attitudes and experiences. Drawing on Kernis' (2003) theoretical conceptualization of authenticity and expanding on current workplace identity management research, we predicted that employees who had taken steps to reduce the discrepancy between their inner gender identities and their outward manifestations of gender would report more positive job attitudes and workplace experiences, in part because the reduction of this discrepancy is related to greater feelings of authenticity. In Study 1, we found that the extent to which one has transitioned was related to higher job satisfaction and perceived person-organization (P-O) fit and lower perceived discrimination. In Study 2, we replicate and extend these results by showing that the extent to which employees felt that others at work perceived them in a manner consistent with how they perceived themselves (relational authenticity) mediated the relations between extent of transition and all 3 of these outcomes. However, perceptions of alignment between one's felt and expressed identity (action authenticity) only mediated this link for job satisfaction. We discuss the theoretical and practical implications of our results, as well as avenues for future research on authenticity in the workplace. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Brinckmann, J A
2013-11-01
Pharmacopoeial monographs providing specifications for composition, identity, purity, quality, and strength of a botanical are developed based on analysis of presumably authenticated botanical reference materials. The specimens should represent the quality traditionally specified for the intended use, which may require different standards for medicinal versus food use. Development of quality standards monographs may occur through collaboration between a sponsor company or industry association and a pharmacopoeial expert committee. The sponsor may base proposed standards and methods on their own preferred botanical supply which may, or may not, be geo-authentic and/or correspond to qualities defined in traditional medicine formularies and pharmacopoeias. Geo-authentic botanicals are those with specific germplasm, cultivated or collected in their traditional production regions, of a specified biological age at maturity, with specific production techniques and processing methods. Consequences of developing new monographs that specify characteristics of an 'introduced' cultivated species or of a material obtained from one unique origin could lead to exclusion of geo-authentic herbs and may have therapeutic implications for clinical practice. In this review, specifications of selected medicinal plants with either a geo-authentic or geographical indication designation are discussed and compared against official pharmacopoeial standards for same genus and species regardless of origin. Copyright © 2012 John Wiley & Sons, Ltd.
NASA Astrophysics Data System (ADS)
Lenzini, Gabriele
We describe an existing software architecture for context and proximity aware services that enables trust-based and context-aware authentication. A service is proximity aware when it automatically detects the presence of entities in its proximity. Authentication is context-aware when it uses contextual information to discern among different identities and to evaluate to which extent they are authentic. The software architecture that we describe here is functioning in our Institute: It manages a sensor network to detect the presence and location of users and their devices. A context manager is responsible to merge the different sources of contextual information, to solve potential contradictions, and to determine the level of authentication of the identity of the person approaching one of the services offered in the coffee-break corners of our Institute. In our solution for context-aware authentication, sensors are managed as if they were recommenders having subjective belief, disbelief, and uncertainty (i.e., trust) on the position and identity of users. A sensor’s subjective trust depends on what it has been sensing in the environment. We discuss the results of an array of simulations that we conducted to validate our concept of trust-based and context-aware authentication. We use Subjective Logic to manage trust.
Heckeroth, J; Boywitt, C D
2017-06-01
Considering the increasing relevance of handwritten electronically captured signatures, we evaluated the ability of forensic handwriting examiners (FHEs) to distinguish between authentic and simulated electronic signatures. Sixty-six professional FHEs examined the authenticity of electronic signatures captured with software by signotec on a smartphone Galaxy Note 4 by Samsung and signatures made with a ballpoint pen on paper (conventional signatures). In addition, we experimentally varied the name ("J. König" vs. "A. Zaiser") and the status (authentic vs. simulated) of the signatures in question. FHEs' conclusions about the authenticity did not show a statistically significant general difference between electronic and conventional signatures. Furthermore, no significant discrepancies between electronic and conventional signatures were found with regard to other important aspects of the authenticity examination such as questioned signatures' graphic information content, the suitability of the provided sample signatures, the necessity of further examinations and the levels of difficulty of the cases under examination. Thus, this study did not reveal any indications that electronic signatures captured with software by signotec on a Galaxy Note 4 are less well suited than conventional signatures for the examination of authenticity, precluding potential technical problems concerning the integrity of electronic signatures. Copyright © 2017 Elsevier B.V. All rights reserved.
Analog Video Authentication and Seal Verification Equipment Development
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gregory Lancaster
Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital imagesmore » and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.« less
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin
2010-04-01
The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.
Experiencing authenticity - the core of student learning in clinical practice.
Manninen, Katri
2016-10-01
Learning in clinical practice is challenging regarding organizational and pedagogical issues. Clinical education wards are one way to meet these challenges by focusing on both patient care and student learning. However, more knowledge is needed about how students' learning can be enhanced and about patients' and supervisors' roles in these settings. The aim was to explore nursing students' learning on a clinical education ward with an explicit pedagogical framework. Semi-structured interviews of students were analyzed using qualitative content analysis and an ethnographic study including observations and follow-up interviews of students, patients and supervisors was conducted. The core of student meaningful learning experiences both external and internal authenticity. Students in early stages immediately created mutual relationships, experienced both external and internal authenticity, and patients became active participants in student learning. Without a mutual relationship, patients passively let students practice on their bodies. Students nearing graduation experienced only external authenticity, creating uncertainty as a threshold for learning. Caring for patients with complex needs helped students overcome the threshold and experience internal authenticity. Supervisors' challenges were to balance patient care and student learning by working as a team. They supported students coping with the complex challenges on the ward. Students need to experience external and internal authenticity to make learning meaningful. Experiencing authenticity, involving meaning-making processes and knowledge construction, is linked to transformative learning and overcoming thresholds. Therefore, an explicit pedagogical framework, based on patient-centredness, peer learning and the supervisory team, creates the prerequisites for experiencing external and internal authenticity.
Authenticity in the Process of Learning about Instructional Design
ERIC Educational Resources Information Center
Wilson, Jay R.; Schwier, Richard A.
2009-01-01
Authentic learning is touted as a powerful learning approach, particularly in the context of problem-based learning (Savery, 2006). Teaching and learning in the area of instructional design appears to offer a strong fit between the tenets of authentic learning and the practice of instructional design. This paper details the efforts to broaden and…
ERIC Educational Resources Information Center
Akin, Umran; Akin, Ahmet
2014-01-01
Authenticity is a basic personality characteristic that has an important influence on both the psychological and social lives of individuals. Subjective vitality also assumes a facilitative role regarding positive mental health indicators. Therefore, the purpose of this study is to investigate the predictive role of authenticity on subjective…
Making it Real: Authenticity, Process and Pedagogy
ERIC Educational Resources Information Center
Badger, Richard; MacDonald, Malcolm
2010-01-01
Authenticity has been a part of the intellectual resources of language teaching since the 1890s but its precise meaning and implications are contested. This commentary argues for a view of authenticity which recognizes the limits of the concept as a guide for pedagogic practice and acknowledges the fact that texts are processes rather than…
Visualizing the Complex Process for Deep Learning with an Authentic Programming Project
ERIC Educational Resources Information Center
Peng, Jun; Wang, Minhong; Sampson, Demetrios
2017-01-01
Project-based learning (PjBL) has been increasingly used to connect abstract knowledge and authentic tasks in educational practice, including computer programming education. Despite its promising effects on improving learning in multiple aspects, PjBL remains a struggle due to its complexity. Completing an authentic programming project involves a…
Authentic Leadership--Is It More than Emotional Intelligence?
ERIC Educational Resources Information Center
Duncan, Phyllis; Green, Mark; Gergen, Esther; Ecung, Wenonah
2017-01-01
One of the newest theories to gain widespread interest is authentic leadership. Part of the rationale for developing a model and subsequent instrument to measure authentic leadership was a concern that the more popular theory, the full range model of leadership and its instrument, the Multifactor Leadership Questionnaire (MLQ) (Bass & Avolio,…
ERIC Educational Resources Information Center
Spence, Dianna J.; Sharp, Julia L.; Sinn, Robb
2011-01-01
Four instructors used authentic research projects and related curriculum materials when teaching elementary statistics in secondary and undergraduate settings. Projects were authentic in that students selected their own variables, defined their own research questions, and collected and analyzed their own data. Classes using these projects were…
Test-Task Authenticity: The Multiple Perspectives
ERIC Educational Resources Information Center
Gan, Zhengdong
2012-01-01
Leung and Lewkowicz remind us that the debate over the past two decades that is most relevant to ELT (English languge teaching) pedagogy and curriculum concerns test-task authenticity. This paper first reviews how the authenticity debate in the literature of second language acquisition, pedagogy and testing has evolved. Drawing on a body of…
The Case of the Capeman: Appropriation of the "Authentic"
ERIC Educational Resources Information Center
Ramirez, Jason
2005-01-01
"The Capeman" Paul Simon's first and only Broadway musical that embodies a peculiar authenticity unique in the history of Latino-themed musicals that stem from its reception by Latino audiences during its limited run is described. Capeman's music, dialogue and narrative gave authenticity for Latino audiences starved for representations of their…
46 CFR 502.4 - Authentication of rules or orders of Commission.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 9 2010-10-01 2010-10-01 false Authentication of rules or orders of Commission. 502.4 Section 502.4 Shipping FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS RULES OF PRACTICE AND PROCEDURE General Information § 502.4 Authentication of rules or orders of Commission. All rules...
ERIC Educational Resources Information Center
Weninger, Csilla
2018-01-01
Creating authentic learning opportunities in schools has been an important mission for educators and educational researchers, where 'authentic' is generally understood to mean connecting school education to students' current and future identities, experiences and expertise. This article aims to problematise the taken-for-granted notion of…
Authenticity in the Adult ESOL Classroom and beyond
ERIC Educational Resources Information Center
Roberts, Celia; Cooke, Melanie
2009-01-01
The debate over authenticity is a longstanding one in the teaching of English to speakers of other languages. This article revisits that debate in the context of linguistic-minority adults who, in the process of migration, experience a loss of independence and cultural capital (Bourdieu, 1986/2004). Adult migrants must develop authentic voices in…
On Location Learning: Authentic Applied Science with Networked Augmented Realities
ERIC Educational Resources Information Center
Rosenbaum, Eric; Klopfer, Eric; Perry, Judy
2007-01-01
The learning of science can be made more like the practice of science through authentic simulated experiences. We have created a networked handheld Augmented Reality environment that combines the authentic role-playing of Augmented Realities and the underlying models of Participatory Simulations. This game, known as Outbreak @ The Institute, is…
Relationships among Principal Authentic Leadership and Teacher Trust and Engagement Levels
ERIC Educational Resources Information Center
Bird, James J.; Wang, Chuang; Watson, Jim R.; Murray, Louise
2009-01-01
This study examined the relationships among the authentic leadership style of school principals and the trust and engagement levels of their teachers in a county school district in a Southeastern state. The authenticity of the school principal was found to be significantly positively related to teacher trust and teacher engagement levels. The…
Learning Authentic Leadership in New Zealand: A Learner-Centred Methodology and Evaluation
ERIC Educational Resources Information Center
Roche, Maree
2010-01-01
This study provides preliminary examination of the efficacy of the "Best Authentic Leadership Self" exercise. A field quasi-experimental design was conducted with a dual purpose: (1) to ascertain the value of interventions aimed at triggering events to enhance the learning (c.f. teaching) of "authentic leadership? and how this…
Authenticity and Empathy in Education
ERIC Educational Resources Information Center
Bialystok, Lauren; Kukar, Polina
2018-01-01
The educational enthusiasm for both authenticity and empathy makes a number of assumptions about universal virtues, self-hood, the role of emotion in education, and the role of the teacher. In this article, we argue that authenticity and empathy are both nebulous virtues that teachers and students are called to embody with little reflection on how…
Digital Learning Playground: Supporting Authentic Learning Experiences in the Classroom
ERIC Educational Resources Information Center
Chen, Gwo-Dong; Nurkhamid; Wang, Chin-Yeh; Yang, Su-Hang; Lu, Wei-Yuan; Chang, Chih-Kai
2013-01-01
This study proposes a platform to provide a near-authentic environment, context, and situation for task-based learning. The platform includes two projection screens (a vertical and a horizontal screen) combined for situated or authentic learning. The horizontal screen extends the vertical screen scene to form a space for learning activities and…
The Chronotopes of Authenticity: Designing the Tujia Heritage in China
ERIC Educational Resources Information Center
Wang, Xuan; Kroon, Sjaak
2017-01-01
This paper examines the ways in which the ethnic minority group the Tujia in Enshi, China, engages with heritage tourism, as a complex project of designing authenticity. Authenticity is taken as part of the chronotopic phenomena of identity making: the complex interplay of multiple, nonrandom timespace frames of discourses and semiotic…
Consideration of historical authenticity in heritage tourism planning and development
Craig Wiles; Gail Vander Stoep
2008-01-01
A review of heritage tourism literature reveals a fundamental tension over the use, function, and degree of authenticity of historic resources used for tourism development. Using a case study approach, this paper explores how stakeholder beliefs regarding historical authenticity influence the heritage tourism products, services, and experiences created for visitors and...
ERIC Educational Resources Information Center
Walker, Lisa; Smithgall, Cheryl; Cusick, Gretchen Ruth
2012-01-01
With the idea that schools in low-income urban areas require stronger communities to improve educational outcomes, this discussion paper examines questions related to the authentic engagement of communities in school and community partnerships. It presents three key ideas for considering authentic engagement: place-based policy, community-based…
ERIC Educational Resources Information Center
James, Lincoln Then; Casidy, Riza
2018-01-01
The purpose of this research is to investigate the effects of authentic assessment on student satisfaction and promoting behaviour. The sample comprised 120 students enrolled in an undergraduate business programme. A model was proposed and tested using conditional process analysis. It was found that authentic assessments are positively related to…
Urban Middle School Students' Reflections on Authentic Science Inquiry
ERIC Educational Resources Information Center
Rivera Maulucci, María S.; Brown, Bryan A.; Grey, Salina T.; Sullivan, Shayna
2014-01-01
This study explores the experiences of six urban middle school students in an authentic science inquiry program. Drawing on data including teaching journal entries, student work folders, and semi-structured focus group interviews of six participants, the findings explore six dimensions of authentic science inquiry, an approach to science inquiry…
Language Educators' Understanding of Authenticity in Teaching and Its Impacts on Their Practices
ERIC Educational Resources Information Center
Ramezanzadeh, Akram
2017-01-01
This grounded theory study explored the conceptualization of authenticity in language education. The participants were 30 Iranian English language educators, who were studied as adult learners. The findings revealed that authenticity was conceptualized by language educators as a social and reflective practice under the influence of the…
Exploring Children's Literature with Authentic Representations of Disability
ERIC Educational Resources Information Center
Rieger, Alicja; McGrail, Ewa
2015-01-01
Given the power of children's literature to communicate authentic representations of disability and the potential of humor for nurturing social acceptance, teachers should know how to discuss this literature in the inclusive classroom. The authors analyze authentic children's literature with elements of humor and provide strategies in…
40 CFR 2.406 - Requests for authenticated copies of EPA documents.
Code of Federal Regulations, 2012 CFR
2012-07-01
... EPA documents. 2.406 Section 2.406 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL... the United States Is Not a Party § 2.406 Requests for authenticated copies of EPA documents. Requests for authenticated copies of EPA documents for purposes of admissibility under 28 U.S.C. 1733 and Rule...
ERIC Educational Resources Information Center
Hudomalj, Emil; Jauk, Avgust
2006-01-01
Purpose: To give an overview of the current state and trends in authentication and authorisation in satisfying academic library users' mobility and instant access to digital information resources, and to propose that libraries strongly support efforts to establish a global authentication and authorisation infrastructure.…
A Framework for Authenticity in the Mathematics and Statistics Classroom
ERIC Educational Resources Information Center
Garrett, Lauretta; Huang, Li; Charleton, Maria Calhoun
2016-01-01
Authenticity is a term commonly used in reference to pedagogical and curricular qualities of mathematics teaching and learning, but its use lacks a coherent framework. The work of researchers in engineering education provides such a framework. Authentic qualities of mathematics teaching and learning are fit within a model described by Strobel,…
ERIC Educational Resources Information Center
Wilson, Michael
2014-01-01
Authentic leadership has attracted recent empirical research from a wide range of social science disciplines interested largely in its relationship to human resource management and organisational effectiveness. In contrast, the focus of this study is specifically on the philosophical foundations of authentic leadership and their implications for…
ERIC Educational Resources Information Center
Spell, Rachelle M.; Guinan, Judith A.; Miller, Kristen R.; Beck, Christopher W.
2014-01-01
Incorporating authentic research experiences in introductory biology laboratory classes would greatly expand the number of students exposed to the excitement of discovery and the rigor of the scientific process. However, the essential components of an authentic research experience and the barriers to their implementation in laboratory classes are…
Authentic Reading, Writing, and Discussion: An Exploratory Study of a Pen Pal Project
ERIC Educational Resources Information Center
Gambrell, Linda B.; Hughes, Elizabeth M.; Calvert, Leah; Malloy, Jacquelynn A.; Igo, Brent
2011-01-01
In this exploratory study, reading, writing, and discussion were examined within the context of a pen pal intervention focusing on authentic literacy tasks. The study employed a mixed-method design with a triangulation-convergence model to explore the relationship between authentic literacy tasks and the literacy motivation of elementary students…
ERIC Educational Resources Information Center
Levy, Yair; Ramim, Michelle M.; Furnell, Steven M.; Clarke, Nathan L.
2011-01-01
Purpose: Concerns for information security in e-learning systems have been raised previously. In the pursuit for better authentication approaches, few schools have implemented students' authentication during online exams beyond passwords. This paper aims to assess e-learners' intention to provide multibiometric data and use of multibiometrics…
The Effect of Authentic Leadership on School Culture: A Structural Equation Model
ERIC Educational Resources Information Center
Karadag, Engin; Oztekin-Bayir, Ozge
2018-01-01
In the study, the effect of school principals' authentic leadership behaviors on teachers' perceptions of school culture was tested with the structural equation model. The study was carried out with the correlation research design. Authentic leadership behavior was taken as the independent variable, and school culture was taken as the dependent…
Cultivation of Science Identity through Authentic Science in an Urban High School Classroom
ERIC Educational Resources Information Center
Chapman, Angela; Feldman, Allan
2017-01-01
This study examined how a contextually based authentic science experience affected the science identities of urban high school students who have been marginalized during their K-12 science education. We examined students' perceptions of the intervention as an authentic science experience, how the experience influenced their science identity, as…
A Framework and a Methodology for Developing Authentic Constructivist e-Learning Environments
ERIC Educational Resources Information Center
Zualkernan, Imran A.
2006-01-01
Semantically rich domains require operative knowledge to solve complex problems in real-world settings. These domains provide an ideal environment for developing authentic constructivist e-learning environments. In this paper we present a framework and a methodology for developing authentic learning environments for such domains. The framework is…
Teaching Foreign Languages with Realia and Other Authentic Materials. ERIC Q&A.
ERIC Educational Resources Information Center
Berwald, Jean-Pierre
Realia, authentic documents, and mass media are living daily proof of the value of language. Their authenticity, specialized vocabulary, reinforced grammatical structures, and topics of interest can help encourage interest in the target language and culture. They contain current language on all imaginable topics, and are not artificial or…
Using Authentic Aural Materials to Develop Listening Comprehension in the EFL Classroom
ERIC Educational Resources Information Center
Ghaderpanahi, Leila
2012-01-01
The purpose of this study was to examine the influences of authentic aural materials on listening ability of thirty female undergraduate psychology majors studying English as a foreign language. It basically focused on using authentic materials and real-life situations as part of the communicative approach. The results of the listening…
Integrated circuit authentication using photon-limited x-ray microscopy.
Markman, Adam; Javidi, Bahram
2016-07-15
A counterfeit integrated circuit (IC) may contain subtle changes to its circuit configuration. These changes may be observed when imaged using an x-ray; however, the energy from the x-ray can potentially damage the IC. We have investigated a technique to authenticate ICs under photon-limited x-ray imaging. We modeled an x-ray image with lower energy by generating a photon-limited image from a real x-ray image using a weighted photon-counting method. We performed feature extraction on the image using the speeded-up robust features (SURF) algorithm. We then authenticated the IC by comparing the SURF features to a database of SURF features from authentic and counterfeit ICs. Our experimental results with real and counterfeit ICs using an x-ray microscope demonstrate that we can correctly authenticate an IC image captured using orders of magnitude lower energy x-rays. To the best of our knowledge, this Letter is the first one on using a photon-counting x-ray imaging model and relevant algorithms to authenticate ICs to prevent potential damage.
Authentication Without Secrets
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pierson, Lyndon G.; Robertson, Perry J.
This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integritymore » of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.« less
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
2014-01-01
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
2014-06-10
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.
Wireless Technology Infrastructures for Authentication of Patients: PKI that Rings
Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D.
2005-01-01
As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system. PMID:15684133
Yi, Faliu; Jeoung, Yousun; Moon, Inkyu
2017-05-20
In recent years, many studies have focused on authentication of two-dimensional (2D) images using double random phase encryption techniques. However, there has been little research on three-dimensional (3D) imaging systems, such as integral imaging, for 3D image authentication. We propose a 3D image authentication scheme based on a double random phase integral imaging method. All of the 2D elemental images captured through integral imaging are encrypted with a double random phase encoding algorithm and only partial phase information is reserved. All the amplitude and other miscellaneous phase information in the encrypted elemental images is discarded. Nevertheless, we demonstrate that 3D images from integral imaging can be authenticated at different depths using a nonlinear correlation method. The proposed 3D image authentication algorithm can provide enhanced information security because the decrypted 2D elemental images from the sparse phase cannot be easily observed by the naked eye. Additionally, using sparse phase images without any amplitude information can greatly reduce data storage costs and aid in image compression and data transmission.