Sample records for specific authentic cost

  1. Efficient cost-sensitive human-machine collaboration for offline signature verification

    NASA Astrophysics Data System (ADS)

    Coetzer, Johannes; Swanepoel, Jacques; Sabourin, Robert

    2012-01-01

    We propose a novel strategy for the optimal combination of human and machine decisions in a cost-sensitive environment. The proposed algorithm should be especially beneficial to financial institutions where off-line signatures, each associated with a specific transaction value, require authentication. When presented with a collection of genuine and fraudulent training signatures, produced by so-called guinea pig writers, the proficiency of a workforce of human employees and a score-generating machine can be estimated and represented in receiver operating characteristic (ROC) space. Using a set of Boolean fusion functions, the majority vote decision of the human workforce is combined with each threshold-specific machine-generated decision. The performance of the candidate ensembles is estimated and represented in ROC space, after which only the optimal ensembles and associated decision trees are retained. When presented with a questioned signature linked to an arbitrary writer, the system first uses the ROC-based cost gradient associated with the transaction value to select the ensemble that minimises the expected cost, and then uses the corresponding decision tree to authenticate the signature in question. We show that, when utilising the entire human workforce, the incorporation of a machine streamlines the authentication process and decreases the expected cost for all operating conditions.

  2. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    PubMed

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  3. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    PubMed Central

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  4. Novel method for the authentication of frigate tunas (Auxis thazard and Auxis rochei) in commercial canned products.

    PubMed

    Infante, Carlos; Catanese, Gaetano; Ponce, Marian; Manchado, Manuel

    2004-12-15

    A novel procedure for the authentication of frigate tunas (Auxis thazard and Auxis rochei) in commercially canned products has been developed. Three mitochondrial regions were simultaneously amplified by multiplex-Polymerase Chain Reaction, one corresponding to the small rRNA 12S subunit as a positive amplification control and two species-specific fragments corresponding to cytochrome b for A. rochei and ATPase 6 for A. thazard, respectively. Testing of two different detection systems revealed the fluorescence-based approach as the most sensitive. The results demonstrate that this rapid, low-cost methodology is a reliable molecular tool for direct application in the authentication of canned products.

  5. Anti-deception: reliable EEG-based biometrics with real-time capability from the neural response of face rapid serial visual presentation.

    PubMed

    Wu, Qunjian; Yan, Bin; Zeng, Ying; Zhang, Chi; Tong, Li

    2018-05-03

    The electroencephalogram (EEG) signal represents a subject's specific brain activity patterns and is considered as an ideal biometric given its superior invisibility, non-clonality, and non-coercion. In order to enhance its applicability in identity authentication, a novel EEG-based identity authentication method is proposed based on self- or non-self-face rapid serial visual presentation. In contrast to previous studies that extracted EEG features from rest state or motor imagery, the designed paradigm could obtain a distinct and stable biometric trait with a lower time cost. Channel selection was applied to select specific channels for each user to enhance system portability and improve discriminability between users and imposters. Two different imposter scenarios were designed to test system security, which demonstrate the capability of anti-deception. Fifteen users and thirty imposters participated in the experiment. The mean authentication accuracy values for the two scenarios were 91.31 and 91.61%, with 6 s time cost, which illustrated the precision and real-time capability of the system. Furthermore, in order to estimate the repeatability and stability of our paradigm, another data acquisition session is conducted for each user. Using the classification models generated from the previous sessions, a mean false rejected rate of 7.27% has been achieved, which demonstrates the robustness of our paradigm. Experimental results reveal that the proposed paradigm and methods are effective for EEG-based identity authentication.

  6. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

    PubMed

    He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk

    2014-10-01

    The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

  7. Fast and secure handover of intra-ASN IEEE802.16 network by proposed certificate based pre-authentication

    NASA Astrophysics Data System (ADS)

    Sridevi, B.; Supriya, T. S.; Rajaram, S.

    2013-01-01

    The current generation of wireless networks has been designed predominantly to support voice and more recently data traffic. WiMAX is currently one of the hottest technologies in wireless. The main motive of the mobile technologies is to provide seamless cost effective mobility. But this is affected by Authentication cost and handover delay since on each handoff the Mobile Station (MS) has to undergo all steps of authentication. Pre-Authentication is used to reduce the handover delay and increase the speed of the Intra-ASN Handover. Proposed Pre-Authentication method is intended to reduce the authentication delay by getting pre authenticated by central authority called Pre Authentication Authority (PAA). MS requests PAA for Pre Authentication Certificate (PAC) before performing handoff. PAA verifies the identity of MS and provides PAC to MS and also to the neighboring target Base Stations (tBSs). MS having time bound PAC can skip the authentication process when recognized by target BS during handoff. It also prevents the DOS (Denial Of Service) attack and Replay attack. It has no wastage of unnecessary key exchange of the resources. The proposed work is simulated by NS2 model and by MATLAB.

  8. Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.

    PubMed

    Lou, Der-Chyuan; Lee, Tian-Fu; Lin, Tsung-Hung

    2015-05-01

    Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize identification except for using passwords and smartcards. Due to too many transmissions and computational costs, these authenticated key agreement schemes are inefficient in communication and computation. This investigation develops two secure and efficient authenticated key agreement schemes for telecare medicine information systems by using biometric key and extended chaotic maps. One scheme is synchronization-based, while the other nonce-based. Compared to related approaches, the proposed schemes not only retain the same security properties with previous schemes, but also provide users with privacy protection and have fewer transmissions and lower computational cost.

  9. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.

    PubMed

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-11-17

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  10. An EEG-Based Person Authentication System with Open-Set Capability Combining Eye Blinking Signals

    PubMed Central

    Wu, Qunjian; Zeng, Ying; Zhang, Chi; Tong, Li; Yan, Bin

    2018-01-01

    The electroencephalogram (EEG) signal represents a subject’s specific brain activity patterns and is considered as an ideal biometric given its superior forgery prevention. However, the accuracy and stability of the current EEG-based person authentication systems are still unsatisfactory in practical application. In this paper, a multi-task EEG-based person authentication system combining eye blinking is proposed, which can achieve high precision and robustness. Firstly, we design a novel EEG-based biometric evoked paradigm using self- or non-self-face rapid serial visual presentation (RSVP). The designed paradigm could obtain a distinct and stable biometric trait from EEG with a lower time cost. Secondly, the event-related potential (ERP) features and morphological features are extracted from EEG signals and eye blinking signals, respectively. Thirdly, convolutional neural network and back propagation neural network are severally designed to gain the score estimation of EEG features and eye blinking features. Finally, a score fusion technology based on least square method is proposed to get the final estimation score. The performance of multi-task authentication system is improved significantly compared to the system using EEG only, with an increasing average accuracy from 92.4% to 97.6%. Moreover, open-set authentication tests for additional imposters and permanence tests for users are conducted to simulate the practical scenarios, which have never been employed in previous EEG-based person authentication systems. A mean false accepted rate (FAR) of 3.90% and a mean false rejected rate (FRR) of 3.87% are accomplished in open-set authentication tests and permanence tests, respectively, which illustrate the open-set authentication and permanence capability of our systems. PMID:29364848

  11. An EEG-Based Person Authentication System with Open-Set Capability Combining Eye Blinking Signals.

    PubMed

    Wu, Qunjian; Zeng, Ying; Zhang, Chi; Tong, Li; Yan, Bin

    2018-01-24

    The electroencephalogram (EEG) signal represents a subject's specific brain activity patterns and is considered as an ideal biometric given its superior forgery prevention. However, the accuracy and stability of the current EEG-based person authentication systems are still unsatisfactory in practical application. In this paper, a multi-task EEG-based person authentication system combining eye blinking is proposed, which can achieve high precision and robustness. Firstly, we design a novel EEG-based biometric evoked paradigm using self- or non-self-face rapid serial visual presentation (RSVP). The designed paradigm could obtain a distinct and stable biometric trait from EEG with a lower time cost. Secondly, the event-related potential (ERP) features and morphological features are extracted from EEG signals and eye blinking signals, respectively. Thirdly, convolutional neural network and back propagation neural network are severally designed to gain the score estimation of EEG features and eye blinking features. Finally, a score fusion technology based on least square method is proposed to get the final estimation score. The performance of multi-task authentication system is improved significantly compared to the system using EEG only, with an increasing average accuracy from 92.4% to 97.6%. Moreover, open-set authentication tests for additional imposters and permanence tests for users are conducted to simulate the practical scenarios, which have never been employed in previous EEG-based person authentication systems. A mean false accepted rate (FAR) of 3.90% and a mean false rejected rate (FRR) of 3.87% are accomplished in open-set authentication tests and permanence tests, respectively, which illustrate the open-set authentication and permanence capability of our systems.

  12. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP

    PubMed Central

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-01-01

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN. PMID:29149040

  13. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  14. Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid

    PubMed Central

    Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz

    2017-01-01

    Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead. PMID:28736582

  15. Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid.

    PubMed

    Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz

    2016-01-01

    Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead.

  16. The authentic worker's well-being and performance: the relationship between authenticity at work, well-being, and work outcomes.

    PubMed

    van den Bosch, Ralph; Taris, Toon W

    2014-01-01

    Previous research on authenticity has mainly focused on trait conceptualizations of authenticity (e.g., Wood et al., 2008), whereas in specific environments (e.g., at work) state conceptualizations of authenticity (cf. Van den Bosch & Taris, 2013) are at least as relevant. For example, working conditions are subject to change, and this could well have consequences for employees' perceived level of authenticity at work. The current study employs a work-specific, state-like conceptualization of authenticity to investigate the relations between authenticity at work, well-being, and work outcomes. A series of ten separate hierarchical regression analyses using data from 685 participants indicated that after controlling for selected work characteristics and demographic variables, authenticity at work accounted for on average 11% of the variance of various wellbeing and work outcomes. Of the three subscales of authenticity at work (i.e., authentic living, self-alienation, and accepting influence), self-alienation was the strongest predictor of outcomes, followed by authentic living and accepting external influence, respectively. These findings are discussed in the light of their practical and theoretical implications.

  17. 22 CFR 92.38 - Forms of certificate of authentication.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Forms of certificate of authentication. 92.38... SERVICES Specific Notarial Acts § 92.38 Forms of certificate of authentication. The form of a certificate of authentication depends on the statutory requirements of the jurisdiction where the authenticated...

  18. Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup

    NASA Astrophysics Data System (ADS)

    Kuo, Cynthia; Walker, Jesse; Perrig, Adrian

    Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Setup support multiple setup mechanisms, which increases security risks and hurts the user experience. To improve the security and usability of these specifications, we suggest defining a common baseline for hardware features and a consistent, interoperable user experience across devices.

  19. Use of species-specific PCR for the identification of 10 sea cucumber species

    NASA Astrophysics Data System (ADS)

    Wen, Jing; Zeng, Ling

    2014-11-01

    We developed a species-specific PCR method to identify species among dehydrated products of 10 sea cucumber species. Ten reverse species-specific primers designed from the 16S rRNA gene, in combination with one forward universal primer, generated PCR fragments of ca. 270 bp length for each species. The specificity of the PCR assay was tested with DNA of samples of 21 sea cucumber species. Amplification was observed in specific species only. The species-specific PCR method we developed was successfully applied to authenticate species of commercial products of dehydrated sea cucumber, and was proven to be a useful, rapid, and low-cost technique to identify the origin of the sea cucumber product.

  20. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission. ...

  1. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks

    PubMed Central

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs. PMID:22438729

  2. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks.

    PubMed

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  3. Greek PDO saffron authentication studies using species specific molecular markers.

    PubMed

    Bosmali, I; Ordoudi, S A; Tsimidou, M Z; Madesis, P

    2017-10-01

    Saffron, the spice produced from the red stigmas of the flower of Crocus sativus L. is a frequent target of fraud and mislabeling practices that cannot be fully traced using the ISO 3632 trade standard specifications and test methods. A molecular approach is proposed herein as a promising branding strategy for the authentication of highly esteemed saffron brands such as the Greek Protected Designation of Origin (PDO) "Krokos Kozanis". Specific ISSR (inter-simple sequence repeat) markers were used to assess for the first time, the within species variability of several populations of C. sativus L. from the cultivation area of "Krokos Kozanis" as well as the potential differences with the band pattern produced by other Crocus species. Then, species-specific markers were developed taking advantage of an advanced molecular technique such as the HRM analysis coupled with universal DNA barcoding regions (trnL) (Bar-HRM) and applied to saffron admixtures with some of the most common plant adulterants (Calendula officinalis, Carthamus tinctorius, Gardenia jasminoides, Zea mays and Curcuma longa). The sensitivity of the procedure was tested for turmeric as a case study whereas HPLC-fluorescence determination of secondary metabolites was also employed for comparison. The overall results indicated that the Bar-HRM approach is quite effective in terms of specificity and sensitivity. Its effectiveness regarding the detection of turmeric was comparable to that of a conventional HPLC method (0.5% vs 1.0%, w/w). Yet, the proposed DNA-based method is much faster, cost-effective and can be used even by non-geneticists, in any laboratory having access to an HRM-capable real-time PCR instrumentation. It can be, thus, regarded as a strong analytical tool in saffron authentication studies. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. [Molecular authentication of Jinyinhua formula granule by using allele-specific PCR].

    PubMed

    Jiang, Chao; Tu, Li-Chan; Yuan, Yuan; Huang, Lu-Qi; Gao, Wei; Jin, Yan

    2017-07-01

    Traditional authentication method is hard to identify herb's authenticity of traditional Chinese medicine(TCM) formula granules because they have lost all their morphological characteristics. In this study, a new allele-specific PCR method was established for identifying the authentication of Jinyinhua formula granule (made from Lonicerae Japonicae Flos) based on an SNP site in trnL-trnF fragment. Genomic DNA was successfully extracted from Lonicerae Japonicae Flos and its formula granules by using an improved spin column method and then PCR was performed with the designed primer. Approximately 110 bp specific bands was obtained only in the authentic Lonicerae Japonicae Flos and its formula granules, while no bands were found in fake mixed products. In addition, the PCR product sequence was proved from Lonicerae Japonicae Flos trnL-trnF sequence by using BLAST method. Therefore, DNA molecular authentication method could make up the limitations of character identification method and microscopic identification, and quickly identify herb's authenticity of TCM formula granules, with enormous potential for market supervision and quality control. Copyright© by the Chinese Pharmaceutical Association.

  5. Emerging importance of geographical indications and designations of origin - authenticating geo-authentic botanicals and implications for phytotherapy.

    PubMed

    Brinckmann, J A

    2013-11-01

    Pharmacopoeial monographs providing specifications for composition, identity, purity, quality, and strength of a botanical are developed based on analysis of presumably authenticated botanical reference materials. The specimens should represent the quality traditionally specified for the intended use, which may require different standards for medicinal versus food use. Development of quality standards monographs may occur through collaboration between a sponsor company or industry association and a pharmacopoeial expert committee. The sponsor may base proposed standards and methods on their own preferred botanical supply which may, or may not, be geo-authentic and/or correspond to qualities defined in traditional medicine formularies and pharmacopoeias. Geo-authentic botanicals are those with specific germplasm, cultivated or collected in their traditional production regions, of a specified biological age at maturity, with specific production techniques and processing methods. Consequences of developing new monographs that specify characteristics of an 'introduced' cultivated species or of a material obtained from one unique origin could lead to exclusion of geo-authentic herbs and may have therapeutic implications for clinical practice. In this review, specifications of selected medicinal plants with either a geo-authentic or geographical indication designation are discussed and compared against official pharmacopoeial standards for same genus and species regardless of origin. Copyright © 2012 John Wiley & Sons, Ltd.

  6. Secure password-based authenticated key exchange for web services

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options inmore » the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.« less

  7. Commonalities and Specificities of Authentic Leadership in Ghana and New Zealand

    ERIC Educational Resources Information Center

    Owusu-Bempah, Justice; Addison, Ramzi; Fairweather, John

    2014-01-01

    The authentic leadership literature suggests that there are three critical elements that precede the bestowal of authentic leadership: first, the espoused values and actions of authentic leaders must be congruent; second, the expectation of the leaders and the followers must be congruent; and, third, the leaders must behave with high moral…

  8. Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks.

    PubMed

    Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming

    2015-11-30

    Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost.

  9. A study on user authentication methodology using numeric password and fingerprint biometric information.

    PubMed

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  10. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    PubMed Central

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601

  11. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    PubMed

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  12. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    PubMed Central

    Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism. PMID:28934152

  13. Improving Critical Thinking "via" Authenticity: The CASPiE Research Experience in a Military Academy Chemistry Course

    ERIC Educational Resources Information Center

    Chase, A. M.; Clancy, H. A.; Lachance, R. P.; Mathison, B. M.; Chiu, M. M.; Weaver, G. C.

    2017-01-01

    Course-based undergraduate research experiences (CUREs) can introduce many students to authentic research activities in a cost-effective manner. Past studies have shown that students who participated in CUREs report greater interest in chemistry, better data collection and analysis skills, and enhanced scientific reasoning compared to traditional…

  14. Authentication techniques for smart cards

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thoroughmore » understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.« less

  15. Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks

    PubMed Central

    Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming

    2015-01-01

    Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost. PMID:26633396

  16. Access control for electronic patient records.

    PubMed

    Glagola, M J

    1998-01-01

    The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.

  17. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks

    PubMed Central

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-01-01

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication. PMID:28632171

  18. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.

    PubMed

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-06-20

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.

  19. Examining the Effectiveness of Student Authentication and Authenticity in Online Learning at Community Colleges

    ERIC Educational Resources Information Center

    Hoshiar, Mitra; Dunlap, Jody; Li, Jinyi; Friedel, Janice Nahra

    2014-01-01

    Online learning is rapidly becoming one of the most prevalent delivery methods of learning in institutions of higher education. It provides college students, especially adult students, an alternative, convenient, and cost-efficient method to earn their credentials, upgrade their skills and knowledge, and keep or upgrade their employment. But at…

  20. The counterfeit self: the deceptive costs of faking it.

    PubMed

    Gino, Francesca; Norton, Michael I; Ariely, Dan

    2010-05-01

    Although people buy counterfeit products to signal positive traits, we show that wearing counterfeit products makes individuals feel less authentic and increases their likelihood of both behaving dishonestly and judging others as unethical. In four experiments, participants wore purportedly fake or authentically branded sunglasses. Those wearing fake sunglasses cheated more across multiple tasks than did participants wearing authentic sunglasses, both when they believed they had a preference for counterfeits (Experiment 1a) and when they were randomly assigned to wear them (Experiment 1b). Experiment 2 shows that the effects of wearing counterfeit sunglasses extend beyond the self, influencing judgments of other people's unethical behavior. Experiment 3 demonstrates that the feelings of inauthenticity that wearing fake products engenders-what we term the counterfeit self-mediate the impact of counterfeits on unethical behavior. Finally, we show that people do not predict the impact of counterfeits on ethicality; thus, the costs of counterfeits are deceptive.

  1. A lab-on-a-chip-based multiplex platform to detect potential fraud of introducing pig, dog, cat, rat and monkey meat into the food chain.

    PubMed

    Razzak, Md Abdur; Hamid, Sharifah Bee Abd; Ali, Md Eaqub

    2015-01-01

    Food forgery has posed considerable risk to public health, religious rituals, personal budget and wildlife. Pig, dog, cat, rat and monkey meat are restricted in most religions, but their sporadic adulteration are rampant. Market controllers need a low-cost but reliable technique to track and trace suspected species in the food chain. Considering the need, here we documented a lab-on-a-chip-based multiplex polymerase chain reaction (PCR) assay for the authentication of five non-halal meat species in foods. Using species-specific primers, 172, 163, 141, 129 and 108-bp sites of mitochondrial ND5, ATPase 6 and cytochrome b genes were amplified to detect cat, dog, pig, monkey and rat species under complex matrices. Species-specificity was authenticated against 20 different species with the potential to be used in food. The targets were stable under extreme sterilisation (121°C at 45 psi for 2.5 h) which severely degrades DNA. The assay was optimised under the backgrounds of various commercial meat products and validated for the analysis of meatballs, burgers and frankfurters, which are popular fast food items across the globe. The assay was tested to detect 0.1% suspected meats under commercial backgrounds of marketed foods. Instead of simplex PCR which detects only one species at a time, such a multiplex platform can reduce cost by at least fivefolds by detecting five different species in a single assay platform.

  2. Preservation Environments

    NASA Technical Reports Server (NTRS)

    Moore, Reagan W.

    2004-01-01

    The long-term preservation of digital entities requires mechanisms to manage the authenticity of massive data collections that are written to archival storage systems. Preservation environments impose authenticity constraints and manage the evolution of the storage system technology by building infrastructure independent solutions. This seeming paradox, the need for large archives, while avoiding dependence upon vendor specific solutions, is resolved through use of data grid technology. Data grids provide the storage repository abstractions that make it possible to migrate collections between vendor specific products, while ensuring the authenticity of the archived data. Data grids provide the software infrastructure that interfaces vendor-specific storage archives to preservation environments.

  3. Using Generic and Context-Specific Scaffolding to Support Authentic Science Inquiry

    ERIC Educational Resources Information Center

    Belland, Brian R.; Gu, Jiangyue; Armbrust, Sara; Cook, Brant

    2013-01-01

    In this conceptual paper, we propose an heuristic to balance context-specific and generic scaffolding, as well as computer-based and teacher scaffolding, during instruction centered on authentic, scientific problems. This paper is novel in that many researchers ask a dichotomous question of whether generic or context-specific scaffolding is best,…

  4. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication of foreign extradition papers. 92.40 Section 92.40 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign...

  5. Efficient authentication scheme based on near-ring root extraction problem

    NASA Astrophysics Data System (ADS)

    Muthukumaran, V.; Ezhilmaran, D.

    2017-11-01

    An authentication protocolis the type of computer communication protocol or cryptography protocol specifically designed for transfer of authentication data between two entities. We have planned a two new entity authentication scheme on the basis of root extraction problem near-ring in this article. We suggest that this problem is suitably difficult to serve as a cryptographic assumption over the platform of near-ring N. The security issues also discussed.

  6. A rapid low-cost high-density DNA-based multi-detection test for routine inspection of meat species.

    PubMed

    Lin, Chun Chi; Fung, Lai Ling; Chan, Po Kwok; Lee, Cheuk Man; Chow, Kwok Fai; Cheng, Shuk Han

    2014-02-01

    The increasing occurrence of food frauds suggests that species identification should be part of food authentication. Current molecular-based species identification methods have their own limitations or drawbacks, such as relatively time-consuming experimental steps, expensive equipment and, in particular, these methods cannot identify mixed species in a single experiment. This project proposes an improved method involving PCR amplification of the COI gene and detection of species-specific sequences by hybridisation. Major innovative breakthrough lies in the detection of multiple species, including pork, beef, lamb, horse, cat, dog and mouse, from a mixed sample within a single experiment. The probes used are species-specific either in sole or mixed species samples. As little as 5 pg of DNA template in the PCR is detectable in the proposed method. By designing species-specific probes and adopting reverse dot blot hybridisation and flow-through hybridisation, a low-cost high-density DNA-based multi-detection test suitable for routine inspection of meat species was developed. © 2013.

  7. An Authentication Protocol for Future Sensor Networks.

    PubMed

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.

  8. An Authentication Protocol for Future Sensor Networks

    PubMed Central

    Bilal, Muhammad; Kang, Shin-Gak

    2017-01-01

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols. PMID:28452937

  9. 22 CFR 92.43 - Fees for notarial services and authentications.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Fees for notarial services and authentications. 92.43 Section 92.43 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.43 Fees for notarial services and authentications. The fees...

  10. Application of gas chromatography/flame ionization detector-based metabolite fingerprinting for authentication of Asian palm civet coffee (Kopi Luwak).

    PubMed

    Jumhawan, Udi; Putri, Sastia Prama; Yusianto; Bamba, Takeshi; Fukusaki, Eiichiro

    2015-11-01

    Development of authenticity screening for Asian palm civet coffee, the world-renowned priciest coffee, was previously reported using metabolite profiling through gas chromatography/mass spectrometry (GC/MS). However, a major drawback of this approach is the high cost of the instrument and maintenance. Therefore, an alternative method is needed for quality and authenticity evaluation of civet coffee. A rapid, reliable and cost-effective analysis employing a universal detector, GC coupled with flame ionization detector (FID), and metabolite fingerprinting has been established for discrimination analysis of 37 commercial and non-commercial coffee beans extracts. gas chromatography/flame ionization detector (GC/FID) provided higher sensitivity over a similar range of detected compounds than GC/MS. In combination with multivariate analysis, GC/FID could successfully reproduce quality prediction from GC/MS for differentiation of commercial civet coffee, regular coffee and coffee blend with 50 wt % civet coffee content without prior metabolite details. Our study demonstrated that GC/FID-based metabolite fingerprinting can be effectively actualized as an alternative method for coffee authenticity screening in industries. Copyright © 2015. Published by Elsevier B.V.

  11. Differentiation Between Organic and Non-Organic Apples Using Diffraction Grating and Image Processing-A Cost-Effective Approach.

    PubMed

    Jiang, Nanfeng; Song, Weiran; Wang, Hui; Guo, Gongde; Liu, Yuanyuan

    2018-05-23

    As the expectation for higher quality of life increases, consumers have higher demands for quality food. Food authentication is the technical means of ensuring food is what it says it is. A popular approach to food authentication is based on spectroscopy, which has been widely used for identifying and quantifying the chemical components of an object. This approach is non-destructive and effective but expensive. This paper presents a computer vision-based sensor system for food authentication, i.e., differentiating organic from non-organic apples. This sensor system consists of low-cost hardware and pattern recognition software. We use a flashlight to illuminate apples and capture their images through a diffraction grating. These diffraction images are then converted into a data matrix for classification by pattern recognition algorithms, including k -nearest neighbors ( k -NN), support vector machine (SVM) and three partial least squares discriminant analysis (PLS-DA)- based methods. We carry out experiments on a reasonable collection of apple samples and employ a proper pre-processing, resulting in a highest classification accuracy of 94%. Our studies conclude that this sensor system has the potential to provide a viable solution to empower consumers in food authentication.

  12. Three-dimensional image authentication scheme using sparse phase information in double random phase encoded integral imaging.

    PubMed

    Yi, Faliu; Jeoung, Yousun; Moon, Inkyu

    2017-05-20

    In recent years, many studies have focused on authentication of two-dimensional (2D) images using double random phase encryption techniques. However, there has been little research on three-dimensional (3D) imaging systems, such as integral imaging, for 3D image authentication. We propose a 3D image authentication scheme based on a double random phase integral imaging method. All of the 2D elemental images captured through integral imaging are encrypted with a double random phase encoding algorithm and only partial phase information is reserved. All the amplitude and other miscellaneous phase information in the encrypted elemental images is discarded. Nevertheless, we demonstrate that 3D images from integral imaging can be authenticated at different depths using a nonlinear correlation method. The proposed 3D image authentication algorithm can provide enhanced information security because the decrypted 2D elemental images from the sparse phase cannot be easily observed by the naked eye. Additionally, using sparse phase images without any amplitude information can greatly reduce data storage costs and aid in image compression and data transmission.

  13. A Survey of Authentication Schemes in Telecare Medicine Information Systems.

    PubMed

    Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber

    2017-01-01

    E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.

  14. Critical Reflection on Authentic Leadership and School Leader Development from a Virtue Ethical Perspective

    ERIC Educational Resources Information Center

    Wilson, Michael

    2014-01-01

    Authentic leadership has attracted recent empirical research from a wide range of social science disciplines interested largely in its relationship to human resource management and organisational effectiveness. In contrast, the focus of this study is specifically on the philosophical foundations of authentic leadership and their implications for…

  15. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    PubMed

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  16. An improved anonymous authentication scheme for roaming in ubiquitous networks

    PubMed Central

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575

  17. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    PubMed

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  18. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    PubMed Central

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874

  19. The Role of Authenticity in Design-Based Learning Environments: The Case of Engineering Education

    ERIC Educational Resources Information Center

    Strobel, J.; Wang, J.; Weber, N. R.; Dyehouse, M.

    2013-01-01

    The term "authenticity" is pervasive in the education literature in general and specifically in the design education and engineering education literature; yet, the construct is often used un-reflected and ill defined. The purpose of this paper is (1) to critically examine current conceptualizations of authenticity as principles to design learning…

  20. Secure anonymous mutual authentication for star two-tier wireless body area networks.

    PubMed

    Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga

    2016-10-01

    Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is also low. Our proposed protocol is a lightweight anonymous mutually authentication protocol to mutually authenticate the sensor nodes with the controller node (hub) in a star two-tier WBAN topology. Results show that our protocol proves efficiency over previously proposed protocols and at the same time, achieves the necessary security requirements for a secure anonymous mutual authentication scheme. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  1. Profiling a multiplex short tandem repeat loci from human urine with use of low cost on-site technology for verification of sample authenticity.

    PubMed

    Pires, Nuno M M; Tao Dong; Berntzen, Lasse; Lonningdal, Torill

    2017-07-01

    This work focuses on the development of a sophisticated technique via STR typing to unequivocally verify the authenticity of urine samples before sent to laboratories. STR profiling was conducted with the CSF1PO, TPOX, TH01 Multiplex System coupled with a smartphone-based detection method. The promising capability of the method to identify distinct STR profiles from urine of different persons opens the possibility to conduct sample authenticity tests. On-site STR profiling could be realized with a self-contained autonomous device with an integrated PCR microchip shown hereby.

  2. Authentication and Key Establishment in Dynamic Wireless Sensor Networks

    PubMed Central

    Qiu, Ying; Zhou, Jianying; Baek, Joonsang; Lopez, Javier

    2010-01-01

    When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing. In order to provide a high level of security in this environment, the moving sensor node needs to be authenticated to new neighboring nodes and a key established for secure communication. The paper proposes an efficient and scalable protocol to establish and update the authentication key in a dynamic wireless sensor network environment. The protocol guarantees that two sensor nodes share at least one key with probability 1 (100%) with less memory and energy cost, while not causing considerable communication overhead. PMID:22319321

  3. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

    PubMed

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen

    2016-01-01

    Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.

  4. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme.

    PubMed

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.

  5. Authentication of medicinal herbs using PCR-amplified ITS2 with specific primers.

    PubMed

    Chiou, Shu-Jiau; Yen, Jui-Hung; Fang, Cheng-Li; Chen, Hui-Ling; Lin, Tsai-Yun

    2007-10-01

    Different parts of medicinal herbs have long been used as traditional Chinese drugs for treating many diseases, whereas materials of similar morphology and chemical fingerprints are often misidentified. Analyses of sequence variations in the nuclear ribosomal DNA (rDNA) internal transcribed spacer (ITS) have become a valid method for authentication of medicinal herbs at the intergenic and interspecific levels. DNA extracted from processed materials is usually severely degraded or contaminated by microorganisms, thus generates no or unexpected PCR products. The goal of this study is to apply the ITS fragments selectively amplified with two designed primer sets for efficient and precise authentication of medicinal herbs. The designed primers led to an accurate PCR product of the specific region in ITS2, which was confirmed with DNA extracted from 55 processed medicinal herbs belonging to 48 families. Moreover, the selectively amplified ITS2 authenticated five sets of easily confusable Chinese herbal materials. The designed primers were proven to be suitable for a broad application in the authentication of herbal materials.

  6. An economic analysis of private incentives to adopt DNA barcoding technology for fish species authentication in Canada.

    PubMed

    Ugochukwu, Albert I; Hobbs, Jill E; Phillips, Peter W B; Gray, Richard

    2015-12-01

    The increasing spate of species substitution and mislabelling in fish markets has become a concern to the public and a challenge to both the food industry and regulators. Species substitution and mislabelling within fish supply chains occurs because of price incentives to misrepresent products for economic gain. Emerging authenticity technologies, such as the DNA barcoding technology that has been used to identify plants and animal (particularly fish) species through DNA sequencing, offer a potential technological solution to this information problem. However, the adoption of these authenticity technologies depends also on economic factors. The present study uses economic welfare analysis to examine the effects of species substitution and mislabelling in fish markets, and examines the feasibility of the technology for a typical retail store in Canada. It is assumed that increased accuracy of the technology in detecting fraud and enforcement of legal penalties and other associated costs would be likely to discourage cheating. Empirical results suggest that DNA barcoding technology would be feasible presently for a typical retail store only if authentication is done in a third party laboratory, as it may not be feasible on an individual retail store level once fixed and other associated costs of the technology are considered.

  7. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  8. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  9. Development and optimization of an efficient qPCR system for olive authentication in edible oils.

    PubMed

    Alonso-Rebollo, Alba; Ramos-Gómez, Sonia; Busto, María D; Ortega, Natividad

    2017-10-01

    The applicability of qPCR in olive-oil authentication depends on the DNA obtained from the oils and the amplification primers. Therefore, four olive-specific amplification systems based on the trnL gene were designed (A-, B-, C- and D-trnL systems). The qPCR conditions, primer concentration and annealing temperature, were optimized. The systems were tested for efficiency and sensitivity to select the most suitable for olive oil authentication. The selected system (D-trnL) demonstrated specificity toward olive in contrast to other oleaginous species (canola, soybean, sunflower, maize, peanut and coconut) and showed high sensitivity in a broad linear dynamic range (LOD and LOQ: 500ng - 0.0625pg). This qPCR system enabled detection, with high sensitivity and specificity, of olive DNA isolated from oils processed in different ways, establishing it as an efficient method for the authentication of olive oil regardless of its category. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. On the Design of a Comprehensive Authorisation Framework for Service Oriented Architecture (SOA)

    DTIC Science & Technology

    2013-07-01

    Authentication Server AZM Authorisation Manager AZS Authorisation Server BP Business Process BPAA Business Process Authorisation Architecture BPAD Business...Internet Protocol Security JAAS Java Authentication and Authorisation Service MAC Mandatory Access Control RBAC Role Based Access Control RCA Regional...the authentication process, make authorisation decisions using application specific access control functions that results in the practice of

  11. "The only dykey one": constructions of (in)authenticity in a lesbian community of practice.

    PubMed

    Jones, Lucy

    2011-01-01

    This article demonstrates how members of a lesbian community of practice make interactional moves that allow them to position themselves as "authentically lesbian." Through the use of discourse analysis and a sociocultural linguistics focus on indexicality, the speakers are shown to invoke broadly accessible stereotypes and ideologies and to rework them in order to create locally specific, meaningful identities. This is achieved via mutually negotiated stance taking toward group-constructed, oppositional personae. Specifically, the women in this group position styles deemed as "girly" as inauthentic and antithetical to their concept of a lesbian--the authentic "dyke."

  12. Reciprocal Relations between Work-Related Authenticity and Intrinsic Motivation, Work Ability and Depressivity: A Two-Wave Study.

    PubMed

    Emmerich, Astrid I; Rigotti, Thomas

    2017-01-01

    This study investigates the role of context-specific authenticity at work for work-related outcomes (intrinsic motivation, work ability) and depressivity. Furthermore reciprocal relations between work-related authenticity and healthy psychological functioning are investigated. Longitudinal data from 1,243 employees from 63 subsidiaries of a non-profit organization in the social sector were analyzed using multilevel structural equation modeling. Work-related authenticity at T1 predicted work ability and depressivity, but not intrinsic motivation at T2, about 6 months later. Work-related authenticity at T2 was predicted by intrinsic motivation and depressivity, but not by work ability at T1. We conclude that work-related authenticity and healthy psychological functioning are positively reinforcing each other. Thus, enabling employees to be authentic supposedly increases their well-being and is a pivotal opportunity for organizations to foster health and performance-related indicators like work ability and prevent negative health indicators like depressivity. At the same time, authenticity of employees can be fostered through workplace health promotion.

  13. Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures

    NASA Astrophysics Data System (ADS)

    Papamanthou, Charalampos; Tamassia, Roberto

    Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in database outsourcing, a client's database is stored and maintained by an untrusted server. Also, in simple storage systems, clients can store very large amounts of data but at the same time, they want to assure their integrity when they retrieve them. In this paper, we present a model and protocol for two-party authentication of data structures. Namely, a client outsources its data structure and verifies that the answers to the queries have not been tampered with. We provide efficient algorithms to securely outsource a skip list with logarithmic time overhead at the server and client and logarithmic communication cost, thus providing an efficient authentication primitive for outsourced data, both structured (e.g., relational databases) and semi-structured (e.g., XML documents). In our technique, the client stores only a constant amount of space, which is optimal. Our two-party authentication framework can be deployed on top of existing storage applications, thus providing an efficient authentication service. Finally, we present experimental results that demonstrate the practical efficiency and scalability of our scheme.

  14. An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.

    PubMed

    Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho

    2016-10-07

    More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.'s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes.

  15. An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks

    PubMed Central

    Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho

    2016-01-01

    More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.’s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes. PMID:27739417

  16. The research and implementation of a unified identity authentication in e-government network

    NASA Astrophysics Data System (ADS)

    Feng, Zhou

    Current problem existing in e-government network is that the applications of information system are developed independently by various departments, and each has its own specific set of authentication and access control mechanism. To build a comprehensive information system in favor of sharing and exchanging information, a sound and secure unified e-government authentication system is firstly needed. The paper, combining with practical development of e-government network, carries out a thorough discussion on how to achieve data synchronization between unified authentication system and related application systems.

  17. Addressing the Tension Between Strong Perimeter Control an Usability

    NASA Technical Reports Server (NTRS)

    Hinke, Thomas H.; Kolano, Paul Z.; Keller, Chris

    2006-01-01

    This paper describes a strong perimeter control system for a general purpose processing system, with the perimeter control system taking significant steps to address usability issues, thus mitigating the tension between strong perimeter protection and usability. A secure front end enforces two-factor authentication for all interactive access to an enclave that contains a large supercomputer and various associated systems, with each requiring their own authentication. Usability is addressed through a design in which the user has to perform two-factor authentication at the secure front end in order to gain access to the enclave, while an agent transparently performs public key authentication as needed to authenticate to specific systems within the enclave. The paper then describes a proxy system that allows users to transfer files into the enclave under script control, when the user is not present to perform two-factor authentication. This uses a pre-authorization approach based on public key technology, which is still strongly tied to both two-factor authentication and strict control over where files can be transferred on the target system. Finally the paper describes an approach to support network applications and systems such as grids or parallel file transfer protocols that require the use of many ports through the perimeter. The paper describes a least privilege approach that dynamically opens ports on a host-specific, if-authorized, as-needed, just-in-time basis.

  18. Temporal Stability and Authenticity of Self-Representations in Adulthood

    PubMed Central

    Diehl, Manfred; Jacobs, Laurie M.; Hastings, Catherine T.

    2008-01-01

    The temporal stability of role-specific self-representations was examined in a sample of 188 young, middle-aged, and older adults. Considerable stability was observed for all self-representations. Central self-descriptors showed significantly greater temporal stability than peripheral self-descriptors. Temporal stability of self-representations was positively associated with self-concept clarity, self-esteem, and positive affect (PA). Age differences were obtained for three of the five self-representations, with older adults showing significantly lower stabilities for self with family, self with friend, and self with significant other compared to young and middle-aged adults. Assessment of the authenticity of adults’ role-specific self-representations showed that greater authenticity tended to be associated with greater temporal stability. Authenticity and the number of positive daily events were significant positive predictors of the stability of self-representations. PMID:18820732

  19. [Application of rapid PCR to authenticate medicinal snakes].

    PubMed

    Chen, Kang; Jiang, Chao; Yuan, Yuan; Huang, Lu-Qi; Li, Man

    2014-10-01

    To obtained an accurate, rapid and efficient method for authenticate medicinal snakes listed in Chinese Pharmacopoeia (Zaocysd humnades, Bungarus multicinctus, Agkistrodon acutus), a rapid PCR method for authenticate snakes and its adulterants was established based on the classic molecular authentication methods. DNA was extracted by alkaline lysis and the specific primers were amplified by two-steps PCR amplification method. The denatured and annealing temperature and cycle numbers were optimized. When 100 x SYBR Green I was added in the PCR product, strong green fluorescence was visualized under 365 nm UV whereas adulterants without. The whole process can complete in 30-45 minutes. The established method provides the technical support for authentication of the snakes on field.

  20. An Updated Review of Meat Authenticity Methods and Applications.

    PubMed

    Vlachos, Antonios; Arvanitoyannis, Ioannis S; Tserkezou, Persefoni

    2016-05-18

    Adulteration of foods is a serious economic problem concerning most foodstuffs, and in particular meat products. Since high-priced meat demand premium prices, producers of meat-based products might be tempted to blend these products with lower cost meat. Moreover, the labeled meat contents may not be met. Both types of adulteration are difficult to detect and lead to deterioration of product quality. For the consumer, it is of outmost importance to guarantee both authenticity and compliance with product labeling. The purpose of this article is to review the state of the art of meat authenticity with analytical and immunochemical methods with the focus on the issue of geographic origin and sensory characteristics. This review is also intended to provide an overview of the various currently applied statistical analyses (multivariate analysis (MAV), such as principal component analysis, discriminant analysis, cluster analysis, etc.) and their effectiveness for meat authenticity.

  1. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.

    PubMed

    Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun

    2017-12-08

    Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie-Hellman problem.

  2. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks

    PubMed Central

    Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun

    2017-01-01

    Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem. PMID:29292792

  3. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    NASA Astrophysics Data System (ADS)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  4. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  5. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme

    PubMed Central

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.’s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks. PMID:26866606

  6. Geospatial Authentication

    NASA Technical Reports Server (NTRS)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server.

  7. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    PubMed

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  8. Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment.

    PubMed

    Chiou, Shin-Yan; Ying, Zhaoqin; Liu, Junqiang

    2016-04-01

    Medical systems allow patients to receive care at different hospitals. However, this entails considerable inconvenience through the need to transport patients and their medical records between hospitals. The development of Telecare Medicine Information Systems (TMIS) makes it easier for patients to seek medical treatment and to store and access medical records. However, medical data stored in TMIS is not encrypted, leaving patients' private data vulnerable to external leaks. In 2014, scholars proposed a new cloud-based medical information model and authentication scheme which would not only allow patients to remotely access medical services but also protects patient privacy. However, this scheme still fails to provide patient anonymity and message authentication. Furthermore, this scheme only stores patient medical data, without allowing patients to directly access medical advice. Therefore, we propose a new authentication scheme, which provides anonymity, unlinkability, and message authentication, and allows patients to directly and remotely consult with doctors. In addition, our proposed scheme is more efficient in terms of computation cost. The proposed system was implemented in Android system to demonstrate its workability.

  9. RUASN: a robust user authentication framework for wireless sensor networks.

    PubMed

    Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae

    2011-01-01

    In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.

  10. Development of EST Intron-Targeting SNP Markers for Panax ginseng and Their Application to Cultivar Authentication.

    PubMed

    Wang, Hongtao; Li, Guisheng; Kwon, Woo-Saeng; Yang, Deok-Chun

    2016-06-04

    Panax ginseng is one of the most valuable medicinal plants in the Orient. The low level of genetic variation has limited the application of molecular markers for cultivar authentication and marker-assisted selection in cultivated ginseng. To exploit DNA polymorphism within ginseng cultivars, ginseng expressed sequence tags (ESTs) were searched against the potential intron polymorphism (PIP) database to predict the positions of introns. Intron-flanking primers were then designed in conserved exon regions and used to amplify across the more variable introns. Sequencing results showed that single nucleotide polymorphisms (SNPs), as well as indels, were detected in four EST-derived introns, and SNP markers specific to "Gopoong" and "K-1" were first reported in this study. Based on cultivar-specific SNP sites, allele-specific polymerase chain reaction (PCR) was conducted and proved to be effective for the authentication of ginseng cultivars. Additionally, the combination of a simple NaOH-Tris DNA isolation method and real-time allele-specific PCR assay enabled the high throughput selection of cultivars from ginseng fields. The established real-time allele-specific PCR assay should be applied to molecular authentication and marker assisted selection of P. ginseng cultivars, and the EST intron-targeting strategy will provide a potential approach for marker development in species without whole genomic DNA sequence information.

  11. Visible and near infrared spectroscopy as an authentication tool: Preliminary investigation of the prediction of the ageing time of beef steaks.

    PubMed

    Moran, Lara; Andres, Sonia; Allen, Paul; Moloney, Aidan P

    2018-08-01

    Visible-near infrared spectroscopy (Vis-NIRS) has been suggested to have potential for authentication of food products. The aim of the present preliminary study was to assess if this technology can be used to authenticate the ageing time (3, 7, 14 and 21 days post mortem) of beef steaks from three different muscles (M. Longissimus thoracis, M. Gluteus medius and M. Semitendinosus). Various mathematical pre-treatments were applied to the spectra to correct scattering and overlapping effects, and then partial least squares-discrimination analysis (PLS-DA) procedures applied. The best models were specific for each muscle, and the ability of prediction of ageing time was validated using full (leave-one-out) cross-validation, whereas authentication performance was evaluated using the parameters of sensitivity, specificity and overall correct classification. The results indicate that overall correct classification ranging from 94.2 to 100% was achieved, depending on the muscle. In conclusion, Vis-NIRS technology seems a valid tool for the authentication of ageing time of beef steaks. Copyright © 2018 Elsevier Ltd. All rights reserved.

  12. Species detection using HyBeacon(®) probe technology: Working towards rapid onsite testing in non-human forensic and food authentication applications.

    PubMed

    Dawnay, Nick; Hughes, Rebecca; Court, Denise Syndercombe; Duxbury, Nicola

    2016-01-01

    Identifying individual species or determining species' composition in an unknown sample is important for a variety of forensic applications. Food authentication, monitoring illegal trade in endangered species, forensic entomology, sexual assault case work and counter terrorism are just some of the fields that can require the detection of the biological species present. Traditional laboratory based approaches employ a wide variety of tools and technologies and exploit a number of different species specific traits including morphology, molecular differences and immuno-chemical analyses. A large number of these approaches require laboratory based apparatus and results can take a number of days to be returned to investigating authorities. Having a presumptive test for rapid identification could lead to savings in terms of cost and time and allow sample prioritisation if confirmatory testing in a laboratory is required later. This model study describes the development of an assay using a single HyBeacon(®) probe and melt curve analyses allowing rapid screening and authentication of food products labelled as Atlantic cod (Gadus morhua). Exploiting melt curve detection of species specific SNP sites on the COI gene the test allows detection of a target species (Atlantic cod) and closely related species which may be used as substitutes. The assay has been designed for use with the Field Portable ParaDNA system, a molecular detection platform for non-expert users. The entire process from sampling to result takes approximately 75min. Validation studies were performed on both single source genomic DNA, mixed genomic DNA and commercial samples. Data suggests the assay has a lower limit of detection of 31 pg DNA. The specificity of the assay to Atlantic cod was measured by testing highly processed food samples including frozen, defrosted and cooked fish fillets as well as fish fingers, battered fish fillet and fish pie. Ninety-six (92.7%) of all Atlantic cod food products, tested, provided a correct single species result with the remaining samples erroneously identified as containing non-target species. The data shows that the assay was quick to design and characterise and is also capable of yielding results that would be beneficial in a variety of fields, not least the authentication of food. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  13. Reciprocal Relations between Work-Related Authenticity and Intrinsic Motivation, Work Ability and Depressivity: A Two-Wave Study

    PubMed Central

    Emmerich, Astrid I.; Rigotti, Thomas

    2017-01-01

    This study investigates the role of context-specific authenticity at work for work-related outcomes (intrinsic motivation, work ability) and depressivity. Furthermore reciprocal relations between work-related authenticity and healthy psychological functioning are investigated. Longitudinal data from 1,243 employees from 63 subsidiaries of a non-profit organization in the social sector were analyzed using multilevel structural equation modeling. Work-related authenticity at T1 predicted work ability and depressivity, but not intrinsic motivation at T2, about 6 months later. Work-related authenticity at T2 was predicted by intrinsic motivation and depressivity, but not by work ability at T1. We conclude that work-related authenticity and healthy psychological functioning are positively reinforcing each other. Thus, enabling employees to be authentic supposedly increases their well-being and is a pivotal opportunity for organizations to foster health and performance-related indicators like work ability and prevent negative health indicators like depressivity. At the same time, authenticity of employees can be fostered through workplace health promotion. PMID:28316581

  14. Secure E-Business applications based on the European Citizen Card

    NASA Astrophysics Data System (ADS)

    Zipfel, Christian; Daum, Henning; Meister, Gisela

    The introduction of ID cards enhanced with electronic authentication services opens up the possibility to use these for identification and authentication in e-business applications. To avoid incompatible national solutions, the specification of the European Citizen Card aims at defining interoperable services for such use cases. Especially the given device authentication methods can help to eliminate security problems with current e-business and online banking applications.

  15. Android Based Behavioral Biometric Authentication via Multi-Modal Fusion

    DTIC Science & Technology

    2014-06-12

    such as the way he or she uses the mouse, or interacts with the Graphical User Interface (GUI) [9]. Described simply, standard biometrics is determined...as a login screen on a standard computer. Active authentication is authentication that occurs dynamically throughout interaction with the device. A...because they are higher level constructs in themselves. The Android framework was specifically used for capturing the multitouch gestures: pinch and zoom

  16. Authentic leadership and its effect on employees' organizational citizenship behaviours.

    PubMed

    Edú Valsania, Sergio; Moriano León, Juan A; Molero Alonso, Fernando; Topa Cantisano, Gabriela

    2012-11-01

    The studies that have verified the positive association of authentic leadership with organizational citizenship behaviours (OCBs), have used global measures of both constructs. Therefore, the goal of this work is to analyze the effect of authentic leadership on employees' OCBs, specifically focusing on the relations of the four components of authentic leadership with the individual and organizational dimensions of the OCBs. The participants of this study were 220 Spanish employees (30.9% men and 69.1% women) who completed a questionnaire that included the variables of interest in this study: Authentic Leadership, OCB and Sociobiographical control variables. The results, obtained with stepwise multiple regression analysis, show that two components of authentic leadership-moral perspective and relational transparency-present significant relationships with OCB. Moreover, authentic leadership is a better predictor of employees' OCB when these behaviors are impersonal and directed towards the organization than when they are directed towards other people. These results have practical implications for human resources management in organizations, especially in selection processes and when training top executives.

  17. A single nucleotide polymorphism genotyping platform for the authentication of patient derived xenografts.

    PubMed

    El-Hoss, Jad; Jing, Duohui; Evans, Kathryn; Toscan, Cara; Xie, Jinhan; Lee, Hyunjoo; Taylor, Renea A; Lawrence, Mitchell G; Risbridger, Gail P; MacKenzie, Karen L; Sutton, Rosemary; Lock, Richard B

    2016-09-13

    Patient derived xenografts (PDXs) have become a vital, frequently used, component of anti-cancer drug development. PDXs can be serially passaged in vivo for years, and shared across laboratories. As a consequence, the potential for mis-identification and cross-contamination is possible, yet authentication of PDXs appears limited. We present a PDX Authentication System (PAS), by combining a commercially available OpenArray assay of single nucleotide polymorphisms (SNPs) with in-house R studio programs, to validate PDXs established in individual mice from acute lymphoblastic leukemia biopsies. The PAS is sufficiently robust to identify contamination at levels as low as 3%, similar to the gold standard of short tandem repeat (STR) profiling. We have surveyed a panel of PDXs established from 73 individual leukemia patients, and found that the PAS provided sufficient discriminatory power to identify each xenograft. The identified SNP-discrepant PDXs demonstrated distinct gene expression profiles, indicating a risk of contamination for PDXs at high passage number. The PAS also allows for the authentication of tumor cells with complex karyotypes from solid tumors including prostate cancer and Ewing's sarcoma. This study highlights the demands of authenticating PDXs for cancer research, and evaluates a reliable authentication platform that utilizes a commercially available and cost-effective system.

  18. The effects of authentic leadership, organizational identification, and occupational coping self-efficacy on new graduate nurses' job turnover intentions in Canada.

    PubMed

    Fallatah, Fatmah; Laschinger, Heather K S; Read, Emily A

    Nurses' turnover has a costly impact on organizations, patients, and nurses. Numerous studies have highlighted the critical role of nursing leadership in enhancing new nurses' retention. To examine the influence of authentic leadership on new nurses' job turnover intentions through their personal identification with the leader, organizational identification, and occupational coping self-efficacy. Secondary data analysis of a cross-sectional national study of Canadian new graduate nurses was conducted using structural equation modeling. Authentic leadership had a significant positive effect on nurses' personal identification with their leader and their organization. Personal identification mediated the relationship between authentic leadership and organizational identification. Organizational identification had a significant positive effect on occupational coping self-efficacy, which, in turn, had a negative effect on new graduate nurses' job turnover intentions. The findings demonstrate the vital role authentic leadership plays in retaining new graduate nurses. Authentic leaders foster personal and organizational identification among new graduate nurses, leading to increase in the confidence in their ability to manage work-related challenges, which subsequently results in positive outcomes in both new graduate nurses and the organization. Copyright © 2016 Elsevier Inc. All rights reserved.

  19. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept

    NASA Astrophysics Data System (ADS)

    Damousis, Ioannis G.; Tzovaras, Dimitrios; Bekiaris, Evangelos

    2008-12-01

    Human Monitoring and Authentication using Biodynamic Indicators and Behavioural Analysis (HUMABIO) (2007) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state of the art sensorial technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system which utilizes a biodynamic physiological profile, unique for each individual, and advancements of the state-of-the art in behavioural and other biometrics, such as face, speech, gait recognition, and seat-based anthropometrics. Several shortcomings in biometric authentication will be addressed in the course of HUMABIO which will provide the basis for improving existing sensors, develop new algorithms, and design applications, towards creating new, unobtrusive biometric authentication procedures in security sensitive, controlled environments. This paper presents the concept of this project, describes its unobtrusive authentication demonstrator, and reports some preliminary results.

  20. Geospatial Authentication

    NASA Technical Reports Server (NTRS)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time has been developed. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server. The Geospatial Authentication software has two parts Server and Client. The server software is a virtual private network (VPN) developed in Linux operating system using Perl programming language. The server can be a stand-alone VPN server or can be combined with other applications and services. The client software is a GUI Windows CE software, or Mobile Graphical Software, that allows users to authenticate into a network. The purpose of the client software is to pass the needed satellite information to the server for authentication.

  1. A secure RFID authentication protocol adopting error correction code.

    PubMed

    Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.

  2. Application of Ultrasound Phase-Shift Analysis to Authenticate Wooden Panel Paintings

    PubMed Central

    Bravo, José M.; Sánchez-Pérez, Juan V.; Ferri, Marcelino; Redondo, Javier; Picó, Rubén

    2014-01-01

    Artworks are a valuable part of the World's cultural and historical heritage. Conservation and authentication of authorship are important aspects to consider in the protection of cultural patrimony. In this paper we present a novel application of a well-known method based on the phase-shift analysis of an ultrasonic signal, providing an integrated encoding system that enables authentication of the authorship of wooden panel paintings. The method has been evaluated in comparison with optical analysis and shows promising results. The proposed method provides an integrated fingerprint of the artwork, and could be used to enrich the cataloging and protection of artworks. Other advantages that make particularly attractive the proposed technique are its robustness and the use of low-cost sensors. PMID:24803191

  3. A Secure RFID Authentication Protocol Adopting Error Correction Code

    PubMed Central

    Zheng, Xinying; Chen, Pei-Yu

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619

  4. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    PubMed Central

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  5. Development of EST Intron-Targeting SNP Markers for Panax ginseng and Their Application to Cultivar Authentication

    PubMed Central

    Wang, Hongtao; Li, Guisheng; Kwon, Woo-Saeng; Yang, Deok-Chun

    2016-01-01

    Panax ginseng is one of the most valuable medicinal plants in the Orient. The low level of genetic variation has limited the application of molecular markers for cultivar authentication and marker-assisted selection in cultivated ginseng. To exploit DNA polymorphism within ginseng cultivars, ginseng expressed sequence tags (ESTs) were searched against the potential intron polymorphism (PIP) database to predict the positions of introns. Intron-flanking primers were then designed in conserved exon regions and used to amplify across the more variable introns. Sequencing results showed that single nucleotide polymorphisms (SNPs), as well as indels, were detected in four EST-derived introns, and SNP markers specific to “Gopoong” and “K-1” were first reported in this study. Based on cultivar-specific SNP sites, allele-specific polymerase chain reaction (PCR) was conducted and proved to be effective for the authentication of ginseng cultivars. Additionally, the combination of a simple NaOH-Tris DNA isolation method and real-time allele-specific PCR assay enabled the high throughput selection of cultivars from ginseng fields. The established real-time allele-specific PCR assay should be applied to molecular authentication and marker assisted selection of P. ginseng cultivars, and the EST intron-targeting strategy will provide a potential approach for marker development in species without whole genomic DNA sequence information. PMID:27271615

  6. National Authentication Framework Implementation Study

    DTIC Science & Technology

    2009-12-01

    Identifiers RA Registration Authority SAML Security Assertion Markup Language SFA Single-factor Authentication SMS Short Messaging System SOA ...written on  paper  disclosed;  passwords stored in electronic file  copied. 1,2,3,4 Eaves‐  dropping The token secret or authenticator is  revealed to...Internet 2.0 and the growing interest in systems developed based upon the Service- Oriented Architecture ( SOA ). While core specifications upon which

  7. Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks.

    PubMed

    Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho

    2014-04-09

    User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.

  8. Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments.

    PubMed

    Yang, Li; Zheng, Zhiming

    2018-01-01

    According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks.

  9. Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks

    PubMed Central

    Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho

    2014-01-01

    User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes. PMID:24721764

  10. Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments

    PubMed Central

    Zheng, Zhiming

    2018-01-01

    According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks. PMID:29534085

  11. Filtering methods for broadcast authentication against PKC-based denial of service in WSN: a survey

    NASA Astrophysics Data System (ADS)

    Afianti, Farah; Wirawan, Iwan; Suryani, Titiek

    2017-11-01

    Broadcast authentication is used to determine legitimate packet from authorized user. The received packet can be forwarded or used for the further purpose. The use of digital signature is one of the compromising methods but it is followed by high complexity especially in the verification process. That phenomenon is used by the adversary to force the user to verify a lot of false packet data. Kind of Denial of Service (DoS) which attacks the main signature can be mitigated by using pre-authentication methods as the first layer to filter false packet data. The objective of the filter is not replacing the main signature but as an addition to actual verification in the sensor node. This paper contributes in comparing the cost of computation, storage, and communication among several filters. The result shows Pre- Authenticator and Dos Attack-Resistant scheme have the lower overhead than the others. Thus followed by needing powerful sender. Moreover, the key chain is promising methods because of efficiency and effectiveness.

  12. RUASN: A Robust User Authentication Framework for Wireless Sensor Networks

    PubMed Central

    Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae

    2011-01-01

    In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost. PMID:22163888

  13. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2015-03-01

    The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al. (J Med Syst 38(12): 2014) presented a secure and efficient three-factor authenticated key exchange scheme to remedy the weaknesses of Tan et al.'s scheme (J Med Syst 38(3): 2014). In this paper, we found that once a successful off-line password attack that results in an adversary could impersonate any user of the system in Arshad et al.'s scheme. In order to thwart these security attacks, an enhanced biometric and smart card based remote authentication scheme for TMISs is proposed. In addition, the BAN logic is applied to demonstrate the completeness of the enhanced scheme. Security and performance analyses show that our enhanced scheme satisfies more security properties and less computational cost compared with previously proposed schemes.

  14. Authentication of Radio Frequency Identification Devices Using Electronic Characteristics

    ERIC Educational Resources Information Center

    Chinnappa Gounder Periaswamy, Senthilkumar

    2010-01-01

    Radio frequency identification (RFID) tags are low-cost devices that are used to uniquely identify the objects to which they are attached. Due to the low cost and size that is driving the technology, a tag has limited computational capabilities and resources. This limitation makes the implementation of conventional security protocols to prevent…

  15. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Kumar, Neeraj

    2015-11-01

    In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery.

  16. DNA authentication of animal-derived concentrated Chinese medicine granules.

    PubMed

    Jiang, Li-Li; Lo, Yat-Tung; Chen, Wei-Ting; Shaw, Pang-Chui

    2016-09-10

    Concentrated Chinese medicine granules (CCMG) offer patients a convenient option for traditional therapy. However with morphological and microscopic characteristics lost, it is difficult to authenticate and control the quality of these medicinal products. This study is the first to examine the feasibility of using DNA techniques to authenticate animal-derived CCMG, which has so far lacking of effective means for authentication. Primers targeting amplicons of different sizes were designed to determine the presence of PCR-amplifiable DNA fragments in two types of CCMG, namely Zaocys and Scorpio. Species-specific primers were designed to differentiate the genuine drugs from their adulterants. The specificity of the designed primers was evaluated in crude drugs (including genuine and adulterant) and CCMG. Results showed that by using species-specific primers, DNA fragments of less than 200bp could be isolated from the CCMG and the concerned source materials. This study demonstrated the presence of small size DNA in animal-derived CCMG and the DNA is effective in species identification. The work has extended the application of DNA techniques in herbal medicine and this approach may be further developed for quality control and regulatory compliance in the CCMG industry. Copyright © 2016 Elsevier B.V. All rights reserved.

  17. [Development of indel markers for molecular authentication of Panax ginseng and P. quinquefolius].

    PubMed

    Wang, Rong-Bo; Tian, Hui-Li; Wang, Hong-Tao; Li, Gui-Sheng

    2018-04-01

    Panax ginseng and P. quinquefolius are two kinds of important medicinal herbs. They are morphologically similar but have different pharmacological effects. Therefore, botanical origin authentication of these two ginsengs is of great importance for ensuring pharmaceutical efficacy and food safety. Based on the fact that intron position in orthologous genes is highly conserved across plant species, intron length polymorphisms were exploited from unigenes of ginseng. Specific primers were respectively designed for these two species based on their insertion/deletion sequences of cytochrome P450 and glyceraldehyde 3-phosphate dehydrogenase, and multiplex PCR was conducted for molecular authentication of P.ginseng and P. quinquefolius. The results showed that the developed multiplex PCR assay was effective for molecular authentication of P.ginseng and P. quinquefolius without strict PCR condition and the optimization of reaction system.This study provides a preferred ideal marker system for molecular authentication of ginseng,and the presented method can be employed in origin authentication of other herbal preparations. Copyright© by the Chinese Pharmaceutical Association.

  18. Rapid-Prototyping of Application Specific Signal Processors (RASSP) Education and Facilitation

    DTIC Science & Technology

    2000-12-01

    Digest 4. User/ passwd /deskey authentication required. o single point RASSP contractor release o phone call authentication required...o user/ passwd /deskey assign over phone 5. WWW user/ passwd used to access release for in component datasheet. o single file for each model

  19. Authenticity in the Language Classroom and Beyond: Adult Learners

    ERIC Educational Resources Information Center

    Rilling, Sarah, Ed.; Dantas-Whitney, Maria, Ed.

    2009-01-01

    Adult language learners have specific learning goals that reflect their lives within a global society, and adults negotiate multiple and changing identities throughout their personal, academic, and professional lives. Chapters in "Authenticity in the Language Classroom and Beyond: Adult Learners" highlight how teachers have the ability…

  20. A Continuous Identity Authentication Scheme Based on Physiological and Behavioral Characteristics.

    PubMed

    Wu, Guannan; Wang, Jian; Zhang, Yongrong; Jiang, Shuai

    2018-01-10

    Wearable devices have flourished over the past ten years providing great advantages to people and, recently, they have also been used for identity authentication. Most of the authentication methods adopt a one-time authentication manner which cannot provide continuous certification. To address this issue, we present a two-step authentication method based on an own-built fingertip sensor device which can capture motion data (e.g., acceleration and angular velocity) and physiological data (e.g., a photoplethysmography (PPG) signal) simultaneously. When the device is worn on the user's fingertip, it will automatically recognize whether the wearer is a legitimate user or not. More specifically, multisensor data is collected and analyzed to extract representative and intensive features. Then, human activity recognition is applied as the first step to enhance the practicability of the authentication system. After correctly discriminating the motion state, a one-class machine learning algorithm is applied for identity authentication as the second step. When a user wears the device, the authentication process is carried on automatically at set intervals. Analyses were conducted using data from 40 individuals across various operational scenarios. Extensive experiments were executed to examine the effectiveness of the proposed approach, which achieved an average accuracy rate of 98.5% and an F1-score of 86.67%. Our results suggest that the proposed scheme provides a feasible and practical solution for authentication.

  1. A Continuous Identity Authentication Scheme Based on Physiological and Behavioral Characteristics

    PubMed Central

    Wu, Guannan; Wang, Jian; Zhang, Yongrong; Jiang, Shuai

    2018-01-01

    Wearable devices have flourished over the past ten years providing great advantages to people and, recently, they have also been used for identity authentication. Most of the authentication methods adopt a one-time authentication manner which cannot provide continuous certification. To address this issue, we present a two-step authentication method based on an own-built fingertip sensor device which can capture motion data (e.g., acceleration and angular velocity) and physiological data (e.g., a photoplethysmography (PPG) signal) simultaneously. When the device is worn on the user’s fingertip, it will automatically recognize whether the wearer is a legitimate user or not. More specifically, multisensor data is collected and analyzed to extract representative and intensive features. Then, human activity recognition is applied as the first step to enhance the practicability of the authentication system. After correctly discriminating the motion state, a one-class machine learning algorithm is applied for identity authentication as the second step. When a user wears the device, the authentication process is carried on automatically at set intervals. Analyses were conducted using data from 40 individuals across various operational scenarios. Extensive experiments were executed to examine the effectiveness of the proposed approach, which achieved an average accuracy rate of 98.5% and an F1-score of 86.67%. Our results suggest that the proposed scheme provides a feasible and practical solution for authentication. PMID:29320463

  2. The Development of Intrinsic Criteria for Authenticity: A Model for Trust in Naturalistic Researches.

    ERIC Educational Resources Information Center

    Lincoln, Yvonna S.

    This paper presents criteria for establishing the trustworthiness of naturalistic inquiries, and specific techniques to facilitate their achievement or determine the degree of their achievement. The following criteria are briefly described: fairness; and ontological, educative, catalytic and tactical authenticity. Explored in greater detail,…

  3. Assessment in Alberta: Dimensions of Authenticity.

    ERIC Educational Resources Information Center

    Horvath, Frank G.

    The assessment programs of Alberta Education (Canada) are described, and the principles that guide these programs are reviewed. Alberta is committed to authentic assessment in its three major assessment programs: (1) the Diploma Examinations Program for certification in specific courses at the end of high school; (2) the Achievement Testing…

  4. Benefiting from Authentic Education to a Sustainable Social Development

    ERIC Educational Resources Information Center

    Watagodakumbura, Chandana

    2013-01-01

    Authentic education provides a unique learning experience to individual learners, specifically by addressing their psychological and neurological needs. The assessment of learners is done through generic attributes that have more validity and relates to intrinsic learner characteristics that could last throughout the life span of the learner.…

  5. Laptop Computers in the Elementary Classroom: Authentic Instruction with At-Risk Students

    ERIC Educational Resources Information Center

    Kemker, Kate; Barron, Ann E.; Harmes, J. Christine

    2007-01-01

    This case study investigated the integration of laptop computers into an elementary classroom in a low socioeconomic status (SES) school. Specifically, the research examined classroom management techniques and aspects of authentic learning relative to the student projects and activities. A mixed methods approach included classroom observations,…

  6. Designing Authentic Learning Tasks for Online Library Instruction

    ERIC Educational Resources Information Center

    Finch, Jannette L.; Jefferson, Renee N.

    2013-01-01

    This empirical study explores whether authentic tasks designed specifically for deliberately grouped students have an effect on student perception of teaching presence and student cognitive gains. In one library research class offered in an express session online, the instructor grouped students randomly. In a second online library research class,…

  7. A "Tale of Two Cities:" A Comparative Case Study of Community Engagement and Costs in Two Levy Campaigns

    ERIC Educational Resources Information Center

    Ingle, W. Kyle; Johnson, Paul A.; Petroff, Ruth Ann

    2011-01-01

    Using Anderson's (1998) framework for authentic community engagement and Levin and McEwan's (2001) "ingredients method," this comparative case study analyzed contrasting approaches to levy campaigns undertaken by two suburban school districts and the associated costs of the campaigns. We found that District A ran a campaign that…

  8. Multi-factor authentication using quantum communication

    DOEpatents

    Hughes, Richard John; Peterson, Charles Glen; Thrasher, James T.; Nordholt, Jane E.; Yard, Jon T.; Newell, Raymond Thorson; Somma, Rolando D.

    2018-02-06

    Multi-factor authentication using quantum communication ("QC") includes stages for enrollment and identification. For example, a user enrolls for multi-factor authentication that uses QC with a trusted authority. The trusted authority transmits device factor information associated with a user device (such as a hash function) and user factor information associated with the user (such as an encrypted version of a user password). The user device receives and stores the device factor information and user factor information. For multi-factor authentication that uses QC, the user device retrieves its stored device factor information and user factor information, then transmits the user factor information to the trusted authority, which also retrieves its stored device factor information. The user device and trusted authority use the device factor information and user factor information (more specifically, information such as a user password that is the basis of the user factor information) in multi-factor authentication that uses QC.

  9. An efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks.

    PubMed

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks.

  10. An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks

    PubMed Central

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147

  11. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    PubMed Central

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-01-01

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead. PMID:27213384

  12. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    PubMed

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-05-19

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  13. Supporting Geographic Investigations and Visualizations and Engaging Students as Citizen Scientists

    NASA Astrophysics Data System (ADS)

    Takaki, E.

    2011-12-01

    Historically, citizen science projects have had to provide their own technical infrastructure to handle the data they collect. National Geographic Education Programs (funded by the National Science Foundation) has developed a free (or low cost for large projects) online data visualization and analysis tool called FieldScope, which is available to any person or group doing studies that involve geographically dispersed data. FieldScope can house and scaffold the analysis of authentic environmental data as well as augment it with other helpful layers such as precipitation, population density, water quality parameters, etc. During the session, participants will come to understand the basics of GIS, the history of FieldScope, and its unique educational features. We will spend the majority of the time exploring specific tools for analyzing authentic data, the different types of layers that make FieldScope powerful in its educational and research capacities, and examining various questions that can be addressed in a classroom or citizen science setting. We'll conclude the hands-on portion by sharing what was learned and how they were able to make meaning from the myriad of ways that data can be displayed.

  14. Decoding DNA labels by melting curve analysis using real-time PCR.

    PubMed

    Balog, József A; Fehér, Liliána Z; Puskás, László G

    2017-12-01

    Synthetic DNA has been used as an authentication code for a diverse number of applications. However, existing decoding approaches are based on either DNA sequencing or the determination of DNA length variations. Here, we present a simple alternative protocol for labeling different objects using a small number of short DNA sequences that differ in their melting points. Code amplification and decoding can be done in two steps using quantitative PCR (qPCR). To obtain a DNA barcode with high complexity, we defined 8 template groups, each having 4 different DNA templates, yielding 158 (>2.5 billion) combinations of different individual melting temperature (Tm) values and corresponding ID codes. The reproducibility and specificity of the decoding was confirmed by using the most complex template mixture, which had 32 different products in 8 groups with different Tm values. The industrial applicability of our protocol was also demonstrated by labeling a drone with an oil-based paint containing a predefined DNA code, which was then successfully decoded. The method presented here consists of a simple code system based on a small number of synthetic DNA sequences and a cost-effective, rapid decoding protocol using a few qPCR reactions, enabling a wide range of authentication applications.

  15. Comparison of quantitative NMR and IRMS spectrometry for the authentication of "Polish Vodka".

    PubMed

    Ciepielowski, Grzegorz; Pacholczyk-Sienicka, Barbara; Frączek, Tomasz; Klajman, Kamila; Paneth, Piotr; Albrecht, Łukasz

    2018-05-31

    The production of "Polish Vodka" is restricted by law to the ethyl alcohol of agricultural origins obtained from rye, wheat, barley, oat, triticale and potatoes grown on the territory of the Republic of Poland. The current labeling system should guarantee that the spirit is authentic and of good quality but not all producers are honest. Unfortunately, the authentic "Polish Vodka" is the most often counterfeited by the addition of cheaper and more accessible maize spirits. These illegal practices significantly reduce costs of the spirit production. Therefore, the determination of the botanical origin of alcohol in Poland is highly relevant. The quantitative 2 H NMR and isotope ratio mass spectrometry (IRMS) were used to investigate the authenticity of 30 samples of Polish spirits. Several isotopic parameters were used to determine the botanical origin of 10 unknown samples. Both approaches lead to the same conclusions regarding the percentage of maize-derived ethanol addition. Applied techniques are a valuable tool in the fight against counterfeiting of products. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  16. An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications

    PubMed Central

    Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae

    2014-01-01

    Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications. PMID:24521942

  17. An efficient and adaptive mutual authentication framework for heterogeneous wireless sensor network-based applications.

    PubMed

    Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae

    2014-02-11

    Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications.

  18. "BioONT": Improving Knowledge Organization and Representation in the Domain of Biometric Authentication

    ERIC Educational Resources Information Center

    Buerle, Stephen

    2017-01-01

    This dissertation explores some of the fundamental challenges facing the information assurance community as it relates to knowledge categorization, organization and representation within the field of information security and more specifically within the domain of biometric authentication. A primary objective of this research is the development of…

  19. Engaging Life-Sciences Students with Mathematical Models: Does Authenticity Help?

    ERIC Educational Resources Information Center

    Poladian, Leon

    2013-01-01

    Compulsory mathematics service units for the life sciences present unique challenges: even students who learn some specific skills maintain a negative attitude to mathematics and do not see the relevance of the unit towards their degree. The focus on authentic content and the presentation and teaching of global or qualitative methods before…

  20. Accounting for Taste: Learning by Doing in the College Classroom

    ERIC Educational Resources Information Center

    Bradshaw, Kathlyn E.; Harvey, Robert W.

    2017-01-01

    This article presents Edelson and Reiser's (2006) strategies as a framework for analyzing an instance of authentic practice in a managerial accounting course. Specifically, this article presents an analysis of a managerial accounting project design created to provide learning-by-doing via authentic practice. Students need more than to learn about…

  1. Authenticity and Subjective Wellbeing within the Context of a Religious Organization

    PubMed Central

    Ariza-Montes, Antonio; Giorgi, Gabriele; Leal-Rodríguez, Antonio; Ramírez-Sobrino, Jesús

    2017-01-01

    Although authenticity has a long history as a philosophical and psychological idea, this concept has received scarce attention in the business literature until very lately. Nevertheless, scholars belonging to a broad array of disciplines have pointed out the escalation in the individuals’ search for authenticity within developed societies. Hence, the purpose of this paper is to assess the link between authenticity and subjective wellbeing within the rarely explored context of faith-driven organizations, where the management of emotions attains a particular significance. Specifically, this study links authenticity with subjective wellbeing among the distinct groups that shape a large international Catholic organization. This study uses Partial Least Squares (PLS) to test our research model and hypotheses. This paper covers two noteworthy research gaps. On the one hand, it provides evidence of the relationship between authenticity and subjective wellbeing within the context of religious organizations. On the other hand, our results suggest that this relationship is not homogeneous among the distinct groups that shape the organization. Implications of the research are finally discussed. PMID:28769854

  2. Evaluation of abalone β-glucuronidase substitution in current urine hydrolysis procedures.

    PubMed

    Malik-Wolf, Brittany; Vorce, Shawn; Holler, Justin; Bosy, Thomas

    2014-04-01

    This study examined the potential of abalone β-glucuronidase as a viable and cost effective alternative to current hydrolysis procedures using acid, Helix pomatia β-glucuronidase and Escherichia coli β-glucuronidase. Abalone β-glucuronidase successfully hydrolyzed oxazepam-glucuronide and lorazepam-glucuronide within 5% of the spiked control concentration. Benzodiazepines present in authentic urine specimens were within 20% of the concentrations obtained with the current hydrolysis procedure using H. pomatia β-glucuronidase. JWH 018 N-(5-hydroxypentyl) β-d-glucuronide was hydrolyzed within 10% of the control concentration. Authentic urine specimens showed improved glucuronide cleavage using abalone β-glucuronidase with up to an 85% increase of drug concentration, compared with the results obtained using E. coli β-glucuronidase. The JWH 018 and JWH 073 carboxylic acid metabolites also showed increased drug concentrations of up to 24%. Abalone β-glucuronidase was able to completely hydrolyze a morphine-3-glucuronide control, but only 82% of total morphine was hydrolyzed in authentic urine specimens compared with acid hydrolysis results. Hydrolysis of codeine and hydromorphone varied between specimens, suggesting that abalone β-glucuronidase may not be as efficient in hydrolyzing the glucuronide linkages in opioid compounds compared with acid hydrolysis. Abalone β-glucuronidase demonstrates effectiveness as a low cost option for enzyme hydrolysis of benzodiazepines and synthetic cannabinoids.

  3. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network

    PubMed Central

    Rajagopalan, S. P.

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network. PMID:29040290

  4. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    PubMed

    Alagarsamy, Sumithra; Rajagopalan, S P

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  5. Analog Video Authentication and Seal Verification Equipment Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gregory Lancaster

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital imagesmore » and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.« less

  6. A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems.

    PubMed

    Xu, Xin; Zhu, Ping; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua; He, Lian

    2014-01-01

    In the field of the Telecare Medicine Information System, recent researches have focused on consummating more convenient and secure healthcare delivery services for patients. In order to protect the sensitive information, various attempts such as access control have been proposed to safeguard patients' privacy in this system. However, these schemes suffered from some certain security defects and had costly consumption, which were not suitable for the telecare medicine information system. In this paper, based on the elliptic curve cryptography, we propose a secure and efficient two-factor mutual authentication and key agreement scheme to reduce the computational cost. Such a scheme enables to provide the patient anonymity by employing the dynamic identity. Compared with other related protocols, the security analysis and performance evaluation show that our scheme overcomes some well-known attacks and has a better performance in the telecare medicine information system.

  7. In-gel and OFFGEL-based proteomic approach for authentication of meat species from minced meat and meat products.

    PubMed

    Naveena, Basappa M; Jagadeesh, Deepak S; Kamuni, Veeranna; Muthukumar, Muthupalani; Kulkarni, Vinayak V; Kiran, Mohan; Rapole, Srikanth

    2018-02-01

    Fraudulent mislabelling of processed meat products on a global scale that cannot be detected using conventional techniques necessitates sensitive, robust and accurate methods of meat authentication to ensure food safety and public health. In the present study, we developed an in-gel (two-dimensional gel electrophoresis, 2DE) and OFFGEL-based proteomic method for authenticating raw and cooked water buffalo (Bubalus bubalis), sheep (Ovis aries) and goat (Caprus hircus) meat and their mixes. The matrix-assisted liquid desorption/ionization time-of-flight mass spectrometric analysis of proteins separated using 2DE or OFFGEL electrophoresis delineated species-specific peptide biomarkers derived from myosin light chain 1 and 2 (MLC1 and MLC2) of buffalo-sheep-goat meat mix in definite proportions at 98:1:1, 99:0.5:0.5 and 99.8:0.1:0.1 that were found stable to resist thermal processing. In-gel and OFFGEL-based proteomic approaches are efficient in authenticating meat mixes spiked at minimum 1.0% and 0.1% levels, respectively, in triple meat mix for both raw and cooked samples. The study demonstrated that authentication of meat from a complex mix of three closely related species requires identification of more than one species-specific peptide due to close similarity between their amino acid sequences. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  8. Personal authentication using hand vein triangulation and knuckle shape.

    PubMed

    Kumar, Ajay; Prathyusha, K Venkata

    2009-09-01

    This paper presents a new approach to authenticate individuals using triangulation of hand vein images and simultaneous extraction of knuckle shape information. The proposed method is fully automated and employs palm dorsal hand vein images acquired from the low-cost, near infrared, contactless imaging. The knuckle tips are used as key points for the image normalization and extraction of region of interest. The matching scores are generated in two parallel stages: (i) hierarchical matching score from the four topologies of triangulation in the binarized vein structures and (ii) from the geometrical features consisting of knuckle point perimeter distances in the acquired images. The weighted score level combination from these two matching scores are used to authenticate the individuals. The achieved experimental results from the proposed system using contactless palm dorsal-hand vein images are promising (equal error rate of 1.14%) and suggest more user friendly alternative for user identification.

  9. SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks

    NASA Astrophysics Data System (ADS)

    Li, Celia; Wang, Zhuang; Yang, Cungang

    In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK authenticate unicast and broadcast routing messages respectively. In WMN, a unique PTK is shared by each pair of nodes, while GTK is shared secretly between the node and all its one-hop neighbours. A message authentication code (MAC) is attached as the extension to the original AODV routing message to guarantee the message's authenticity and integrity in a hop-by-hop fashion. Security analysis and performance evaluation show that SEAODV is more effective in preventing identified routing attacks and outperforms ARAN and SAODV in terms of computation cost and route acquisition latency.

  10. Clone-preventive technique that features magnetic microfibers and cryptography

    NASA Astrophysics Data System (ADS)

    Matsumoto, Hiroyuki; Suzuki, Keiichi; Matsumoto, Tsutomu

    1998-04-01

    We have used the term 'clone' to refer to those things which are produced by methods such as counterfeiting, alteration, duplication or simulation. To satisfy the requirements of secure and low-cost techniques for preventing card fraud, we have recently developed a clone preventive system called 'FibeCrypt (Fiber Cryptosystem)' which utilizes physical characteristics. Each card has a canonical domain (i.e. a distinctive part), similar to fingerprints as the biometric measurement, made up of magnetic micro-fibers scattered randomly inside. We have applied cryptosystems to the system. FibeCrypt examines and authenticates the unique pattern of the canonical domain using pre-stored reference data and a digital signature. In our paper, the schemes and the features of this system are described in detail. The results of our examinations show the accuracy of authentication of the system. We conclude that this authentication technique which utilizes physical characteristics can be very effective for clone prevention in various fields.

  11. Effective Faculty Evaluation at the Teaching-Centered University: Building a Fair and Authentic Portfolio of Faculty Work

    ERIC Educational Resources Information Center

    Lakin, Amy L.

    2016-01-01

    Purpose: The purpose of this paper is to determine the most fair, authentic, and reliable elements to include in a portfolio of faculty work, specifically at teaching-centered institutions. Design/methodology/approach: This paper examines and evaluates relevant literature pertaining to faculty portfolios of work and recommends portfolio formats…

  12. Towards a Model of Teacher Leadership in ELT: Authentic Leadership in Classroom Practice

    ERIC Educational Resources Information Center

    Greenier, Vincent T.; Whitehead, George E. K.

    2016-01-01

    This study investigates how the model of Authentic Leadership applies to language teaching and its implications for future directions in teacher education programmes. Data was collected from 56 native-speaking English teachers through an online survey consisting of specific open-ended and short answer type questions. The results of the study…

  13. An Efficient Algorithm for Partitioning and Authenticating Problem-Solutions of eLeaming Contents

    ERIC Educational Resources Information Center

    Dewan, Jahangir; Chowdhury, Morshed; Batten, Lynn

    2013-01-01

    Content authenticity and correctness is one of the important challenges in eLearning as there can be many solutions to one specific problem in cyber space. Therefore, the authors feel it is necessary to map problems to solutions using graph partition and weighted bipartite matching. This article proposes an efficient algorithm to partition…

  14. Authentic Assessment in Physical Education: A Case Study of Game Sense Pedagogy

    ERIC Educational Resources Information Center

    Georgakis, Steve; Wilson, Rachel; Evans, John Robert

    2015-01-01

    The use and promotion of the term authentic assessment (AA) in the literature and among physical education (PE) practitioners is widespread. However, the meaning and application of this concept are misunderstood, in education generally, in its application to PE, and in its application to specific pedagogical approaches within PE, such as Game…

  15. Unobtrusive Behavioral and Activity-Related Multimodal Biometrics: The ACTIBIO Authentication Concept

    PubMed Central

    Drosou, A.; Ioannidis, D.; Moustakas, K.; Tzovaras, D.

    2011-01-01

    Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities. PMID:21380485

  16. Unobtrusive behavioral and activity-related multimodal biometrics: The ACTIBIO Authentication concept.

    PubMed

    Drosou, A; Ioannidis, D; Moustakas, K; Tzovaras, D

    2011-03-01

    Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.

  17. Authentication Architecture for Region-Wide e-Health System with Smartcards and a PKI

    NASA Astrophysics Data System (ADS)

    Zúquete, André; Gomes, Helder; Cunha, João Paulo Silva

    This paper describes the design and implementation of an e-Health authentication architecture using smartcards and a PKI. This architecture was developed to authenticate e-Health Professionals accessing the RTS (Rede Telemática da Saúde), a regional platform for sharing clinical data among a set of affiliated health institutions. The architecture had to accommodate specific RTS requirements, namely the security of Professionals' credentials, the mobility of Professionals, and the scalability to accommodate new health institutions. The adopted solution uses short-lived certificates and cross-certification agreements between RTS and e-Health institutions for authenticating Professionals accessing the RTS. These certificates carry as well the Professional's role at their home institution for role-based authorization. Trust agreements between e-Health institutions and RTS are necessary in order to make the certificates recognized by the RTS. As a proof of concept, a prototype was implemented with Windows technology. The presented authentication architecture is intended to be applied to other medical telematic systems.

  18. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    PubMed

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  19. New design opportunities with OVI

    NASA Astrophysics Data System (ADS)

    Bleikolm, Anton F.

    1998-04-01

    Optically Variable Ink (OVITM) chosen for its unique colour shifting properties is applied to the currencies of more than 50 countries. An significant colour difference at viewing angles of 90 degrees and 30 degrees respectively makes colour copying impossible. New manufacturing techniques for the interference pigment (OVP) provide ever better cost/performance ratios. Screen printing presses newly available on the market guarantee production speeds of 8000 sheets/hour or 130 meters/minute in the case of web printing, perfectly in line with the traditional equipment for manufacturing of currency. Specifically developed ink formulations allow UV-curing at high speed or oxidative drying to create highly mechanically and chemically resistant colour shifting prints. The unique colour shifting characteristics together with overprinting in intaglio give design opportunities providing the best protection against colour copying or commercial reprint. Specific designs of OVP together with high security ingredients allow the formulation of machine readable optically variable inks useful for the authentication and sorting of documents.

  20. Employee Trust in Supervisors and Affective Commitment: The Moderating Role of Authentic Leadership.

    PubMed

    Xiong, Kehan; Lin, Weipeng; Li, Jenny C; Wang, Lei

    2016-06-01

    Although previous research has examined the main/direct effects of subordinates' trust in their supervisors on the levels of subordinates' affective commitment towards the organizations, little attention has been paid to explore the boundary conditions of this relationship. Two studies were conducted to examine the moderating effect of authentic leadership on the relationship between subordinates' trust in supervisor and their levels of affective commitment towards the organization. In line with the hypothesized model, both Study 1 (cross-sectional design, n = 138) and Study 2 (lagged design, n = 154) demonstrated that authentic leadership moderated the relationship between employees' trust in supervisor and their levels of affective commitment towards their organizations. Specifically, the positive relationship was stronger for employees under higher levels of authentic leadership. The implications for theory and practice are discussed. © The Author(s) 2016.

  1. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    PubMed

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  2. Robust and reliable banknote authentification and print flaw detection with opto-acoustical sensor fusion methods

    NASA Astrophysics Data System (ADS)

    Lohweg, Volker; Schaede, Johannes; Türke, Thomas

    2006-02-01

    The authenticity checking and inspection of bank notes is a high labour intensive process where traditionally every note on every sheet is inspected manually. However with the advent of more and more sophisticated security features, both visible and invisible, and the requirement of cost reduction in the printing process, it is clear that automation is required. As more and more print techniques and new security features will be established, total quality security, authenticity and bank note printing must be assured. Therefore, this factor necessitates amplification of a sensorial concept in general. We propose a concept for both authenticity checking and inspection methods for pattern recognition and classification for securities and banknotes, which is based on the concept of sensor fusion and fuzzy interpretation of data measures. In the approach different methods of authenticity analysis and print flaw detection are combined, which can be used for vending or sorting machines, as well as for printing machines. Usually only the existence or appearance of colours and their textures are checked by cameras. Our method combines the visible camera images with IR-spectral sensitive sensors, acoustical and other measurements like temperature and pressure of printing machines.

  3. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks

    PubMed Central

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-01-01

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.’s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme. PMID:28441331

  4. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    PubMed

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  5. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    PubMed

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.

  6. A novel non-sequencing approach for rapid authentication of Testudinis Carapax et Plastrum and Trionycis Carapax by species-specific primers

    PubMed Central

    Yu, Pingtian; Lu, Yi; Jiao, Zhaoqun; Chen, Liqun; Zhou, Ying; Shen, Yuping; Jia, Xiaobin

    2018-01-01

    A novel non-sequencing approach was developed to detect short DNA fragments (ca 100 bp) for rapid authentication of two natural products, namely Testudinis Carapax et Plastrum and Trionycis Carapax, based on the difference in mitochondrial genome. Five specifically designed primer reactions were established to target species for reliable identification of their commercial products. They were confirmed to have a high level of inter-species-specificity and good intra-species stability. The limit of detection was estimated to be 1 ng of genomes for all of five assays. Also, the validation results demonstrated that the raw materials and processed products in addition to some of the highly processed products can be conveniently authenticated with good sensitivity and precision by this newly proposed approach. Especially, when reference sample mixtures were assayed, these primer sets have still performed well but not the prevailing COI barcoding technology. These could assist in the discrimination and identification of other animal-derived medicines for their form of raw material, the pulverized and the complex. PMID:29765667

  7. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  8. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.

    PubMed

    Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru

    2016-10-01

    Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security verification of our scheme using the widely accepted AVISPA tool. High security and extra functionality features allow our proposed scheme to be applicable for telecare medicine information systems which is used for e-health care medical applications. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  9. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.

    PubMed

    Li, Chun-Ta; Shih, Dong-Her; Wang, Chun-Cheng

    2018-04-01

     With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated.  Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks.  The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS.  We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features for privacy preservation and effectively cope with cloud-assisted TMIS with better efficiency. Copyright © 2018 Elsevier B.V. All rights reserved.

  10. Issues and approaches for electronic document approval and transmittal using digital signatures and text authentication: Prototype documentation

    NASA Astrophysics Data System (ADS)

    Boling, M. E.

    1989-09-01

    Prototypes were assembled pursuant to recommendations made in report K/DSRD-96, Issues and Approaches for Electronic Document Approval and Transmittal Using Digital Signatures and Text Authentication, and to examine and discover the possibilities for integrating available hardware and software to provide cost effective systems for digital signatures and text authentication. These prototypes show that on a LAN, a multitasking, windowed, mouse/keyboard menu-driven interface can be assembled to provide easy and quick access to bit-mapped images of documents, electronic forms and electronic mail messages with a means to sign, encrypt, deliver, receive or retrieve and authenticate text and signatures. In addition they show that some of this same software may be used in a classified environment using host to terminal transactions to accomplish these same operations. Finally, a prototype was developed demonstrating that binary files may be signed electronically and sent by point to point communication and over ARPANET to remote locations where the authenticity of the code and signature may be verified. Related studies on the subject of electronic signatures and text authentication using public key encryption were done within the Department of Energy. These studies include timing studies of public key encryption software and hardware and testing of experimental user-generated host resident software for public key encryption. This software used commercially available command-line source code. These studies are responsive to an initiative within the Office of the Secretary of Defense (OSD) for the protection of unclassified but sensitive data. It is notable that these related studies are all built around the same commercially available public key encryption products from the private sector and that the software selection was made independently by each study group.

  11. Mechanisms linking authentic leadership to emotional exhaustion: The role of procedural justice and emotional demands in a moderated mediation approach.

    PubMed

    Kampa, Judith; Rigotti, Thomas; Otto, Kathleen

    2017-04-07

    In order to gain more knowledge on how the positive leadership concept of authentic leadership impacts follower strain, this study tries to uncover procedural justice as an underlying mechanism. In contrast to previous work, we exclusively base our theoretical model on justice theories. Specifically, we hypothesize that authentic leadership negatively predicts emotional exhaustion through perceptions of procedural justice. We assume that this indirect effect is conditional on followers' amount of emotional demands, and that the procedural justice-emotional exhaustion relationship is stronger when emotional demands are high. This finally results in a stronger exhaustion-reducing effect of authentic leadership. The proposed moderated mediation model was tested in a sample of N=628 employees nested in 168 teams using lagged data from three waves. Results provide support for all hypotheses. Authentic leadership is critical to employees' well-being as it contributes to an elevated perception of positive work conditions (procedural justice), especially in contexts with high emotional demands. Limitations and practical implications on leadership development are discussed.

  12. Authenticity testing of environment-friendly Korean rice (Oryza sativa L.) using carbon and nitrogen stable isotope ratio analysis.

    PubMed

    Chung, Ill-Min; Park, Sung-Kyu; Lee, Kyoung-Jin; An, Min-Jeong; Lee, Ji-Hee; Oh, Yong-Taek; Kim, Seung-Hyun

    2017-11-01

    The increasing demand for organic foods creates, in turn, a pressing need for the development of more accurate tools for the authentication of organic food in order to ensure both fair trade and food safety. This study examines the feasibility of δ 13 C and δ 15 N analyses as potential tools for authentication of environment-friendly rice sold in Korea. δ 13 C and δ 15 N examination in different rice grains showed that environment-friendly rice can be successfully distinguished from conventional rice. No multi-residue pesticides were detected in the examined rice samples, including conventional rice. This study demonstrates the complementary feasibility of δ 13 C and δ 15 N analyses for the authentication of environment-friendly rice sold in Korea in cases where pesticide residue analysis alone is insufficient for discrimination of organic and conventional rice. In future, complementary analyses including compound-specific isotope ratio analysis might be employed for improving the reliability of organic authentication. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    PubMed Central

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  14. Metabolite Profiling and Classification of DNA-Authenticated Licorice Botanicals

    PubMed Central

    Simmler, Charlotte; Anderson, Jeffrey R.; Gauthier, Laura; Lankin, David C.; McAlpine, James B.; Chen, Shao-Nong; Pauli, Guido F.

    2015-01-01

    Raw licorice roots represent heterogeneous materials obtained from mainly three Glycyrrhiza species. G. glabra, G. uralensis, and G. inflata exhibit marked metabolite differences in terms of flavanones (Fs), chalcones (Cs), and other phenolic constituents. The principal objective of this work was to develop complementary chemometric models for the metabolite profiling, classification, and quality control of authenticated licorice. A total of 51 commercial and macroscopically verified samples were DNA authenticated. Principal component analysis and canonical discriminant analysis were performed on 1H NMR spectra and area under the curve values obtained from UHPLC-UV chromatograms, respectively. The developed chemometric models enable the identification and classification of Glycyrrhiza species according to their composition in major Fs, Cs, and species specific phenolic compounds. Further key outcomes demonstrated that DNA authentication combined with chemometric analyses enabled the characterization of mixtures, hybrids, and species outliers. This study provides a new foundation for the botanical and chemical authentication, classification, and metabolomic characterization of crude licorice botanicals and derived materials. Collectively, the proposed methods offer a comprehensive approach for the quality control of licorice as one of the most widely used botanical dietary supplements. PMID:26244884

  15. Mechanisms linking authentic leadership to emotional exhaustion: The role of procedural justice and emotional demands in a moderated mediation approach

    PubMed Central

    KAMPA, Judith; RIGOTTI, Thomas; OTTO, Kathleen

    2016-01-01

    In order to gain more knowledge on how the positive leadership concept of authentic leadership impacts follower strain, this study tries to uncover procedural justice as an underlying mechanism. In contrast to previous work, we exclusively base our theoretical model on justice theories. Specifically, we hypothesize that authentic leadership negatively predicts emotional exhaustion through perceptions of procedural justice. We assume that this indirect effect is conditional on followers’ amount of emotional demands, and that the procedural justice-emotional exhaustion relationship is stronger when emotional demands are high. This finally results in a stronger exhaustion-reducing effect of authentic leadership. The proposed moderated mediation model was tested in a sample of N=628 employees nested in 168 teams using lagged data from three waves. Results provide support for all hypotheses. Authentic leadership is critical to employees’ well-being as it contributes to an elevated perception of positive work conditions (procedural justice), especially in contexts with high emotional demands. Limitations and practical implications on leadership development are discussed. PMID:27818452

  16. Using Rose and Compass for Authentication

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    White, G

    2009-07-09

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSEmore » is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.« less

  17. Authentication of Botanical Origin in Herbal Teas by Plastid Noncoding DNA Length Polymorphisms.

    PubMed

    Uncu, Ali Tevfik; Uncu, Ayse Ozgur; Frary, Anne; Doganlar, Sami

    2015-07-01

    The aim of this study was to develop a DNA barcode assay to authenticate the botanical origin of herbal teas. To reach this aim, we tested the efficiency of a PCR-capillary electrophoresis (PCR-CE) approach on commercial herbal tea samples using two noncoding plastid barcodes, the trnL intron and the intergenic spacer between trnL and trnF. Barcode DNA length polymorphisms proved successful in authenticating the species origin of herbal teas. We verified the validity of our approach by sequencing species-specific barcode amplicons from herbal tea samples. Moreover, we displayed the utility of PCR-CE assays coupled with sequencing to identify the origin of undeclared plant material in herbal tea samples. The PCR-CE assays proposed in this work can be applied as routine tests for the verification of botanical origin in herbal teas and can be extended to authenticate all types of herbal foodstuffs.

  18. Cryptographic framework for document-objects resulting from multiparty collaborative transactions.

    PubMed

    Goh, A

    2000-01-01

    Multiparty transactional frameworks--i.e. Electronic Data Interchange (EDI) or Health Level (HL) 7--often result in composite documents which can be accurately modelled using hyperlinked document-objects. The structural complexity arising from multiauthor involvement and transaction-specific sequencing would be poorly handled by conventional digital signature schemes based on a single evaluation of a one-way hash function and asymmetric cryptography. In this paper we outline the generation of structure-specific authentication hash-trees for the the authentication of transactional document-objects, followed by asymmetric signature generation on the hash-tree value. Server-side multi-client signature verification would probably constitute the single most compute-intensive task, hence the motivation for our usage of the Rabin signature protocol which results in significantly reduced verification workloads compared to the more commonly applied Rivest-Shamir-Adleman (RSA) protocol. Data privacy is handled via symmetric encryption of message traffic using session-specific keys obtained through key-negotiation mechanisms based on discrete-logarithm cryptography. Individual client-to-server channels can be secured using a double key-pair variation of Diffie-Hellman (DH) key negotiation, usage of which also enables bidirectional node authentication. The reciprocal server-to-client multicast channel is secured through Burmester-Desmedt (BD) key-negotiation which enjoys significant advantages over the usual multiparty extensions to the DH protocol. The implementation of hash-tree signatures and bi/multidirectional key negotiation results in a comprehensive cryptographic framework for multiparty document-objects satisfying both authentication and data privacy requirements.

  19. The importance of being authentic: persuasion, narration, and dialogue in health communication and education.

    PubMed

    Petraglia, Joseph

    2009-03-01

    A topic gaining attention in the field of education has been that of "authenticity"-the creation of learning environments that provide learners with richer and more realistic contexts in which to apply knowledge and practice skills. The subject of authenticity has yet to attract much attention in the field of public health and specifically in health communication and education, although these fields have long experience with the problem of getting audiences to translate knowledge into action. This article reviews the rationale for an interest in authenticity as it relates to health communication and education and notes that "authenticity" does not inhere in information but is an appraisal made by a member of the public who is persuaded to view the information as especially relevant to his or her health behavior and consonant with his or her prior experiences. This article argues that a public health communicator or educator can encourage such appraisals by using narrative formats that provide rich contextualization. But contextualizing behavior change information in the form of stories is not enough; there is a dialogic dimension to persuasion that aids in the process of authentication. Creating opportunities for dialogue between behavior change narratives and their audiences has its own challenges, but nonetheless deserves to be a priority in public health.

  20. An efficient biometric and password-based remote user authentication using smart card for Telecare Medical Information Systems in multi-server environment.

    PubMed

    Maitra, Tanmoy; Giri, Debasis

    2014-12-01

    The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost.

  1. An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing.

    PubMed

    Kumar, Vinod; Jangirala, Srinivas; Ahmad, Musheer

    2018-06-28

    The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility for patients to explore medical treatment, accumulate and approach medical data through internet connectivity. Security and privacy preservation is necessary for medical data of the patient in TMIS because of the very perceptive purpose. Recently, Mohit et al.'s proposed a mutual authentication protocol for TMIS in the cloud computing environment. In this work, we reviewed their protocol and found that it is not secure against stolen verifier attack, many logged in patient attack, patient anonymity, impersonation attack, and fails to protect session key. For enhancement of security level, we proposed a new mutual authentication protocol for the similar environment. The presented framework is also more capable in terms of computation cost. In addition, the security evaluation of the protocol protects resilience of all possible security attributes, and we also explored formal security evaluation based on random oracle model. The performance of the proposed protocol is much better in comparison to the existing protocol.

  2. Biometric Authentication for Gender Classification Techniques: A Review

    NASA Astrophysics Data System (ADS)

    Mathivanan, P.; Poornima, K.

    2017-12-01

    One of the challenging biometric authentication applications is gender identification and age classification, which captures gait from far distance and analyze physical information of the subject such as gender, race and emotional state of the subject. It is found that most of the gender identification techniques have focused only with frontal pose of different human subject, image size and type of database used in the process. The study also classifies different feature extraction process such as, Principal Component Analysis (PCA) and Local Directional Pattern (LDP) that are used to extract the authentication features of a person. This paper aims to analyze different gender classification techniques that help in evaluating strength and weakness of existing gender identification algorithm. Therefore, it helps in developing a novel gender classification algorithm with less computation cost and more accuracy. In this paper, an overview and classification of different gender identification techniques are first presented and it is compared with other existing human identification system by means of their performance.

  3. DNA barcoding coupled to HRM analysis as a new and simple tool for the authentication of Gadidae fish species.

    PubMed

    Fernandes, Telmo J R; Costa, Joana; Oliveira, M Beatriz P P; Mafra, Isabel

    2017-09-01

    This work aimed to exploit the use of DNA mini-barcodes combined with high resolution melting (HRM) for the authentication of gadoid species: Atlantic cod (Gadus morhua), Pacific cod (Gadus macrocephalus), Alaska pollock (Theragra chalcogramma) and saithe (Pollachius virens). Two DNA barcode regions, namely cytochrome c oxidase subunit I (COI) and cytochrome b (cytb), were analysed in silico to identify genetic variability among the four species and used, subsequently, to develop a real-time PCR method coupled with HRM analysis. The cytb mini-barcode enabled best discrimination of the target species with a high level of confidence (99.3%). The approach was applied successfully to identify gadoid species in 30 fish-containing foods, 30% of which were not as declared on the label. Herein, a novel approach for rapid, simple and cost-effective discrimination/clustering, as a tool to authenticate Gadidae fish species, according to their genetic relationship, is proposed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Technology and production of plant-based meat analogs with authentic texture

    USDA-ARS?s Scientific Manuscript database

    Extrusion cooking has been widely used in modern food industry due to its versatility, high productivity, energy efficiency and low cost. Well-known applications include breakfast cereals, pasta, snacks, confectionery products, and textured vegetable proteins. Most applications take place at low ...

  5. The Costs of Suppressing Negative Emotions and Amplifying Positive Emotions During Parental Caregiving.

    PubMed

    Le, Bonnie M; Impett, Emily A

    2016-03-01

    How do parents feel when they regulate their emotional expressions in ways that are incongruent with their genuine feelings? In an experimental study, parents reported experiencing lower authenticity, emotional well-being, relationship quality, and responsiveness to their children's needs when they recalled caregiving experiences in which they suppressed negative emotions and amplified positive emotions, relative to a control condition. In a 10-day daily experience study, parents tended to use both regulation strategies simultaneously. In addition, assessing their unique effects indicated that positive emotion amplification, but not negative emotion suppression, had an indirect effect on parental outcomes via authenticity, with negative emotion suppression no longer being costly. This indirect effect was dampened when accounting for care difficulty. In both studies, effects were independent of a child's mood. The current results suggest that parents' attempts to suppress negative and amplify positive emotions during child care can detract from their well-being and high-quality parent-child bonds. © 2016 by the Society for Personality and Social Psychology, Inc.

  6. Simultaneous detection of bovine and porcine DNA in pharmaceutical gelatin capsules by duplex PCR assay for Halal authentication.

    PubMed

    Nikzad, Jafar; Shahhosseini, Soraya; Tabarzad, Maryam; Nafissi-Varcheh, Nastaran; Torshabi, Maryam

    2017-02-14

    In the pharmaceutical industry, hard- and soft-shelled capsules are typically made from gelatin, commonly derived from bovine and porcine sources. To ensure that pharmaceutical products comply with halal regulations in Muslim countries (no porcine products allowed), development of a valid, reliable, quick, and most importantly, cost-effective tests are of utmost importance. We developed a species-specific duplex polymerase chain reaction (PCR) assay targeting 149 bp porcine and 271 bp bovine mitochondrial DNA (mtDNA) to simultaneously detect both porcine and bovine DNA (in one reaction at the same time) in gelatin. Some additional simplex PCR tests (targeting 126 bp bovine and 212 bp porcine mtDNA) and real-time PCR using a commercially available kit (for identification of porcine DNA) were used to verify the selectivity and sensitivity of our duplex PCR. After optimization of DNA extraction and PCR methods, hard/soft pharmaceutical gelatin capsules (containing drug) were tested for the presence of porcine and/or bovine DNA. Duplex PCR detected the presence of as little as 0.1% porcine DNA, which was more accurate than the commercially available kit. Of all gelatin capsules tested (n = 24), 50% contained porcine DNA (pure porcine gelatin alone or in combination with bovine gelatin). Duplex PCR presents an easy-to-follow, quick, low-cost and reliable method to simultaneously detect porcine and bovine DNAs (>100 bp) in minute amounts in highly processed gelatin-containing pharmaceutical products (with a 0.1% sensitivity for porcine DNA) which may be used for halal authentication. Simultaneous detection of porcine and bovine DNA in gelatin capsules by duplex PCR.

  7. A General Comparison of SharePoint 2007 and SharePoint 2010

    DTIC Science & Technology

    2012-10-01

    rich as some dedicated Wiki offerings, e.g. Confluence, appropriately authorised users can collaboratively develop content. Unlike Wiki pages...Workspace 2010 uses Windows credentials instead of a Groove-specific logon for authenticating users, thus improving consistency with the rest of the Office...environment, such as authentication properties. In SharePoint 2010 the Business Data Connectivity service is the new version of SharePoint 2007’s Business

  8. Continuous-variable quantum authentication of physical unclonable keys

    NASA Astrophysics Data System (ADS)

    Nikolopoulos, Georgios M.; Diamanti, Eleni

    2017-04-01

    We propose a scheme for authentication of physical keys that are materialized by optical multiple-scattering media. The authentication relies on the optical response of the key when probed by randomly selected coherent states of light, and the use of standard wavefront-shaping techniques that direct the scattered photons coherently to a specific target mode at the output. The quadratures of the electromagnetic field of the scattered light at the target mode are analysed using a homodyne detection scheme, and the acceptance or rejection of the key is decided upon the outcomes of the measurements. The proposed scheme can be implemented with current technology and offers collision resistance and robustness against key cloning.

  9. A simple real-time polymerase chain reaction (PCR)-based assay for authentication of the Chinese Panax ginseng cultivar Damaya from a local ginseng population.

    PubMed

    Wang, H; Wang, J; Li, G

    2016-06-27

    Panax ginseng is one of the most important medicinal plants in the Orient. Owing to its increasing demand in the world market, cultivated ginseng has become the main source of medicinal material. Among the Chinese ginseng cultivars, Damaya commands higher prices and is grown in significant proportions among the local ginseng population. Due to the lack of rapid and accurate authentication methods, Damaya is distributed among different cultivars in the local ginseng population in China. Here, we identified a unique, Damaya-specific single nucleotide polymorphism (SNP) site present in the second intron of mitochondrial cytochrome c oxidase subunit 2 (cox2). Based on this SNP, a Damaya cultivar-specific primer was designed and an allele-specific polymerase chain reaction (PCR) was optimized for the effective molecular authentication of Damaya. We designed a method by combining a simple DNA isolation method with real-time allele-specific PCR using SYBR Green I fluorescent dye, and proved its efficacy in clearly discriminated Damaya cultivar from other Chinese ginseng cultivars according to the allelic discrimination analysis. Hence, this study provides a simple and rapid assay for the differentiation and conservation of Damaya from the local Chinese ginseng population.

  10. Authenticity screening of stained glass windows using optical spectroscopy

    PubMed Central

    Meulebroeck, Wendy; Wouters, Hilde; Nys, Karin; Thienpont, Hugo

    2016-01-01

    Civilized societies should safeguard their heritage as it plays an important role in community building. Moreover, past technologies often inspire new technology. Authenticity is besides conservation and restoration a key aspect in preserving our past, for example in museums when exposing showpieces. The classification of being authentic relies on an interdisciplinary approach integrating art historical and archaeological research complemented with applied research. In recent decades analytical dating tools are based on determining the raw materials used. However, the traditional applied non-portable, chemical techniques are destructive and time-consuming. Since museums oftentimes only consent to research actions which are completely non-destructive, optical spectroscopy might offer a solution. As a case-study we apply this technique on two stained glass panels for which the 14th century dating is nowadays questioned. With this research we were able to identify how simultaneous mapping of spectral signatures measured with a low cost optical spectrum analyser unveils information regarding the production period. The significance of this research extends beyond the re-dating of these panels to the 19th century as it provides an instant tool enabling immediate answering authenticity questions during the conservation process of stained glass, thereby providing the necessary data for solving deontological questions about heritage preservation. PMID:27883056

  11. Authenticity screening of stained glass windows using optical spectroscopy

    NASA Astrophysics Data System (ADS)

    Meulebroeck, Wendy; Wouters, Hilde; Nys, Karin; Thienpont, Hugo

    2016-11-01

    Civilized societies should safeguard their heritage as it plays an important role in community building. Moreover, past technologies often inspire new technology. Authenticity is besides conservation and restoration a key aspect in preserving our past, for example in museums when exposing showpieces. The classification of being authentic relies on an interdisciplinary approach integrating art historical and archaeological research complemented with applied research. In recent decades analytical dating tools are based on determining the raw materials used. However, the traditional applied non-portable, chemical techniques are destructive and time-consuming. Since museums oftentimes only consent to research actions which are completely non-destructive, optical spectroscopy might offer a solution. As a case-study we apply this technique on two stained glass panels for which the 14th century dating is nowadays questioned. With this research we were able to identify how simultaneous mapping of spectral signatures measured with a low cost optical spectrum analyser unveils information regarding the production period. The significance of this research extends beyond the re-dating of these panels to the 19th century as it provides an instant tool enabling immediate answering authenticity questions during the conservation process of stained glass, thereby providing the necessary data for solving deontological questions about heritage preservation.

  12. A biometric authentication model using hand gesture images.

    PubMed

    Fong, Simon; Zhuang, Yan; Fister, Iztok; Fister, Iztok

    2013-10-30

    A novel hand biometric authentication method based on measurements of the user's stationary hand gesture of hand sign language is proposed. The measurement of hand gestures could be sequentially acquired by a low-cost video camera. There could possibly be another level of contextual information, associated with these hand signs to be used in biometric authentication. As an analogue, instead of typing a password 'iloveu' in text which is relatively vulnerable over a communication network, a signer can encode a biometric password using a sequence of hand signs, 'i' , 'l' , 'o' , 'v' , 'e' , and 'u'. Subsequently the features from the hand gesture images are extracted which are integrally fuzzy in nature, to be recognized by a classification model for telling if this signer is who he claimed himself to be, by examining over his hand shape and the postures in doing those signs. It is believed that everybody has certain slight but unique behavioral characteristics in sign language, so are the different hand shape compositions. Simple and efficient image processing algorithms are used in hand sign recognition, including intensity profiling, color histogram and dimensionality analysis, coupled with several popular machine learning algorithms. Computer simulation is conducted for investigating the efficacy of this novel biometric authentication model which shows up to 93.75% recognition accuracy.

  13. The use of isotope ratios (13C/12C) for vegetable oils authentication

    NASA Astrophysics Data System (ADS)

    Cristea, G.; Magdas, D. A.; Mirel, V.

    2012-02-01

    Stable isotopes are now increasingly used for the control of the geographical origin or authenticity of food products. The falsification may be more or less sophisticated and its sophistication as well as its costs increases with the improvement of analytical methods. In this study 22 vegetable oils (olive, sunflower, palm, maize) commercialized on Romanian market were investigated by mean of δ13C in bulk oil and the obtained results were compared with those reported in literature in order to check the labeling of these natural products. The obtained results were in the range of the mean values found in the literature for these types of oils, thus providing their accurate labeling.

  14. Chemometrics Methods for Specificity, Authenticity and Traceability Analysis of Olive Oils: Principles, Classifications and Applications.

    PubMed

    Messai, Habib; Farman, Muhammad; Sarraj-Laabidi, Abir; Hammami-Semmar, Asma; Semmar, Nabil

    2016-11-17

    Olive oils (OOs) show high chemical variability due to several factors of genetic, environmental and anthropic types. Genetic and environmental factors are responsible for natural compositions and polymorphic diversification resulting in different varietal patterns and phenotypes. Anthropic factors, however, are at the origin of different blends' preparation leading to normative, labelled or adulterated commercial products. Control of complex OO samples requires their (i) characterization by specific markers; (ii) authentication by fingerprint patterns; and (iii) monitoring by traceability analysis. These quality control and management aims require the use of several multivariate statistical tools: specificity highlighting requires ordination methods; authentication checking calls for classification and pattern recognition methods; traceability analysis implies the use of network-based approaches able to separate or extract mixed information and memorized signals from complex matrices. This chapter presents a review of different chemometrics methods applied for the control of OO variability from metabolic and physical-chemical measured characteristics. The different chemometrics methods are illustrated by different study cases on monovarietal and blended OO originated from different countries. Chemometrics tools offer multiple ways for quantitative evaluations and qualitative control of complex chemical variability of OO in relation to several intrinsic and extrinsic factors.

  15. Mathematics authentic assessment on statistics learning: the case for student mini projects

    NASA Astrophysics Data System (ADS)

    Fauziah, D.; Mardiyana; Saputro, D. R. S.

    2018-03-01

    Mathematics authentic assessment is a form of meaningful measurement of student learning outcomes for the sphere of attitude, skill and knowledge in mathematics. The construction of attitude, skill and knowledge achieved through the fulfilment of tasks which involve active and creative role of the students. One type of authentic assessment is student mini projects, started from planning, data collecting, organizing, processing, analysing and presenting the data. The purpose of this research is to learn the process of using authentic assessments on statistics learning which is conducted by teachers and to discuss specifically the use of mini projects to improving students’ learning in the school of Surakarta. This research is an action research, where the data collected through the results of the assessments rubric of student mini projects. The result of data analysis shows that the average score of rubric of student mini projects result is 82 with 96% classical completeness. This study shows that the application of authentic assessment can improve students’ mathematics learning outcomes. Findings showed that teachers and students participate actively during teaching and learning process, both inside and outside of the school. Student mini projects also provide opportunities to interact with other people in the real context while collecting information and giving presentation to the community. Additionally, students are able to exceed more on the process of statistics learning using authentic assessment.

  16. Perceptions about Authentic Leadership Development: South African Occupational Therapy Students' Camp Experience

    PubMed Central

    2018-01-01

    Background Twenty-three years into democracy, concern is deepening regarding the slow progress of Occupational Therapy (OT) in South Africa, especially with regard to diversity and inclusion within OT. Methods This study explores authentic leadership development primarily among Black OT students attending a pilot Occupational Therapy Association of South Africa (OTASA) National Student Leadership Camp. It seeks to ascertain their perceptions on leadership and leadership development. This descriptive pilot study employs in-depth interviews and subsequent content analysis, with 12 OT students from six university OT programs in South Africa. Findings Four categories of participant perceptions on authentic leadership development emerged from the analysis: (1) perceptions about oneself as a leader based on personal narrative, self-awareness, self-control, and psychological capital; (2) perceptions about others, specifically current leaders, with regard to their moral crisis, including continuing inequality, insincerity, greed, and selfishness; (3) goals and aspirations for leadership development via student camps; and (4) effects of leadership on the system. Conclusions Recommendations for future practice include promotion of storytelling as a means of personal reflection for authentic leadership development and focused investment in camps for developing student leadership skills and building authentic leadership knowledge. PMID:29770106

  17. Perceptions about Authentic Leadership Development: South African Occupational Therapy Students' Camp Experience.

    PubMed

    Hendricks, Fatima; Toth-Cohen, Susan

    2018-01-01

    Twenty-three years into democracy, concern is deepening regarding the slow progress of Occupational Therapy (OT) in South Africa, especially with regard to diversity and inclusion within OT. This study explores authentic leadership development primarily among Black OT students attending a pilot Occupational Therapy Association of South Africa (OTASA) National Student Leadership Camp. It seeks to ascertain their perceptions on leadership and leadership development. This descriptive pilot study employs in-depth interviews and subsequent content analysis, with 12 OT students from six university OT programs in South Africa. Four categories of participant perceptions on authentic leadership development emerged from the analysis: (1) perceptions about oneself as a leader based on personal narrative, self-awareness, self-control, and psychological capital; (2) perceptions about others, specifically current leaders, with regard to their moral crisis, including continuing inequality, insincerity, greed, and selfishness; (3) goals and aspirations for leadership development via student camps; and (4) effects of leadership on the system. Recommendations for future practice include promotion of storytelling as a means of personal reflection for authentic leadership development and focused investment in camps for developing student leadership skills and building authentic leadership knowledge.

  18. Authentic sheep meat in the European Union: Factors influencing and validating its unique meat quality.

    PubMed

    Erasmus, Sara W; Muller, Magdalena; Hoffman, Louwrens C

    2017-05-01

    Authentic meat products are gaining attention through their unique quality characteristics linked to their origin. Various factors are known to influence the quality of fresh meat. This review describes the different Protected Designation of Origin (PDO) and Protected Geographical Indication (PGI) lamb types and discusses the factors which influences its unique sensory and chemical characteristics. Flavour, aroma, texture and colour play an integral part in the sensory quality of denomination of origin fresh meat products. For authentic fresh sheep meat the sensory (as well as chemical) quality is largely influenced by diet followed by breed, age and gender. However, diet forms the link with the geographical area of origin, which together with the traditional production system and sheep breeds used, lends the product its authentic nature. This review shows how diet linked to origin can affect the quality of the meat and furthermore how other factors such as breed can also have an effect. Research relating to the authentic lamb types were evaluated and the shortcomings highlighted in order to assist with the development of PDO and PGI specifications in the future. © 2016 Society of Chemical Industry. © 2016 Society of Chemical Industry.

  19. Online guideline assist in intensive care medicine--is the login-authentication a sufficient trigger for reminders?

    PubMed

    Röhrig, Rainer; Meister, Markus; Michel-Backofen, Achim; Sedlmayr, Martin; Uphus, Dirk; Katzer, Christian; Rose, Thomas

    2006-01-01

    Rising cost pressure due to the implementation of the DRG-System and quality assurance lead to an increased use of therapy standards and standard operating procedures (SOPs) in intensive care medicine. The intention of the German Scientific Society supported project "OLGA" (Online Guideline Assist) is to develop a prototype of a knowledge based system supporting physicians of an intensive care unit in recognizing the indication for and selecting a specific guideline or SOP. While the response of the prototype on user entries can be displayed as a signal on the used workstation itself, the location and time for a reminder of scheduled or missed procedures or reactions to imported information is a difficult issue. One possible approach to this task is the display of non acknowledged reminders or recommendations while logging on to a system. The objective of this study is to analyse user behaviour of the physicians working on the surgical intensive care unit to decide whether the login authentication is a sufficient trigger for clinical reminding. The surgical intensive care unit examined in this study comprises 14 beds. Medical care is provided by physicians working in shifts 24 hours a day, 7 days a week, with two anaesthetists at a time and an additional senior consultant during daytime. The entire documentation (examinations, medication, orders, care) is performed using the patient data management system ICUData. The authentication process of the physicians was logged and analysed. Throughout the observation period from December 13th 2005 to January 11th 2006 3563 physician logins were counted in total. The mean span between logins was in 11.3 minutes (SD 14.4), the median 7 minutes. The 75% centile was 14 minutes, the 95% centile 38 min. Intervals greater than 60 minutes occurred in 75%, and greater than 90 minutes in 25% of the days. It seems reasonable that reminders sent during authentication are able to enforce workflow compliance. It is possible to send notifications caused by external events to the physician depending on the importance of the event. Serious events with high urgency should be reliably passed using wireless pager or handheld technology. It seems that after the implementation of the prototype guideline assist further investigation is needed to monitor changes in authentication behaviour and reactions to the guideline advisory. This is also required to investigate the influence of unit's size, medical specialty and actual ward workload.

  20. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  1. Remote Authentication: The Obvia Solution.

    ERIC Educational Resources Information Center

    Eckley, Tami-Jo

    1999-01-01

    This article focuses on Obvia Corporation, a New York-based company that offers remote data access (RDA) through a server software system allowing for an easy, controllable, cost-effective management solution to the remote access problem. Using Obvia's RDA service, librarians can focus on administrative and professional decisions and spend more…

  2. Beyond Passwords: Usage and Policy Transformation

    DTIC Science & Technology

    2007-03-01

    case scenario for lost productivity due to users leaving their CAC at work, in their computer, is costing 261 work years per year with an estimated ...one for your CAC) are you currently using? ..................................................................................................... 43...PASSWORDS: USAGE AND POLICY TRANSFORMATION I. Introduction Background Currently , the primary method for network authentication on the

  3. Online Learning Integrity Approaches: Current Practices and Future Solutions

    ERIC Educational Resources Information Center

    Lee-Post, Anita; Hapke, Holly

    2017-01-01

    The primary objective of this paper is to help institutions respond to the stipulation of the Higher Education Opportunity Act of 2008 by adopting cost-effective academic integrity solutions without compromising the convenience and flexibility of online learning. Current user authentication solutions such as user ID and password, security…

  4. Power as an emotional liability: Implications for perceived authenticity and trust after a transgression.

    PubMed

    Kim, Peter H; Mislin, Alexandra; Tuncel, Ece; Fehr, Ryan; Cheshin, Arik; van Kleef, Gerben A

    2017-10-01

    People may express a variety of emotions after committing a transgression. Through 6 empirical studies and a meta-analysis, we investigate how the perceived authenticity of such emotional displays and resulting levels of trust are shaped by the transgressor's power. Past findings suggest that individuals with power tend to be more authentic because they have more freedom to act on the basis of their own personal inclinations. Yet, our findings reveal that (a) a transgressor's display of emotion is perceived to be less authentic when that party's power is high rather than low; (b) this perception of emotional authenticity, in turn, directly influences (and mediates) the level of trust in that party; and (c) perceivers ultimately exert less effort when asked to make a case for leniency toward high rather than low-power transgressors. This tendency to discount the emotional authenticity of the powerful was found to arise from power increasing the transgressor's perceived level of emotional control and strategic motivation, rather than a host of alternative mechanisms. These results were also found across different types of emotions (sadness, anger, fear, happiness, and neutral), expressive modalities, operationalizations of the transgression, and participant populations. Altogether, our findings demonstrate that besides the wealth of benefits power can afford, it also comes with a notable downside. The findings, furthermore, extend past research on perceived emotional authenticity, which has focused on how and when specific emotions are expressed, by revealing how this perception can depend on considerations that have nothing to do with the expression itself. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  5. A novel biometric authentication approach using ECG and EMG signals.

    PubMed

    Belgacem, Noureddine; Fournier, Régis; Nait-Ali, Amine; Bereksi-Reguig, Fethi

    2015-05-01

    Security biometrics is a secure alternative to traditional methods of identity verification of individuals, such as authentication systems based on user name and password. Recently, it has been found that the electrocardiogram (ECG) signal formed by five successive waves (P, Q, R, S and T) is unique to each individual. In fact, better than any other biometrics' measures, it delivers proof of subject's being alive as extra information which other biometrics cannot deliver. The main purpose of this work is to present a low-cost method for online acquisition and processing of ECG signals for person authentication and to study the possibility of providing additional information and retrieve personal data from an electrocardiogram signal to yield a reliable decision. This study explores the effectiveness of a novel biometric system resulting from the fusion of information and knowledge provided by ECG and EMG (Electromyogram) physiological recordings. It is shown that biometrics based on these ECG/EMG signals offers a novel way to robustly authenticate subjects. Five ECG databases (MIT-BIH, ST-T, NSR, PTB and ECG-ID) and several ECG signals collected in-house from volunteers were exploited. A palm-based ECG biometric system was developed where the signals are collected from the palm of the subject through a minimally intrusive one-lead ECG set-up. A total of 3750 ECG beats were used in this work. Feature extraction was performed on ECG signals using Fourier descriptors (spectral coefficients). Optimum-Path Forest classifier was used to calculate the degree of similarity between individuals. The obtained results from the proposed approach look promising for individuals' authentication.

  6. A cost-effective add-on-value card-assisted firewall over Taiwan's NHI VPN framework.

    PubMed

    Huang, Jyh-Win; Hou, Ting-Wei

    2007-06-01

    Besides the overall budget for building the infrastructure of a healthcare-service-based virtual private network (VPN) in Taiwan, two issues were considered critical for its acceptance by the country's 17,000 plus medical institutions. One was who was to pay for the network (ADSL or modem) connection fee; the other was who was to pay for the firewall/anti-virus software. This paper addresses the second issue by proposing an efficient freeware firewall, named card-assisted firewall (CAF), for NHI VPN edge-hosts, which is also an add-on-value application of the National Healthcare IC card that every insurant and medical professional has. The innovative concept is that any NHI VPN site (edge-host) can establish diversified secure-authenticated connections with other sites only by an authentication mechanism, which requires a NHI Java card state machine and the Access Control List of the host. It is different from two-factor authentication cards in four ways: (1) a PIN code is not a must; (2) it requires authentication with the remote IC card Data Centre; (3) the NHI cards are already available, no modification is needed, and there is no further cost for the deployment of the cards; (4) although the cards are in the reader, the communication cannot start unless the cards are in the corresponding states; i.e. the states allow communication. An implementation, on a Microsoft Windows XP platform, demonstrated the system's feasibility over an emulation of the NHI VPN framework. It maintained a high line speed, the driver took up 39 KB of disk space, installation was simple, not requiring any extra hardware or software, and the average packet processing time of the CAF driver measured was 0.3084 ms. The average overhead in comparing the Access Control List predefined routing in card, in an FTP testing experiment, was 5.7 micros (receiving) and 8 micros (sending).

  7. Nuclear disarmament verification via resonant phenomena.

    PubMed

    Hecla, Jake J; Danagoulian, Areg

    2018-03-28

    Nuclear disarmament treaties are not sufficient in and of themselves to neutralize the existential threat of the nuclear weapons. Technologies are necessary for verifying the authenticity of the nuclear warheads undergoing dismantlement before counting them toward a treaty partner's obligation. Here we present a concept that leverages isotope-specific nuclear resonance phenomena to authenticate a warhead's fissile components by comparing them to a previously authenticated template. All information is encrypted in the physical domain in a manner that amounts to a physical zero-knowledge proof system. Using Monte Carlo simulations, the system is shown to reveal no isotopic or geometric information about the weapon, while readily detecting hoaxing attempts. This nuclear technique can dramatically increase the reach and trustworthiness of future nuclear disarmament treaties.

  8. Authentication of the botanical origin of Western herbal products using Cimicifuga and Vitex products as examples.

    PubMed

    Masada, Sayaka

    2016-07-01

    Various herbal medicines have been developed and used in various parts of the world for thousands of years. Although locally grown indigenous plants were originally used for traditional herbal preparations, Western herbal products are now becoming popular in Japan with the increasing interest in health. At the same time, there are growing concerns about the substitution of ingredients and adulteration of herbal products, highlighting the need for the authentication of the origin of plants used in herbal products. This review describes studies on Cimicifuga and Vitex products developed in Europe and Japan, focusing on establishing analytical methods to evaluate the origins of material plants and finished products. These methods include a polymerase chain reaction-restriction fragment length polymorphism method and a multiplex amplification refractory mutation system method. A genome-based authentication method and liquid chromatography-mass spectrometry-based authentication for black cohosh products, and the identification of two characteristic diterpenes of agnus castus fruit and a shrub chaste tree fruit-specific triterpene derivative are also described.

  9. Analytical methods used for the authentication of food of animal origin.

    PubMed

    Abbas, Ouissam; Zadravec, Manuela; Baeten, Vincent; Mikuš, Tomislav; Lešić, Tina; Vulić, Ana; Prpić, Jelena; Jemeršić, Lorena; Pleadin, Jelka

    2018-04-25

    Since adulteration can have serious consequences on human health, it affects market growth by destroying consumer confidence. Therefore, authentication of food is important for food processors, retailers and consumers, but also for regulatory authorities. However, a complex nature of food and an increase in types of adulterants make their detection difficult, so that food authentication often poses a challenge. This review focuses on analytical approaches to authentication of food of animal origin, with an emphasis put on determination of specific ingredients, geographical origin and adulteration by virtue of substitution. This review highlights a current overview of the application of target approaches in cases when the compound of interest is known and non-target approaches for screening issues. Papers cited herein mainly concern milk, cheese, meat and honey. Moreover, advantages, disadvantages as well as challenges regarding the use of both approaches in official food control but also in food industry are investigated. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. WLC Preface

    NASA Astrophysics Data System (ADS)

    Miret, Josep M.; Sebé, Francesc

    Low-cost devices are the key component of several applications: RFID tags permit an automated supply chain management while smart cards are a secure means of storing cryptographic keys required for remote and secure authentication in e-commerce and e-government applications. These devices must be cheap in order to permit their cost-effective massive manufacturing and deployment. Unfortunately, their low cost limits their computational power. Other devices such as nodes of sensor networks suffer from an additional constraint, namely, their limited battery life. Secure applications designed for these devices cannot make use of classical cryptographic primitives designed for full-fledged computers.

  11. Barcoding Melting Curve Analysis for Rapid, Sensitive, and Discriminating Authentication of Saffron (Crocus sativus L.) from Its Adulterants

    PubMed Central

    Cao, Liang; Yuan, Yuan; Chen, Min; Jin, Yan; Huang, Luqi

    2014-01-01

    Saffron (Crocus sativus L.) is one of the most important and expensive medicinal spice products in the world. Because of its high market value and premium price, saffron is often adulterated through the incorporation of other materials, such as Carthamus tinctorius L. and Calendula officinalis L. flowers, Hemerocallis L. petals, Daucus carota L. fleshy root, Curcuma longa L. rhizomes, Zea may L., and Nelumbo nucifera Gaertn. stigmas. To develop a straightforward, nonsequencing method for rapid, sensitive, and discriminating detection of these adulterants in traded saffron, we report here the application of a barcoding melting curve analysis method (Bar-MCA) that uses the universal chloroplast plant DNA barcoding region trnH-psbA to identify adulterants. When amplified at DNA concentrations and annealing temperatures optimized for the curve analysis, peaks were formed at specific locations for saffron (81.92°C) and the adulterants: D. carota (81.60°C), C. tinctorius (80.10°C), C. officinalis (79.92°C), Dendranthema morifolium (Ramat.) Tzvel. (79.62°C), N. nucifera (80.58°C), Hemerocallis fulva (L.) L. (84.78°C), and Z. mays (84.33°C). The constructed melting curves for saffron and its adulterants have significantly different peak locations or shapes. In conclusion, Bar-MCA could be a faster and more cost-effective method to authenticate saffron and detect its adulterants. PMID:25548775

  12. Barcoding melting curve analysis for rapid, sensitive, and discriminating authentication of saffron (Crocus sativus L.) from its adulterants.

    PubMed

    Jiang, Chao; Cao, Liang; Yuan, Yuan; Chen, Min; Jin, Yan; Huang, Luqi

    2014-01-01

    Saffron (Crocus sativus L.) is one of the most important and expensive medicinal spice products in the world. Because of its high market value and premium price, saffron is often adulterated through the incorporation of other materials, such as Carthamus tinctorius L. and Calendula officinalis L. flowers, Hemerocallis L. petals, Daucus carota L. fleshy root, Curcuma longa L. rhizomes, Zea may L., and Nelumbo nucifera Gaertn. stigmas. To develop a straightforward, nonsequencing method for rapid, sensitive, and discriminating detection of these adulterants in traded saffron, we report here the application of a barcoding melting curve analysis method (Bar-MCA) that uses the universal chloroplast plant DNA barcoding region trnH-psbA to identify adulterants. When amplified at DNA concentrations and annealing temperatures optimized for the curve analysis, peaks were formed at specific locations for saffron (81.92°C) and the adulterants: D. carota (81.60°C), C. tinctorius (80.10°C), C. officinalis (79.92°C), Dendranthema morifolium (Ramat.) Tzvel. (79.62°C), N. nucifera (80.58°C), Hemerocallis fulva (L.) L. (84.78°C), and Z. mays (84.33°C). The constructed melting curves for saffron and its adulterants have significantly different peak locations or shapes. In conclusion, Bar-MCA could be a faster and more cost-effective method to authenticate saffron and detect its adulterants.

  13. Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way

    NASA Astrophysics Data System (ADS)

    Cui, Yank; Kobara, Kazukuni; Matsuura, Kanta; Imai, Hideki

    As pervasive computing technologies develop fast, the privacy protection becomes a crucial issue and needs to be coped with very carefully. Typically, it is difficult to efficiently identify and manage plenty of the low-cost pervasive devices like Radio Frequency Identification Devices (RFID), without leaking any privacy information. In particular, the attacker may not only eavesdrop the communication in a passive way, but also mount an active attack to ask queries adaptively, which is obviously more dangerous. Towards settling this problem, in this paper, we propose two lightweight authentication protocols which are privacy-preserving against active attack, in an asymmetric way. That asymmetric style with privacy-oriented simplification succeeds to reduce the load of low-cost devices and drastically decrease the computation cost for the management of server. This is because that, unlike the usual management of the identities, our approach does not require any synchronization nor exhaustive search in the database, which enjoys great convenience in case of a large-scale system. The protocols are based on a fast asymmetric encryption with specialized simplification and only one cryptographic hash function, which consequently assigns an easy work to pervasive devices. Besides, our results do not require the strong assumption of the random oracle.

  14. Combined use of isotopic fingerprint and metabolomics analysis for the authentication of saw palmetto (Serenoa repens) extracts.

    PubMed

    Perini, Matteo; Paolini, Mauro; Camin, Federica; Appendino, Giovanni; Vitulo, Francesca; De Combarieu, Eric; Sardone, Nicola; Martinelli, Ernesto Marco; Pace, Roberto

    2018-04-22

    Saw palmetto (Serenoa repens, SP) is the most expensive oil source of the pharmaceutical and healthfood market, and its high cost and recurrent shortages have spurred the development of designer blends of fatty acids to mimic its phytochemical profile and fraudulently comply with the current authentication assays. To detect this adulteration, the combined use of isotopic fingerprint and omic analysis has been investigated, using Principal Component Analysis (PCA) to handle the complex databases generated by these techniques and to identify the possible source of the adulterants. Surprisingly, the presence of fatty acids of animal origin turned out to be widespread in commercial samples of saw palmetto oil. Copyright © 2018 Elsevier B.V. All rights reserved.

  15. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

    NASA Astrophysics Data System (ADS)

    Desmedt, Yvo; Lange, Tanja; Burmester, Mike

    Task-specific groups are often formed in an ad-hoc manner within large corporate structures, such as companies. Take the following typical scenario: A director decides to set up a task force group for some specific project. An order is passed down the hierarchy where it finally reaches a manager who selects some employees to form the group. The members should communicate in a secure way and for efficiency, a symmetric encryption system is chosen. To establish a joint secret key for the group, a group key exchange (GKE) protocol is used. We show how to use an existing Public Key Infrastructure (PKI) to achieve authenticated GKE by modifying the protocol and particularly by including signatures.

  16. Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systems.

    PubMed

    Lee, Tian-Fu

    2014-12-01

    Telecare medicine information systems provide a communicating platform for accessing remote medical resources through public networks, and help health care workers and medical personnel to rapidly making correct clinical decisions and treatments. An authentication scheme for data exchange in telecare medicine information systems enables legal users in hospitals and medical institutes to establish a secure channel and exchange electronic medical records or electronic health records securely and efficiently. This investigation develops an efficient and secure verified-based three-party authentication scheme by using extended chaotic maps for data exchange in telecare medicine information systems. The proposed scheme does not require server's public keys and avoids time-consuming modular exponential computations and scalar multiplications on elliptic curve used in previous related approaches. Additionally, the proposed scheme is proven secure in the random oracle model, and realizes the lower bounds of messages and rounds in communications. Compared to related verified-based approaches, the proposed scheme not only possesses higher security, but also has lower computational cost and fewer transmissions. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  17. Banknote authentication using chaotic elements technology

    NASA Astrophysics Data System (ADS)

    Ambadiyil, Sajan; P. S., Krishnendu; Mahadevan Pillai, V. P.; Prabhu, Radhakrishna

    2017-10-01

    The counterfeit banknote is a growing threat to the society since the advancements in the field of computers, scanners and photocopiers, as they have made the duplication process for banknote much simpler. The fake note detection systems developed so far have many drawbacks such as high cost, poor accuracy, unavailability, lack of user-friendliness and lower effectiveness. One possible solution to this problem could be the use of a system uniquely linked to the banknote itself. In this paper, we present a unique identification and authentication process for the banknote using chaotic elements embedded in it. A chaotic element means that the physical elements are formed from a random process independent from human intervention. The chaotic elements used in this paper are the random distribution patterns of such security fibres set into the paper pulp. A unique ID is generated from the fibre pattern obtained from UV image of the note, which can be verified by any person who receives the banknote to decide whether the banknote is authentic or not. Performance analysis of the system is also studied in this paper.

  18. A biometric authentication model using hand gesture images

    PubMed Central

    2013-01-01

    A novel hand biometric authentication method based on measurements of the user’s stationary hand gesture of hand sign language is proposed. The measurement of hand gestures could be sequentially acquired by a low-cost video camera. There could possibly be another level of contextual information, associated with these hand signs to be used in biometric authentication. As an analogue, instead of typing a password ‘iloveu’ in text which is relatively vulnerable over a communication network, a signer can encode a biometric password using a sequence of hand signs, ‘i’ , ‘l’ , ‘o’ , ‘v’ , ‘e’ , and ‘u’. Subsequently the features from the hand gesture images are extracted which are integrally fuzzy in nature, to be recognized by a classification model for telling if this signer is who he claimed himself to be, by examining over his hand shape and the postures in doing those signs. It is believed that everybody has certain slight but unique behavioral characteristics in sign language, so are the different hand shape compositions. Simple and efficient image processing algorithms are used in hand sign recognition, including intensity profiling, color histogram and dimensionality analysis, coupled with several popular machine learning algorithms. Computer simulation is conducted for investigating the efficacy of this novel biometric authentication model which shows up to 93.75% recognition accuracy. PMID:24172288

  19. Expansive Openness in Teacher Practice

    ERIC Educational Resources Information Center

    Kimmons, Royce

    2016-01-01

    Background/Context: Previous work on the use of open educational resources in K-12 classrooms has generally focused on issues related to cost. The current study takes a more expansive view of openness that also accounts for adaptation and sharing in authentic classroom contexts. Purpose/Objective/Research Question/Focus of Study The study seeks to…

  20. Automating individualized coaching and authentic role-play practice for brief intervention training.

    PubMed

    Hayes-Roth, B; Saker, R; Amano, K

    2010-01-01

    Brief intervention helps to reduce alcohol abuse, but there is a need for accessible, cost-effective training of clinicians. This study evaluated STAR Workshop , a web-based training system that automates efficacious techniques for individualized coaching and authentic role-play practice. We compared STAR Workshop to a web-based, self-guided e-book and a no-treatment control, for training the Engage for Change (E4C) brief intervention protocol. Subjects were medical and nursing students. Brief written skill probes tested subjects' performance of individual protocol steps, in different clinical scenarios, at three test times: pre-training, post-training, and post-delay (two weeks). Subjects also did live phone interviews with a standardized patient, post-delay. STAR subjects performed significantly better than both other groups. They showed significantly greater improvement from pre-training probes to post-training and post-delay probes. They scored significantly higher on post-delay phone interviews. STAR Workshop appears to be an accessible, cost-effective approach for training students to use the E4C protocol for brief intervention in alcohol abuse. It may also be useful for training other clinical interviewing protocols.

  1. Benefits and Limitations of DNA Barcoding and Metabarcoding in Herbal Product Authentication

    PubMed Central

    Raclariu, Ancuta Cristina; Heinrich, Michael; Ichim, Mihael Cristin

    2017-01-01

    Abstract Introduction Herbal medicines play an important role globally in the health care sector and in industrialised countries they are often considered as an alternative to mono‐substance medicines. Current quality and authentication assessment methods rely mainly on morphology and analytical phytochemistry‐based methods detailed in pharmacopoeias. Herbal products however are often highly processed with numerous ingredients, and even if these analytical methods are accurate for quality control of specific lead or marker compounds, they are of limited suitability for the authentication of biological ingredients. Objective To review the benefits and limitations of DNA barcoding and metabarcoding in complementing current herbal product authentication. Method Recent literature relating to DNA based authentication of medicinal plants, herbal medicines and products are summarised to provide a basic understanding of how DNA barcoding and metabarcoding can be applied to this field. Results Different methods of quality control and authentication have varying resolution and usefulness along the value chain of these products. DNA barcoding can be used for authenticating products based on single herbal ingredients and DNA metabarcoding for assessment of species diversity in processed products, and both methods should be used in combination with appropriate hyphenated chemical methods for quality control. Conclusions DNA barcoding and metabarcoding have potential in the context of quality control of both well and poorly regulated supply systems. Standardisation of protocols for DNA barcoding and DNA sequence‐based identification are necessary before DNA‐based biological methods can be implemented as routine analytical approaches and approved by the competent authorities for use in regulated procedures. © 2017 The Authors. Phytochemical Analysis Published by John Wiley & Sons Ltd. PMID:28906059

  2. Benefits and Limitations of DNA Barcoding and Metabarcoding in Herbal Product Authentication.

    PubMed

    Raclariu, Ancuta Cristina; Heinrich, Michael; Ichim, Mihael Cristin; de Boer, Hugo

    2018-03-01

    Herbal medicines play an important role globally in the health care sector and in industrialised countries they are often considered as an alternative to mono-substance medicines. Current quality and authentication assessment methods rely mainly on morphology and analytical phytochemistry-based methods detailed in pharmacopoeias. Herbal products however are often highly processed with numerous ingredients, and even if these analytical methods are accurate for quality control of specific lead or marker compounds, they are of limited suitability for the authentication of biological ingredients. To review the benefits and limitations of DNA barcoding and metabarcoding in complementing current herbal product authentication. Recent literature relating to DNA based authentication of medicinal plants, herbal medicines and products are summarised to provide a basic understanding of how DNA barcoding and metabarcoding can be applied to this field. Different methods of quality control and authentication have varying resolution and usefulness along the value chain of these products. DNA barcoding can be used for authenticating products based on single herbal ingredients and DNA metabarcoding for assessment of species diversity in processed products, and both methods should be used in combination with appropriate hyphenated chemical methods for quality control. DNA barcoding and metabarcoding have potential in the context of quality control of both well and poorly regulated supply systems. Standardisation of protocols for DNA barcoding and DNA sequence-based identification are necessary before DNA-based biological methods can be implemented as routine analytical approaches and approved by the competent authorities for use in regulated procedures. © 2017 The Authors. Phytochemical Analysis Published by John Wiley & Sons Ltd. © 2017 The Authors. Phytochemical Analysis Published by John Wiley & Sons Ltd.

  3. Effectiveness of medicines authentication technology to detect counterfeit, recalled and expired medicines: a two-stage quantitative secondary care study

    PubMed Central

    Naughton, Bernard; Roberts, Lindsey; Dopson, Sue; Chapman, Stephen; Brindley, David

    2016-01-01

    Objectives To identify the authentication and detection rate of serialised medicines using medicines authentication technology. Design and intervention 4192 serialised medicines were entered into a hospital dispensary over two separate 8-week stages in 2015. Medicines were authenticated using secure external database cross-checking, triggered by the scanning of a two-dimensional data matrix with a unit specific 12-digit serial code. 4% of medicines included were preprogrammed with a message to identify the product as either expired, pack recalled, product recalled or counterfeit. Setting A site within a large UK National Health Service teaching hospital trust. Participants Accredited checking staff, pharmacists and dispensers in a pharmacy department. Primary outcome measures Authentication and detection rate of counterfeit expired and recalled medicines. Results The operational detection rate of counterfeit, recalled and expired medicines scanned as a combined group was 81.4% (stage 1 (S1)) and 87% (stage 2 (S2)). The technology's technical detection rate (TDR) was 100%; however, not all medicines were scanned and of those that were scanned not all that generated a warning message were quarantined. Owing to an operational authentication rate (OAR) of 66.3% (over both stages), only 31.8% of counterfeit medicines, 58% of recalled drugs and 64% of expired medicines were detected as a proportion of those entered into the study. Response times (RTs) of 152 ms (S1) and 165 ms (S2) were recorded, meeting the falsified medicines directive-mandated 300 ms limit. Conclusions TDRs and RTs were not a limiting factor in this study. The suboptimal OAR poses significant quality and safety issues with this detection approach. Authentication at the checking stage, however, demonstrated higher OARs. There is a need for further qualitative research to establish the reasons for less than absolute authentication and detection rates in the hospital environment to improve this technology in preparation for the incumbent European Union regulative deadline. PMID:27940634

  4. Molecular beacon-based real-time PCR method for detection of porcine DNA in gelatin and gelatin capsules.

    PubMed

    Mohamad, Nurhidayatul Asma; Mustafa, Shuhaimi; Khairil Mokhtar, Nur Fadhilah; El Sheikha, Aly Farag

    2018-03-05

    The pharmaceutical industry has boosted gelatin consumption worldwide. This is supported by the availability of cost-effective gelatin production from porcine by-products. However, cross-contamination of gelatin materials, where porcine gelatin was unintentionally included in the other animal sources of gelatin, has caused significant concerns about halal authenticity. The real-time polymerase chain reaction (PCR) has enabled a highly specific and sensitive animal species detection method in various food products. Hence, such a technique was employed in the present study to detect and quantify porcine DNA in gelatin using a molecular beacon probe, with differences in performance between mitochondrial (cytochrome b gene) and chromosomal DNA-(MPRE42 repetitive element) based porcine-specific PCR assays being compared. A higher sensitivity was observed in chromosomal DNA (MPRE-PCR assay), where this assay allows the detection of gelatin DNA at amounts as as low as 1 pg, whereas mitochondrial DNA (CBH-PCR assay) can only detect at levels down to 10 pg of gelatin DNA. When an analysis with commercial gelatin and gelatin capsule samples was conducted, the same result was observed, with a significantly more sensitive detection being provided by the repetitive element of chromosomal DNA. The present study has established highly sensitive DNA-based porcine detection systems derived from chromosomal DNA that are feasible for highly processed products such as gelatin and gelatin capsules containing a minute amount of DNA. This sensitive detection method can also be implemented to assist the halal authentication process of various food products available on the market. © 2018 Society of Chemical Industry. © 2018 Society of Chemical Industry.

  5. Chemometrics Methods for Specificity, Authenticity and Traceability Analysis of Olive Oils: Principles, Classifications and Applications

    PubMed Central

    Messai, Habib; Farman, Muhammad; Sarraj-Laabidi, Abir; Hammami-Semmar, Asma; Semmar, Nabil

    2016-01-01

    Background. Olive oils (OOs) show high chemical variability due to several factors of genetic, environmental and anthropic types. Genetic and environmental factors are responsible for natural compositions and polymorphic diversification resulting in different varietal patterns and phenotypes. Anthropic factors, however, are at the origin of different blends’ preparation leading to normative, labelled or adulterated commercial products. Control of complex OO samples requires their (i) characterization by specific markers; (ii) authentication by fingerprint patterns; and (iii) monitoring by traceability analysis. Methods. These quality control and management aims require the use of several multivariate statistical tools: specificity highlighting requires ordination methods; authentication checking calls for classification and pattern recognition methods; traceability analysis implies the use of network-based approaches able to separate or extract mixed information and memorized signals from complex matrices. Results. This chapter presents a review of different chemometrics methods applied for the control of OO variability from metabolic and physical-chemical measured characteristics. The different chemometrics methods are illustrated by different study cases on monovarietal and blended OO originated from different countries. Conclusion. Chemometrics tools offer multiple ways for quantitative evaluations and qualitative control of complex chemical variability of OO in relation to several intrinsic and extrinsic factors. PMID:28231172

  6. System and method for authentication

    DOEpatents

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  7. Authentic Teachers: Student Criteria Perceiving Authenticity of Teachers

    ERIC Educational Resources Information Center

    De Bruyckere, Pedro; Kirschner, Paul A.

    2016-01-01

    Authenticity is seen by many as a key for good learning and education. There is talk of authentic instruction, authentic learning, authentic problems, authentic assessment, authentic tools and authentic teachers. The problem is that while authenticity is an often-used adjective describing almost all aspects of teaching and learning, the concept…

  8. Immunofluorescence Technique Using HeLa Cells Expressing Recombinant Nucleoprotein for Detection of Immunoglobulin G Antibodies to Crimean-Congo Hemorrhagic Fever Virus

    PubMed Central

    Saijo, Masayuki; Qing, Tang; Niikura, Masahiro; Maeda, Akihiko; Ikegami, Tetsuro; Sakai, Koji; Prehaud, Christophe; Kurane, Ichiro; Morikawa, Shigeru

    2002-01-01

    A HeLa cell line continuously expressing recombinant nucleoprotein (rNP) of the Crimean-Congo hemorrhagic fever virus (CCHFV) was established by transfection with an expression vector containing the cDNA of CCHFV NP (pKS336-CCHFV-NP). These cells were used as antigens for indirect immunofluorescence (IF) to detect immunoglobulin G antibodies to CCHFV. The sensitivity and specificity of this IF technique were examined by using serum samples and were compared to those of the IF technique using CCHFV-infected Vero E6 cells (authentic antigen). Staining of the CCHFV rNP expressed in HeLa cells showed a unique granular pattern similar to that of CCHFV-infected Vero E6 cells. Positive staining could easily be distinguished from a negative result. All 13 serum samples determined to be positive by using the authentic antigen were also determined to be positive by using CCHFV rNP-expressing HeLa cells (recombinant antigen). The 108 serum samples determined to be negative by using the authentic antigen were also determined to be negative by using the recombinant antigen. Thus, both the sensitivity and the specificity of this IF technique were 100% compared to the IF with authentic antigen. The novel IF technique using CCHFV rNP-expressing HeLa cells can be used not only for diagnosis of CCHF but also for epidemiological studies on CCHFV infections. PMID:11825944

  9. Enhancing the authenticity of assessments through grounding in first impressions.

    PubMed

    Humă, Bogdana

    2015-09-01

    This article examines first impressions through a discursive and interactional lens. Until now, social psychologists have studied first impressions in laboratory conditions, in isolation from their natural environment, thus overseeing their discursive roles as devices for managing situated interactional concerns. I examine fragments of text and talk in which individuals spontaneously invoke first impressions of other persons as part of assessment activities in settings where the authenticity of speakers' stances might be threatened: (1) in activities with inbuilt evaluative components and (2) in sequential contexts where recipients have been withholding affiliation to speakers' actions. I discuss the relationship between authenticity, as a type of credibility issue related to intersubjective trouble, and the characteristics of first impression assessments, which render them useful for dealing with this specific credibility concern. I identify four features of first impression assessments which make them effective in enhancing authenticity: witness positioning (Potter, 1996, Representing reality: Discourse, rhetoric and social construction, Sage, London), (dis)location in time and space, automaticity, and extreme formulations (Edwards, 2003, Analyzing race talk: Multidisciplinary perspectives on the research interview, Cambridge University Press, New York). © 2014 The British Psychological Society.

  10. Development and Preliminary Impacts of the Implementation of an Authentic Research-Based Experiment in General Chemistry

    ERIC Educational Resources Information Center

    Tomasik, Janice Hall; Cottone, Katelyn E.; Heethuis, Mitchell T.; Mueller, Anja

    2013-01-01

    Incorporating research-based lab activities into general chemistry at a large university can be challenging, considering the high enrollments and costs typically associated with the courses. Performing sweeping curricular overhauls of the general chemistry laboratory can be difficult, and in some cases discouraged, as many would rather maintain…

  11. Classification and authentication of unknown water samples using machine learning algorithms.

    PubMed

    Kundu, Palash K; Panchariya, P C; Kundu, Madhusree

    2011-07-01

    This paper proposes the development of water sample classification and authentication, in real life which is based on machine learning algorithms. The proposed techniques used experimental measurements from a pulse voltametry method which is based on an electronic tongue (E-tongue) instrumentation system with silver and platinum electrodes. E-tongue include arrays of solid state ion sensors, transducers even of different types, data collectors and data analysis tools, all oriented to the classification of liquid samples and authentication of unknown liquid samples. The time series signal and the corresponding raw data represent the measurement from a multi-sensor system. The E-tongue system, implemented in a laboratory environment for 6 numbers of different ISI (Bureau of Indian standard) certified water samples (Aquafina, Bisleri, Kingfisher, Oasis, Dolphin, and McDowell) was the data source for developing two types of machine learning algorithms like classification and regression. A water data set consisting of 6 numbers of sample classes containing 4402 numbers of features were considered. A PCA (principal component analysis) based classification and authentication tool was developed in this study as the machine learning component of the E-tongue system. A proposed partial least squares (PLS) based classifier, which was dedicated as well; to authenticate a specific category of water sample evolved out as an integral part of the E-tongue instrumentation system. The developed PCA and PLS based E-tongue system emancipated an overall encouraging authentication percentage accuracy with their excellent performances for the aforesaid categories of water samples. Copyright © 2011 ISA. Published by Elsevier Ltd. All rights reserved.

  12. Restricted Authentication and Encryption for Cyber-physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kirkpatrick, Michael S; Bertino, Elisa; Sheldon, Frederick T

    2009-01-01

    Cyber-physical systems (CPS) are characterized by the close linkage of computational resources and physical devices. These systems can be deployed in a number of critical infrastructure settings. As a result, the security requirements of CPS are different than traditional computing architectures. For example, critical functions must be identified and isolated from interference by other functions. Similarly, lightweight schemes may be required, as CPS can include devices with limited computing power. One approach that offers promise for CPS security is the use of lightweight, hardware-based authentication. Specifically, we consider the use of Physically Unclonable Functions (PUFs) to bind an access requestmore » to specific hardware with device-specific keys. PUFs are implemented in hardware, such as SRAM, and can be used to uniquely identify the device. This technology could be used in CPS to ensure location-based access control and encryption, both of which would be desirable for CPS implementations.« less

  13. Secure access to patient's health records using SpeechXRays a mutli-channel biometrics platform for user authentication.

    PubMed

    Spanakis, Emmanouil G; Spanakis, Marios; Karantanas, Apostolos; Marias, Kostas

    2016-08-01

    The most commonly used method for user authentication in ICT services or systems is the application of identification tools such as passwords or personal identification numbers (PINs). The rapid development in ICT technology regarding smart devices (laptops, tablets and smartphones) has allowed also the advance of hardware components that capture several biometric traits such as fingerprints and voice. These components are aiming among others to overcome weaknesses and flaws of password usage under the prism of improved user authentication with higher level of security, privacy and usability. To this respect, the potential application of biometrics for secure user authentication regarding access in systems with sensitive data (i.e. patient's data from electronic health records) shows great potentials. SpeechXRays aims to provide a user recognition platform based on biometrics of voice acoustics analysis and audio-visual identity verification. Among others, the platform aims to be applied as an authentication tool for medical personnel in order to gain specific access to patient's electronic health records. In this work a short description of SpeechXrays implementation tool regarding eHealth is provided and analyzed. This study explores security and privacy issues, and offers a comprehensive overview of biometrics technology applications in addressing the e-Health security challenges. We present and describe the necessary requirement for an eHealth platform concerning biometric security.

  14. Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.

    PubMed

    Das, Ashok Kumar; Wazid, Mohammad; Kumar, Neeraj; Khan, Muhammad Khurram; Choo, Kim-Kwang Raymond; Park, YoungHo

    2017-09-18

    Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health related information. Due to the nature and richness of the data collected by such devices, it is important to ensure the security of the collected data. This paper presents a new lightweight authentication scheme suitable for wearable device deployment. The scheme allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal (e.g., Android and iOS device) and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and the mobile terminal. The security of the proposed scheme is then demonstrated through the broadly-accepted Real-Or-Random model, as well as using the popular formal security verification tool, known as the Automated Validation of Internet Security Protocols and Applications (AVISPA). Finally, we present a comparative summary of the proposed scheme in terms of the overheads such as computation and communication costs, security and functionality features of the proposed scheme and related schemes, and also the evaluation findings from the NS2 simulation.

  15. UNIX security in a supercomputing environment

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1989-01-01

    The author critiques some security mechanisms in most versions of the Unix operating system and suggests more effective tools that either have working prototypes or have been implemented, for example in secure Unix systems. Although no computer (not even a secure one) is impenetrable, breaking into systems with these alternate mechanisms will cost more, require more skill, and be more easily detected than penetrations of systems without these mechanisms. The mechanisms described fall into four classes (with considerable overlap). User authentication at the local host affirms the identity of the person using the computer. The principle of least privilege dictates that properly authenticated users should have rights precisely sufficient to perform their tasks, and system administration functions should be compartmentalized; to this end, access control lists or capabilities should either replace or augment the default Unix protection system, and mandatory access controls implementing multilevel security models and integrity mechanisms should be available. Since most users access supercomputing environments using networks, the third class of mechanisms augments authentication (where feasible). As no security is perfect, the fourth class of mechanism logs events that may indicate possible security violations; this will allow the reconstruction of a successful penetration (if discovered), or possibly the detection of an attempted penetration.

  16. R2NA: Received Signal Strength (RSS) Ratio-Based Node Authentication for Body Area Network

    PubMed Central

    Wu, Yang; Wang, Kai; Sun, Yongmei; Ji, Yuefeng

    2013-01-01

    The body area network (BAN) is an emerging branch of wireless sensor networks for personalized applications. The services in BAN usually have a high requirement on security, especially for the medical diagnosis. One of the fundamental directions to ensure security in BAN is how to provide node authentication. Traditional research using cryptography relies on prior secrets shared among nodes, which leads to high resource cost. In addition, most existing non-cryptographic solutions exploit out-of-band (OOB) channels, but they need the help of additional hardware support or significant modifications to the system software. To avoid the above problems, this paper presents a proximity-based node authentication scheme, which only uses wireless modules equipped on sensors. With only one sensor and one control unit (CU) in BAN, we could detect a unique physical layer characteristic, namely, the difference between the received signal strength (RSS) measured on different devices in BAN. Through the above-mentioned particular difference, we can tell whether the sender is close enough to be legitimate. We validate our scheme through both theoretical analysis and experiments, which are conducted on the real Shimmer nodes. The results demonstrate that our proposed scheme has a good security performance.

  17. Security challenge to using smartphones for SHM

    NASA Astrophysics Data System (ADS)

    Abueh, Yeka; Liu, Hong

    2016-04-01

    Pervasive smartphones have demonstrated great potential in structural health monitoring (SHM) of civil infrastructures. Their sensing, processing, and communication capabilities along with crowdsourcing facility ease technical difficulties and reduce financial burdens of instrumentation and monitoring for SHM in civil infrastructures. However, smartphones are vulnerable to unintentional misuses and malicious attacks. This paper analyzes the vulnerabilities of smartphones in performing SHM and reveals the exploitation of those vulnerabilities. The work probes the attack surface of both devices and data. Device attack scenarios include hacking individual smartphones to modify the data stored on them and orchestrating smartphones to launch a distributed denial-of-service attack. Specifically, experiments are conducted to remotely access an Android smartphone and modify the sensing data of structural health stored on it. The work also presents a case study that reveals the sensitivity of a popular perturbation analysis method to faulty data delivered by a smartphone. The paper provides the direction of meeting the security challenge to using smartphones for SHM. As the first line of defense, device authentication is implemented in the smartphone to stop spoofing. Subsequently, message authentication is devised to maintain data integrity. There is a need to apply data science for the SHM immunity system against the sensitivity to data inaccuracy. The work also evaluates the cost-effectiveness of the proposed security measures, recommending varying levels of security to mitigate the adversaries to smartphones used in SHM systems. It calls for security solutions at the design stage of SHM systems rather than patching up after their implementations.

  18. Effectiveness of medicines authentication technology to detect counterfeit, recalled and expired medicines: a two-stage quantitative secondary care study.

    PubMed

    Naughton, Bernard; Roberts, Lindsey; Dopson, Sue; Chapman, Stephen; Brindley, David

    2016-12-09

    To identify the authentication and detection rate of serialised medicines using medicines authentication technology. 4192 serialised medicines were entered into a hospital dispensary over two separate 8-week stages in 2015. Medicines were authenticated using secure external database cross-checking, triggered by the scanning of a two-dimensional data matrix with a unit specific 12-digit serial code. 4% of medicines included were preprogrammed with a message to identify the product as either expired, pack recalled, product recalled or counterfeit. A site within a large UK National Health Service teaching hospital trust. Accredited checking staff, pharmacists and dispensers in a pharmacy department. Authentication and detection rate of counterfeit expired and recalled medicines. The operational detection rate of counterfeit, recalled and expired medicines scanned as a combined group was 81.4% (stage 1 (S1)) and 87% (stage 2 (S2)). The technology's technical detection rate (TDR) was 100%; however, not all medicines were scanned and of those that were scanned not all that generated a warning message were quarantined. Owing to an operational authentication rate (OAR) of 66.3% (over both stages), only 31.8% of counterfeit medicines, 58% of recalled drugs and 64% of expired medicines were detected as a proportion of those entered into the study. Response times (RTs) of 152 ms (S1) and 165 ms (S2) were recorded, meeting the falsified medicines directive-mandated 300 ms limit. TDRs and RTs were not a limiting factor in this study. The suboptimal OAR poses significant quality and safety issues with this detection approach. Authentication at the checking stage, however, demonstrated higher OARs. There is a need for further qualitative research to establish the reasons for less than absolute authentication and detection rates in the hospital environment to improve this technology in preparation for the incumbent European Union regulative deadline. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  19. Sub-micron scale patterning of fluorescent silver nanoclusters using low-power laser.

    PubMed

    Kunwar, Puskal; Hassinen, Jukka; Bautista, Godofredo; Ras, Robin H A; Toivonen, Juha

    2016-04-05

    Noble metal nanoclusters are ultrasmall nanomaterials with tunable properties and huge application potential; however, retaining their enhanced functionality is difficult as they readily lose their properties without stabilization. Here, we demonstrate a facile synthesis of highly photostable silver nanoclusters in a polymer thin film using visible light photoreduction. Furthermore, the different stages of the nanocluster formation are investigated in detail using absorption and fluorescence spectroscopy, fluorescence microscopy, and atomic force microscopy. A cost-effective fabrication of photostable micron-sized fluorescent silver nanocluster barcode is demonstrated in silver-impregnated polymer films using a low-power continuous-wave laser diode. It is shown that a laser power of as low as 0.75 mW is enough to write fluorescent structures, corresponding to the specifications of a commercially available laser pointer. The as-formed nanocluster-containing microstructures can be useful in direct labeling applications such as authenticity marking and fluorescent labeling.

  20. NIR and UV-vis spectroscopy, artificial nose and tongue: comparison of four fingerprinting techniques for the characterisation of Italian red wines.

    PubMed

    Casale, M; Oliveri, P; Armanino, C; Lanteri, S; Forina, M

    2010-06-04

    Four rapid and low-cost vanguard analytical systems (NIR and UV-vis spectroscopy, a headspace-mass based artificial nose and a voltammetric artificial tongue), together with chemometric pattern recognition techniques, were applied and compared in addressing a food authentication problem: the distinction between wine samples from the same Italian oenological region, according to the grape variety. Specifically, 59 certified samples belonging to the Barbera d'Alba and Dolcetto d'Alba appellations and collected from the same vintage (2007) were analysed. The instrumental responses, after proper data pre-processing, were used as fingerprints of the characteristics of the samples: the results from principal component analysis and linear discriminant analysis were discussed, comparing the capability of the four analytical strategies in addressing the problem studied. Copyright 2010 Elsevier B.V. All rights reserved.

  1. Developing a library of authenticated Traditional Chinese Medicinal (TCM) plants for systematic biological evaluation--rationale, methods and preliminary results from a Sino-American collaboration.

    PubMed

    Eisenberg, David M; Harris, Eric S J; Littlefield, Bruce A; Cao, Shugeng; Craycroft, Jane A; Scholten, Robert; Bayliss, Peter; Fu, Yanling; Wang, Wenquan; Qiao, Yanjiang; Zhao, Zhongzhen; Chen, Hubiao; Liu, Yong; Kaptchuk, Ted; Hahn, William C; Wang, Xiaoxing; Roberts, Thomas; Shamu, Caroline E; Clardy, Jon

    2011-01-01

    While the popularity of and expenditures for herbal therapies (aka "ethnomedicines") have increased globally in recent years, their efficacy, safety, mechanisms of action, potential as novel therapeutic agents, cost-effectiveness, or lack thereof, remain poorly defined and controversial. Moreover, published clinical trials evaluating the efficacy of herbal therapies have rightfully been criticized, post hoc, for their lack of quality assurance and reproducibility of study materials, as well as a lack of demonstration of plausible mechanisms and dosing effects. In short, clinical botanical investigations have suffered from the lack of a cohesive research strategy which draws on the expertise of all relevant specialties. With this as background, US and Chinese co-investigators with expertise in Traditional Chinese Medicine (TCM), botany, chemistry and drug discovery, have jointly established a prototype library consisting of 202 authenticated medicinal plant and fungal species that collectively represent the therapeutic content of the majority of all commonly prescribed TCM herbal prescriptions. Currently housed at Harvard University, the library consists of duplicate or triplicate kilogram quantities of each authenticated and processed species, as well as "detanninized" extracts and sub-fractions of each mother extract. Each species has been collected at 2-3 sites, each separated geographically by hundreds of miles, with precise GPS documentation, and authenticated visually and chemically prior to testing for heavy metals and/or pesticides contamination. An explicit decision process has been developed whereby samples with the least contamination were selected to undergo ethanol extraction and HPLC sub-fractionation in preparation for high throughput screening across a broad array of biological targets including cancer biology targets. As envisioned, the subfractions in this artisan collection of authenticated medicinal plants will be tested for biological activity individually and in combinations (i.e., "complex mixtures") consistent with traditional ethnomedical practice. This manuscript summarizes the rationale, methods and preliminary "proof of principle" for the establishment of this prototype, authenticated medicinal plant library. It is hoped that these methods will foster scientific discoveries with therapeutic potential and enhance efforts to systematically evaluate commonly used herbal therapies worldwide. Copyright © 2010 Elsevier B.V. All rights reserved.

  2. Internet Television News in the Classroom TF1: Improved Features Make Sites More Useful

    ERIC Educational Resources Information Center

    LeLoup, Jean W.; Ponterio, Robert

    2004-01-01

    Truly current, up-to-the-minute video by native speakers using the language for real communication can make the language and culture come alive for students. With the explosion of broadband Internet access through cable and DSL, better connections in schools, faster low cost computers, and better graphics adapters, access to authentic video on the…

  3. Evidence-Based Scripted Videos on Handling Student Misbehavior: The Development and Evaluation of Video Cases for Teacher Education

    ERIC Educational Resources Information Center

    Piwowar, Valentina; Barth, Victoria L.; Ophardt, Diemut; Thiel, Felicitas

    2018-01-01

    Scripted videos are based on a screenplay and are a viable and widely used tool for learning. Yet, reservations exist due to limited authenticity and high production costs. The present paper comprehensively describes a video production process for scripted videos on the topic of student misbehavior in the classroom. In a three step…

  4. University-Level Teaching of Anthropogenic Global Climate Change (AGCC) via Student Inquiry

    NASA Technical Reports Server (NTRS)

    Bush, Drew; Sieber, Renee; Seiler, Gale; Chandler, Mark

    2017-01-01

    This paper reviews university-level efforts to improve understanding of anthropogenic global climate change (AGCC) through curricula that enable student scientific inquiry. We examined 152 refereed publications and proceedings from academic conferences and selected 26 cases of inquiry learning that overcome specific challenges to AGCC teaching. This review identifies both the strengths and weaknesses of each of these case studies. It is the first to go beyond examining the impact of specific inquiry instructional approaches to offer a synthesis of cases. We find that inquiry teaching can succeed by concretising scientific processes, providing access to global data and evidence, imparting critical and higher order thinking about AGCC science policy and contextualising learning with places and scientific facts. We recommend educational researchers and scientists collaborate to create and refine curricula that utilise geospatial technologies, climate models and communication technologies to bring students into contact with scientists, climate data and authentic AGCC research processes. Many available science education technologies and curricula also require further research to maximise trade-offs between implementation and training costs and their educational value.

  5. Breach Risk Magnitude: A Quantitative Measure of Database Security.

    PubMed

    Yasnoff, William A

    2016-01-01

    A quantitative methodology is described that provides objective evaluation of the potential for health record system breaches. It assumes that breach risk increases with the number of potential records that could be exposed, while it decreases when more authentication steps are required for access. The breach risk magnitude (BRM) is the maximum value for any system user of the common logarithm of the number of accessible database records divided by the number of authentication steps needed to achieve such access. For a one million record relational database, the BRM varies from 5.52 to 6 depending on authentication protocols. For an alternative data architecture designed specifically to increase security by separately storing and encrypting each patient record, the BRM ranges from 1.3 to 2.6. While the BRM only provides a limited quantitative assessment of breach risk, it may be useful to objectively evaluate the security implications of alternative database organization approaches.

  6. Joint forensics and watermarking approach for video authentication

    NASA Astrophysics Data System (ADS)

    Thiemert, Stefan; Liu, Huajian; Steinebach, Martin; Croce-Ferri, Lucilla

    2007-02-01

    In our paper we discuss and compare the possibilities and shortcomings of both content-fragile watermarking and digital forensics and analyze if the combination of both techniques allows the identification of more than the sum of all manipulations identified by both techniques on their own due to synergetic effects. The first part of the paper discusses the theoretical possibilities offered by a combined approach, in which forensics and watermarking are considered as complementary tools for data authentication or deeply combined together, in order to reduce their error rate and to enhance the detection efficiency. After this conceptual discussion the paper proposes some concrete examples in which the joint approach is applied to video authentication. Some specific forensics techniques are analyzed and expanded to handle efficiently video data. The examples show possible extensions of passive-blind image forgery detection to video data, where the motion and time related characteristics of video are efficiently exploited.

  7. Authentic Integration: a model for integrating mathematics and science in the classroom

    NASA Astrophysics Data System (ADS)

    Treacy, Páraic; O'Donoghue, John

    2014-07-01

    Attempts at integrating mathematics and science have been made previously but no definitive, widely adopted teaching model has been developed to date. Research suggests that hands-on, practical, student-centred tasks should form a central element when designing an effective model for the integration of mathematics and science. Aided by this research, the author created a new model entitled 'Authentic Integration' which caters for the specific needs of integration of mathematics and science. This model requires that each lesson be based around a rich task which relates to the real world and ensures that hands-on group work, inquiry, and discussion are central to the lesson. It was found that Authentic Integration, when applied in four Irish post-primary schools, positively affected pupil understanding. The teachers who completed the intervention displayed a very positive attitude towards the approach, intimating that they would continue to implement the practice in their classrooms.

  8. Halal authenticity issues in meat and meat products.

    PubMed

    Nakyinsige, Khadijah; Man, Yaakob Bin Che; Sazili, Awis Qurni

    2012-07-01

    In the recent years, Muslims have become increasingly concerned about the meat they eat. Proper product description is very crucial for consumers to make informed choices and to ensure fair trade, particularly in the ever growing halal food market. Globally, Muslim consumers are concerned about a number of issues concerning meat and meat products such as pork substitution, undeclared blood plasma, use of prohibited ingredients, pork intestine casings and non-halal methods of slaughter. Analytical techniques which are appropriate and specific have been developed to deal with particular issues. The most suitable technique for any particular sample is often determined by the nature of the sample itself. This paper sets out to identify what makes meat halal, highlight the halal authenticity issues that occur in meat and meat products and provide an overview of the possible analytical methods for halal authentication of meat and meat products. Copyright © 2012 Elsevier Ltd. All rights reserved.

  9. Rapid Authentication of Ginkgo biloba Herbal Products Using the Recombinase Polymerase Amplification Assay.

    PubMed

    Liu, Yang; Wang, Xiao-Yue; Wei, Xue-Min; Gao, Zi-Tong; Han, Jian-Ping

    2018-05-22

    Species adulteration in herbal products (HPs) exposes consumers to health risks. Chemical and morphological methods have their own deficiencies when dealing with the detection of species containing the same active compounds in HPs. In this study, we developed a rapid identification method using the recombinase polymerase amplification (RPA) assay to detect two species, Ginkgo biloba and Sophora japonica (as adulteration), in Ginkgo biloba HPs. Among 36 Ginkgo biloba HP samples, 34 were found to have Ginkgo biloba sequences, and 9 were found to have Sophora japonica sequences. During the authentication process, the RPA-LFS assay showed a higher specificity, sensitivity and efficiency than PCR-based methods. We initially applied the RPA-LSF technique to detect plant species in HPs, demonstrating that this assay can be developed into an efficient tool for the rapid on-site authentication of plant species in Ginkgo biloba HPs.

  10. Comprehensive, Multi-Source Cyber-Security Events Data Set

    DOE Data Explorer

    Kent, Alexander D. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-21

    This data set represents 58 consecutive days of de-identified event data collected from five sources within Los Alamos National Laboratory’s corporate, internal computer network. The data sources include Windows-based authentication events from both individual computers and centralized Active Directory domain controller servers; process start and stop events from individual Windows computers; Domain Name Service (DNS) lookups as collected on internal DNS servers; network flow data as collected on at several key router locations; and a set of well-defined red teaming events that present bad behavior within the 58 days. In total, the data set is approximately 12 gigabytes compressed across the five data elements and presents 1,648,275,307 events in total for 12,425 users, 17,684 computers, and 62,974 processes. Specific users that are well known system related (SYSTEM, Local Service) were not de-identified though any well-known administrators account were still de-identified. In the network flow data, well-known ports (e.g. 80, 443, etc) were not de-identified. All other users, computers, process, ports, times, and other details were de-identified as a unified set across all the data elements (e.g. U1 is the same U1 in all of the data). The specific timeframe used is not disclosed for security purposes. In addition, no data that allows association outside of LANL’s network is included. All data starts with a time epoch of 1 using a time resolution of 1 second. In the authentication data, failed authentication events are only included for users that had a successful authentication event somewhere within the data set.

  11. Molecular differentiation of Russian wild ginseng using mitochondrial nad7 intron 3 region.

    PubMed

    Li, Guisheng; Cui, Yan; Wang, Hongtao; Kwon, Woo-Saeng; Yang, Deok-Chun

    2017-07-01

    Cultivated ginseng is often introduced as a substitute and adulterant of Russian wild ginseng due to its lower cost or misidentification caused by similarity in appearance with wild ginseng. The aim of this study is to develop a simple and reliable method to differentiate Russian wild ginseng from cultivated ginseng. The mitochondrial NADH dehydrogenase subunit 7 ( nad 7) intron 3 regions of Russian wild ginseng and Chinese cultivated ginseng were analyzed. Based on the multiple sequence alignment result, a specific primer for Russian wild ginseng was designed by introducing additional mismatch and allele-specific polymerase chain reaction (PCR) was performed for identification of wild ginseng. Real-time allele-specific PCR with endpoint analysis was used for validation of the developed Russian wild ginseng single nucleotide polymorphism (SNP) marker. An SNP site specific to Russian wild ginseng was exploited by multiple alignments of mitochondrial nad 7 intron 3 regions of different ginseng samples. With the SNP-based specific primer, Russian wild ginseng was successfully discriminated from Chinese and Korean cultivated ginseng samples by allele-specific PCR. The reliability and specificity of the SNP marker was validated by checking 20 individuals of Russian wild ginseng samples with real-time allele-specific PCR assay. An effective DNA method for molecular discrimination of Russian wild ginseng from Chinese and Korean cultivated ginseng was developed. The established real-time allele-specific PCR was simple and reliable, and the present method should be a crucial complement of chemical analysis for authentication of Russian wild ginseng.

  12. Safety in numbers 4: The relationship between exposure to authentic and didactic environments and nursing students' learning of medication dosage calculation problem solving knowledge and skills.

    PubMed

    Weeks, Keith W; Clochesy, John M; Hutton, B Meriel; Moseley, Laurie

    2013-03-01

    Advancing the art and science of education practice requires a robust evaluation of the relationship between students' exposure to learning and assessment environments and the development of their cognitive competence (knowing that and why) and functional competence (know-how and skills). Healthcare education translation research requires specific education technology assessments and evaluations that consist of quantitative analyses of empirical data and qualitative evaluations of the lived student experience of the education journey and schemata construction (Weeks et al., 2013a). This paper focuses on the outcomes of UK PhD and USA post-doctorate experimental research. We evaluated the relationship between exposure to traditional didactic methods of education, prototypes of an authentic medication dosage calculation problem-solving (MDC-PS) environment and nursing students' construction of conceptual and calculation competence in medication dosage calculation problem-solving skills. Empirical outcomes from both UK and USA programmes of research identified highly significant differences in the construction of conceptual and calculation competence in MDC-PS following exposure to the authentic learning environment to that following exposure to traditional didactic transmission methods of education (p < 0.001). This research highlighted that for many students exposure to authentic learning environments is an essential first step in the development of conceptual and calculation competence and relevant schemata construction (internal representations of the relationship between the features of authentic dosage problems and calculation functions); and how authentic environments more ably support all cognitive (learning) styles in mathematics than traditional didactic methods of education. Functional competence evaluations are addressed in Macdonald et al. (2013) and Weeks et al. (2013e). Copyright © 2012. Published by Elsevier Ltd.

  13. Strengthening Software Authentication with the ROSE Software Suite

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    White, G

    2006-06-15

    Many recent nonproliferation and arms control software projects include a software authentication regime. These include U.S. Government-sponsored projects both in the United States and in the Russian Federation (RF). This trend toward requiring software authentication is only accelerating. Demonstrating assurance that software performs as expected without hidden ''backdoors'' is crucial to a project's success. In this context, ''authentication'' is defined as determining that a software package performs only its intended purpose and performs said purpose correctly and reliably over the planned duration of an agreement. In addition to visual inspections by knowledgeable computer scientists, automated tools are needed to highlightmore » suspicious code constructs, both to aid visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary and not extensible. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool has to be based on a complete language compiler. ROSE is precisely such a compiler infrastructure developed within the Department of Energy (DOE) and targeted at the optimization of scientific applications and user-defined libraries within large-scale applications (typically applications of a million lines of code). ROSE is a robust, source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C and C++ (handling the full C, C99, C++ languages and with current collaborations to support Fortran90). We propose to extend ROSE to address a number of security-specific requirements, and apply it to software authentication for nonproliferation and arms control projects.« less

  14. Recent applications of multivariate data analysis methods in the authentication of rice and the most analyzed parameters: A review.

    PubMed

    Maione, Camila; Barbosa, Rommel Melgaço

    2018-01-24

    Rice is one of the most important staple foods around the world. Authentication of rice is one of the most addressed concerns in the present literature, which includes recognition of its geographical origin and variety, certification of organic rice and many other issues. Good results have been achieved by multivariate data analysis and data mining techniques when combined with specific parameters for ascertaining authenticity and many other useful characteristics of rice, such as quality, yield and others. This paper brings a review of the recent research projects on discrimination and authentication of rice using multivariate data analysis and data mining techniques. We found that data obtained from image processing, molecular and atomic spectroscopy, elemental fingerprinting, genetic markers, molecular content and others are promising sources of information regarding geographical origin, variety and other aspects of rice, being widely used combined with multivariate data analysis techniques. Principal component analysis and linear discriminant analysis are the preferred methods, but several other data classification techniques such as support vector machines, artificial neural networks and others are also frequently present in some studies and show high performance for discrimination of rice.

  15. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    PubMed

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.

  16. Three-dimensional quick response code based on inkjet printing of upconversion fluorescent nanoparticles for drug anti-counterfeiting

    NASA Astrophysics Data System (ADS)

    You, Minli; Lin, Min; Wang, Shurui; Wang, Xuemin; Zhang, Ge; Hong, Yuan; Dong, Yuqing; Jin, Guorui; Xu, Feng

    2016-05-01

    Medicine counterfeiting is a serious issue worldwide, involving potentially devastating health repercussions. Advanced anti-counterfeit technology for drugs has therefore aroused intensive interest. However, existing anti-counterfeit technologies are associated with drawbacks such as the high cost, complex fabrication process, sophisticated operation and incapability in authenticating drug ingredients. In this contribution, we developed a smart phone recognition based upconversion fluorescent three-dimensional (3D) quick response (QR) code for tracking and anti-counterfeiting of drugs. We firstly formulated three colored inks incorporating upconversion nanoparticles with RGB (i.e., red, green and blue) emission colors. Using a modified inkjet printer, we printed a series of colors by precisely regulating the overlap of these three inks. Meanwhile, we developed a multilayer printing and splitting technology, which significantly increases the information storage capacity per unit area. As an example, we directly printed the upconversion fluorescent 3D QR code on the surface of drug capsules. The 3D QR code consisted of three different color layers with each layer encoded by information of different aspects of the drug. A smart phone APP was designed to decode the multicolor 3D QR code, providing the authenticity and related information of drugs. The developed technology possesses merits in terms of low cost, ease of operation, high throughput and high information capacity, thus holds great potential for drug anti-counterfeiting.Medicine counterfeiting is a serious issue worldwide, involving potentially devastating health repercussions. Advanced anti-counterfeit technology for drugs has therefore aroused intensive interest. However, existing anti-counterfeit technologies are associated with drawbacks such as the high cost, complex fabrication process, sophisticated operation and incapability in authenticating drug ingredients. In this contribution, we developed a smart phone recognition based upconversion fluorescent three-dimensional (3D) quick response (QR) code for tracking and anti-counterfeiting of drugs. We firstly formulated three colored inks incorporating upconversion nanoparticles with RGB (i.e., red, green and blue) emission colors. Using a modified inkjet printer, we printed a series of colors by precisely regulating the overlap of these three inks. Meanwhile, we developed a multilayer printing and splitting technology, which significantly increases the information storage capacity per unit area. As an example, we directly printed the upconversion fluorescent 3D QR code on the surface of drug capsules. The 3D QR code consisted of three different color layers with each layer encoded by information of different aspects of the drug. A smart phone APP was designed to decode the multicolor 3D QR code, providing the authenticity and related information of drugs. The developed technology possesses merits in terms of low cost, ease of operation, high throughput and high information capacity, thus holds great potential for drug anti-counterfeiting. Electronic supplementary information (ESI) available: Calculating details of UCNP content per 3D QR code and decoding process of the 3D QR code. See DOI: 10.1039/c6nr01353h

  17. Volatile-Compound Fingerprinting by Headspace-Gas-Chromatography Ion-Mobility Spectrometry (HS-GC-IMS) as a Benchtop Alternative to 1H NMR Profiling for Assessment of the Authenticity of Honey.

    PubMed

    Gerhardt, Natalie; Birkenmeier, Markus; Schwolow, Sebastian; Rohn, Sascha; Weller, Philipp

    2018-02-06

    This work describes a simple approach for the untargeted profiling of volatile compounds for the authentication of the botanical origins of honey based on resolution-optimized HS-GC-IMS combined with optimized chemometric techniques, namely PCA, LDA, and kNN. A direct comparison of the PCA-LDA models between the HS-GC-IMS and 1 H NMR data demonstrated that HS-GC-IMS profiling could be used as a complementary tool to NMR-based profiling of honey samples. Whereas NMR profiling still requires comparatively precise sample preparation, pH adjustment in particular, HS-GC-IMS fingerprinting may be considered an alternative approach for a truly fully automatable, cost-efficient, and in particular highly sensitive method. It was demonstrated that all tested honey samples could be distinguished on the basis of their botanical origins. Loading plots revealed the volatile compounds responsible for the differences among the monofloral honeys. The HS-GC-IMS-based PCA-LDA model was composed of two linear functions of discrimination and 10 selected PCs that discriminated canola, acacia, and honeydew honeys with a predictive accuracy of 98.6%. Application of the LDA model to an external test set of 10 authentic honeys clearly proved the high predictive ability of the model by correctly classifying them into three variety groups with 100% correct classifications. The constructed model presents a simple and efficient method of analysis and may serve as a basis for the authentication of other food types.

  18. Enhancing Heart-Beat-Based Security for mHealth Applications.

    PubMed

    Seepers, Robert M; Strydis, Christos; Sourdis, Ioannis; De Zeeuw, Chris I

    2017-01-01

    In heart-beat-based security, a security key is derived from the time difference between consecutive heart beats (the inter-pulse interval, IPI), which may, subsequently, be used to enable secure communication. While heart-beat-based security holds promise in mobile health (mHealth) applications, there currently exists no work that provides a detailed characterization of the delivered security in a real system. In this paper, we evaluate the strength of IPI-based security keys in the context of entity authentication. We investigate several aspects that should be considered in practice, including subjects with reduced heart-rate variability (HRV), different sensor-sampling frequencies, intersensor variability (i.e., how accurate each entity may measure heart beats) as well as average and worst-case-authentication time. Contrary to the current state of the art, our evaluation demonstrates that authentication using multiple, less-entropic keys may actually increase the key strength by reducing the effects of intersensor variability. Moreover, we find that the maximal key strength of a 60-bit key varies between 29.2 bits and only 5.7 bits, depending on the subject's HRV. To improve security, we introduce the inter-multi-pulse interval (ImPI), a novel method of extracting entropy from the heart by considering the time difference between nonconsecutive heart beats. Given the same authentication time, using the ImPI for key generation increases key strength by up to 3.4 × (+19.2 bits) for subjects with limited HRV, at the cost of an extended key-generation time of 4.8 × (+45 s).

  19. 31 CFR 363.17 - Who is liable if someone else accesses my TreasuryDirect ® account using my password?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., password, and any other form(s) of authentication we may require. We will treat any transactions conducted using your password as having been authorized by you. We are not liable for any loss, liability, cost, or expense that you may incur as a result of transactions made using your password. [72 FR 30978...

  20. Halal authenticity of gelatin using species-specific PCR.

    PubMed

    Shabani, Hessam; Mehdizadeh, Mehrangiz; Mousavi, Seyed Mohammad; Dezfouli, Ehsan Ansari; Solgi, Tara; Khodaverdi, Mahdi; Rabiei, Maryam; Rastegar, Hossein; Alebouyeh, Mahmoud

    2015-10-01

    Consumption of food products derived from porcine sources is strictly prohibited in Islam. Gelatin, mostly derived from bovine and porcine sources, has many applications in the food and pharmaceutical industries. To ensure that food products comply with halal regulations, development of valid and reliable analytical methods is very much required. In this study, a species-specific polymerase chain reaction (PCR) assay using conserved regions of mitochondrial DNA (cytochrome b gene) was performed to evaluate the halal authenticity of gelatin. After isolation of DNA from gelatin powders with known origin, conventional PCR using species-specific primers was carried out on the extracted DNA. The amplified expected PCR products of 212 and 271 bp were observed for porcine and bovine gelatin, respectively. The sensitivity of the method was tested on binary gelatin mixtures containing 0.1%, 1%, 10%, and 100% (w/w) of porcine gelatin within bovine gelatin and vice versa. Although most of the DNA is degraded due to the severe processing steps of gelatin production, the minimum level of 0.1% w/w of both porcine and bovine gelatin was detected. Moreover, eight food products labeled as containing bovine gelatin and eight capsule shells were subjected to PCR examination. The results showed that all samples contained bovine gelatin, and the absence of porcine gelatin was verified. This method of species authenticity is very useful to verify whether gelatin and gelatin-containing food products are derived from halal ingredients. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. Empowering Knowledge-Building Pedagogy in Online Environments: Creating Digital Moments to Transform Practice

    ERIC Educational Resources Information Center

    Barber, Wendy; Taylor, Stacey; Buchanan, Sylvia

    2014-01-01

    The purpose of this paper is to examine a specific online pedagogical tool, "Digital Moments" that can be an effective strategy for building online communities in a knowledge building environment. While the paper will examine the specific techniques and teaching methodologies that enabled the authors to create authentic online learning…

  2. Quantum Dialogue with Authentication Based on Bell States

    NASA Astrophysics Data System (ADS)

    Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping

    2013-06-01

    We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.

  3. Active Time Domain Reflectometry for Tamper Indication in Unattended Safeguards Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheen, David M.; Smith, Leon E.; Tedeschi, Jonathan R.

    2015-07-14

    The International Atomic Energy Agency (IAEA) continues to expand its use of unattended measurement systems. An increasing number of systems and an expanding family of instruments create challenges in terms of deployment efficiency and the implementation of data authentication measures. In collaboration with the IAEA, tamper-indicating measures to address data-transmission authentication challenges with unattended safeguards systems are under investigation. Pacific Northwest National Laboratory is studying the viability of active time-domain reflectometry (TDR) along two parallel but interconnected paths: (1) swept-frequency TDR as the highly flexible, laboratory gold standard to which field-deployable options can be compared, and (2) a low-cost commerciallymore » available spread-spectrum TDR technology as one option for field implementation. This paper describes the TDR methods under investigation and the associated benchtop test-bed, tampering scenarios of interest,, and viability measurement results to date (e.g., comparison of relative sensitivity to tamper scenarios).« less

  4. Security model for VM in cloud

    NASA Astrophysics Data System (ADS)

    Kanaparti, Venkataramana; Naveen K., R.; Rajani, S.; Padmvathamma, M.; Anitha, C.

    2013-03-01

    Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and applications to be stored away from own corporate server, it brings more issues in security such as virtualization security, distributed computing, application security, identity management, access control and authentication. Even though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC) in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP systems, Image processing which requires huge resources in cloud deployed on one or more VM's.

  5. DNA Barcoding Meets Nanotechnology: Development of a Universal Colorimetric Test for Food Authentication.

    PubMed

    Valentini, Paola; Galimberti, Andrea; Mezzasalma, Valerio; De Mattia, Fabrizio; Casiraghi, Maurizio; Labra, Massimo; Pompa, Pier Paolo

    2017-07-03

    Food trade globalization and the growing demand for selected food varieties have led to the intensification of adulteration cases, especially in the form of species substitution and mixing with cheaper taxa. This phenomenon has huge economic impact and sometimes even public health implications. DNA barcoding represents a well-proven molecular approach to assess the authenticity of food items, although its use is hampered by analytical constraints and timeframes that are often prohibitive for the food market. To address such issues, we have introduced a new technology, named NanoTracer, that allows for rapid and naked-eye molecular traceability of any food and requires limited instrumentation and cost-effective reagents. Moreover, unlike sequencing, this method can be used to identify not only the substitution of a fine ingredient, but also its dilution with cheaper ones. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  6. A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems.

    PubMed

    Mishra, Dheerendra; Srinivas, Jangirala; Mukhopadhyay, Sourav

    2014-10-01

    Advancement in network technology provides new ways to utilize telecare medicine information systems (TMIS) for patient care. Although TMIS usually faces various attacks as the services are provided over the public network. Recently, Jiang et al. proposed a chaotic map-based remote user authentication scheme for TMIS. Their scheme has the merits of low cost and session key agreement using Chaos theory. It enhances the security of the system by resisting various attacks. In this paper, we analyze the security of Jiang et al.'s scheme and demonstrate that their scheme is vulnerable to denial of service attack. Moreover, we demonstrate flaws in password change phase of their scheme. Further, our aim is to propose a new chaos map-based anonymous user authentication scheme for TMIS to overcome the weaknesses of Jiang et al.'s scheme, while also retaining the original merits of their scheme. We also show that our scheme is secure against various known attacks including the attacks found in Jiang et al.'s scheme. The proposed scheme is comparable in terms of the communication and computational overheads with Jiang et al.'s scheme and other related existing schemes. Moreover, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  7. 45 CFR 164.312 - Technical safeguards.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... or use electronic protected health information. (c)(1) Standard: Integrity. Implement policies and...) Implementation specification: Mechanism to authenticate electronic protected health information (Addressable... Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED...

  8. 45 CFR 164.312 - Technical safeguards.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... or use electronic protected health information. (c)(1) Standard: Integrity. Implement policies and...) Implementation specification: Mechanism to authenticate electronic protected health information (Addressable... Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED...

  9. Rapid authentication of edible bird's nest by FTIR spectroscopy combined with chemometrics.

    PubMed

    Guo, Lili; Wu, Yajun; Liu, Mingchang; Ge, Yiqiang; Chen, Ying

    2018-06-01

    Edible bird's nests (EBNs) have been traditionally regarded as a kind of medicinal and healthy food in China. For economic reasons, they are frequently subjected to adulteration with some cheaper substitutes, such as Tremella fungus, agar, fried pigskin, and egg white. As a kind of precious and functional product, it is necessary to establish a robust method for the rapid authentication of EBNs with small amounts of samples by simple processes. In this study, the Fourier transform infrared spectroscopy (FTIR) system was utilized and its feasibility for identification of EBNs was verified. FTIR spectra data of authentic and adulterated EBNs were analyzed by chemometrics analyses including principal component analysis, linear discriminant analysis (LDA), support vector machine (SVM) and one-class partial least squares (OCPLS). The results showed that the established LDA and SVM models performed well and had satisfactory classification ability, with the former 94.12% and the latter 100%. The OCPLS model was developed with prediction sensitivity of 0.937 and specificity of 0.886. Further detection of commercial EBN samples confirmed these results. FTIR is applicable in the scene of rapid authentication of EBNs, especially for quality supervision departments, entry-exit inspection and quarantine, and customs administration. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  10. Cell lines authentication and mycoplasma detection as minimun quality control of cell lines in biobanking.

    PubMed

    Corral-Vázquez, C; Aguilar-Quesada, R; Catalina, P; Lucena-Aguilar, G; Ligero, G; Miranda, B; Carrillo-Ávila, J A

    2017-06-01

    Establishment of continuous cell lines from human normal and tumor tissues is an extended and useful methodology for molecular characterization of cancer pathophysiology and drug development in research laboratories. The exchange of these cell lines between different labs is a common practice that can compromise assays reliability due to contamination with microorganism such as mycoplasma or cells from different flasks that compromise experiment reproducibility and reliability. Great proportions of cell lines are contaminated with mycoplasma and/or are replaced by cells derived for a different origin during processing or distribution process. The scientific community has underestimated this problem and thousand of research experiment has been done with cell lines that are incorrectly identified and wrong scientific conclusions have been published. Regular contamination and authentication tests are necessary in order to avoid negative consequences of widespread misidentified and contaminated cell lines. Cell banks generate, store and distribute cell lines for research, being mandatory a consistent and continuous quality program. Methods implementation for guaranteeing both, the absence of mycoplasma and authentication in the supplied cell lines, has been performed in the Andalusian Health System Biobank. Specifically, precise results were obtained using real time PCR detection for mycoplasma and 10 STRs identification by capillary electrophoresis for cell line authentication. Advantages and disadvantages of these protocols are discussed.

  11. Passive detection of copy-move forgery in digital images: state-of-the-art.

    PubMed

    Al-Qershi, Osamah M; Khoo, Bee Ee

    2013-09-10

    Currently, digital images and videos have high importance because they have become the main carriers of information. However, the relative ease of tampering with images and videos makes their authenticity untrustful. Digital image forensics addresses the problem of the authentication of images or their origins. One main branch of image forensics is passive image forgery detection. Images could be forged using different techniques, and the most common forgery is the copy-move, in which a region of an image is duplicated and placed elsewhere in the same image. Active techniques, such as watermarking, have been proposed to solve the image authenticity problem, but those techniques have limitations because they require human intervention or specially equipped cameras. To overcome these limitations, several passive authentication methods have been proposed. In contrast to active methods, passive methods do not require any previous information about the image, and they take advantage of specific detectable changes that forgeries can bring into the image. In this paper, we describe the current state-of-the-art of passive copy-move forgery detection methods. The key current issues in developing a robust copy-move forgery detector are then identified, and the trends of tackling those issues are addressed. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  12. Isotope Inversion Experiment evaluating the suitability of calibration in surrogate matrix for quantification via LC-MS/MS-Exemplary application for a steroid multi-method.

    PubMed

    Suhr, Anna Catharina; Vogeser, Michael; Grimm, Stefanie H

    2016-05-30

    For quotable quantitative analysis of endogenous analytes in complex biological samples by isotope dilution LC-MS/MS, the creation of appropriate calibrators is a challenge, since analyte-free authentic material is in general not available. Thus, surrogate matrices are often used to prepare calibrators and controls. However, currently employed validation protocols do not include specific experiments to verify the suitability of a surrogate matrix calibration for quantification of authentic matrix samples. The aim of the study was the development of a novel validation experiment to test whether surrogate matrix based calibrators enable correct quantification of authentic matrix samples. The key element of the novel validation experiment is the inversion of nonlabelled analytes and their stable isotope labelled (SIL) counterparts in respect to their functions, i.e. SIL compound is the analyte and nonlabelled substance is employed as internal standard. As a consequence, both surrogate and authentic matrix are analyte-free regarding SIL analytes, which allows a comparison of both matrices. We called this approach Isotope Inversion Experiment. As figure of merit we defined the accuracy of inverse quality controls in authentic matrix quantified by means of a surrogate matrix calibration curve. As a proof-of-concept application a LC-MS/MS assay addressing six corticosteroids (cortisol, cortisone, corticosterone, 11-deoxycortisol, 11-deoxycorticosterone, and 17-OH-progesterone) was chosen. The integration of the Isotope Inversion Experiment in the validation protocol for the steroid assay was successfully realized. The accuracy results of the inverse quality controls were all in all very satisfying. As a consequence the suitability of a surrogate matrix calibration for quantification of the targeted steroids in human serum as authentic matrix could be successfully demonstrated. The Isotope Inversion Experiment fills a gap in the validation process for LC-MS/MS assays quantifying endogenous analytes. We consider it a valuable and convenient tool to evaluate the correct quantification of authentic matrix samples based on a calibration curve in surrogate matrix. Copyright © 2016 Elsevier B.V. All rights reserved.

  13. CORBASec Used to Secure Distributed Aerospace Propulsion Simulations

    NASA Technical Reports Server (NTRS)

    Blaser, Tammy M.

    2003-01-01

    The NASA Glenn Research Center and its industry partners are developing a Common Object Request Broker (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines. It was developed by Glenn and is being managed by the NASA Ames Research Center as the lead center reporting directly to NASA Headquarters' Aerospace Technology Enterprise. Glenn is an active domain member of the Object Management Group: an open membership, not-for-profit consortium that produces and manages computer industry specifications (i.e., CORBA) for interoperable enterprise applications. When NPSS is deployed, it will assemble a distributed aerospace propulsion simulation scenario from proprietary analytical CORBA servers and execute them with security afforded by the CORBASec implementation. The NPSS CORBASec test bed was initially developed with the TPBroker Security Service product (Hitachi Computer Products (America), Inc., Waltham, MA) using the Object Request Broker (ORB), which is based on the TPBroker Basic Object Adaptor, and using NPSS software across different firewall products. The test bed has been migrated to the Portable Object Adaptor architecture using the Hitachi Security Service product based on the VisiBroker 4.x ORB (Borland, Scotts Valley, CA) and on the Orbix 2000 ORB (Dublin, Ireland, with U.S. headquarters in Waltham, MA). Glenn, GE Aircraft Engines, and Pratt & Whitney Aircraft are the initial industry partners contributing to the NPSS CORBASec test bed. The test bed uses Security SecurID (RSA Security Inc., Bedford, MA) two-factor token-based authentication together with Hitachi Security Service digital-certificate-based authentication to validate the various NPSS users. The test bed is expected to demonstrate NPSS CORBASec-specific policy functionality, confirm adequate performance, and validate the required Internet configuration in a distributed collaborative aerospace propulsion environment.

  14. The Authentic Personality: A Theoretical and Empirical Conceptualization and the Development of the Authenticity Scale

    ERIC Educational Resources Information Center

    Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen

    2008-01-01

    This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…

  15. Measuring Teacher Authenticity: Criteria Students Use in Their Perception of Teacher Authenticity

    ERIC Educational Resources Information Center

    De Bruyckere, Pedro; Kirschner, Paul A.

    2017-01-01

    Authenticity is an often-heard term with respect to education. Tasks should be authentic, the learning environment should be authentic and, above all, the teacher should be authentic. Previous qualitative research has shown that there are four primary criteria that students in formal educational settings use when forming their perceptions of…

  16. Utilisation of the healthcare system for authentic early experience placements.

    PubMed

    Hays, Richard B

    2013-01-01

    Authentic early experience in clinical contexts adds interest and relevance to basic medical education, and is regarded positively by both learners and teachers. However, with the recent expansion of medical education, the healthcare system appears close to reaching its capacity for student supervision. This study explores the utilisation of the healthcare system for early clinical placements. A secondary analysis was conducted of data from the Medical Schools Outcomes Database, collected from the 2010 annual questionnaire, focusing on the timing, duration and location of clinical placements during 2009 within the first half of basic medical education programs in Australia. Data was received for 67% of Australian medical students, reporting a total of 16 812 early clinical placements that occupied 97 319 days of supervised time in a wide variety of hospital, general practice and Indigenous health contexts, both urban and rural, across the Australian healthcare system. These early placements occupied about 16% of total clinical placement time for all students in all training years during 2009. The majority of these placements were for only a few hours or days; exceptions were longitudinal placements in regional and rural communities at a minority of schools. Early clinical placements may pose significant resource costs for placement providers, particularly supervision time and expertise. As medical education expands and the teaching capacity of the Australian healthcare system appears to reach its limits, it may be necessary to allocate placements according to their specific learning outcomes, prioritise more acute settings for more senior students, and increase capacity in less acute health and social care settings.

  17. Interface Message Processors for the ARPA Computer Network

    DTIC Science & Technology

    1975-04-01

    Pluribus IMP construction and checkout; sizeable changes to the i*4P message-processing algorithms: and Satellite IMP issues. The IMP message...extremely low cost modification design. We have begun to consider changes to the MLC design which would enable the MLC to suppress continuous breaks...existing authentication mechanisms need not make these changes . 2.7 Other Topics During the first quarter BBN constructed an environmental test chamber

  18. A Low-Cost and Secure Solution for e-Commerce

    NASA Astrophysics Data System (ADS)

    Pasquet, Marc; Vacquez, Delphine; Rosenberger, Christophe

    We present in this paper a new architecture for remote banking and e-commerce applications. The proposed solution is designed to be low cost and provides some good guarantees of security for a client and his bank issuer. Indeed, the main problem for an issuer is to identify and authenticate one client (a cardholder) using his personal computer through the web when this client wants to access to remote banking services or when he wants to pay on a e-commerce site equipped with 3D-secure payment solution. The proposed solution described in this paper is MasterCard Chip Authentication Program compliant and was experimented in the project called SOPAS. The main contribution of this system consists in the use of a smartcard with a I2C bus that pilots a terminal only equipped with a screen and a keyboard. During the use of services, the user types his PIN code on the keyboard and all the security part of the transaction is performed by the chip of the smartcard. None information of security stays on the personal computer and a dynamic token created by the card is sent to the bank and verified by the front end. We present first the defined methodology and we analyze the main security aspects of the proposed solution.

  19. A MEMS-based, wireless, biometric-like security system

    NASA Astrophysics Data System (ADS)

    Cross, Joshua D.; Schneiter, John L.; Leiby, Grant A.; McCarter, Steven; Smith, Jeremiah; Budka, Thomas P.

    2010-04-01

    We present a system for secure identification applications that is based upon biometric-like MEMS chips. The MEMS chips have unique frequency signatures resulting from fabrication process variations. The MEMS chips possess something analogous to a "voiceprint". The chips are vacuum encapsulated, rugged, and suitable for low-cost, highvolume mass production. Furthermore, the fabrication process is fully integrated with standard CMOS fabrication methods. One is able to operate the MEMS-based identification system similarly to a conventional RFID system: the reader (essentially a custom network analyzer) detects the power reflected across a frequency spectrum from a MEMS chip in its vicinity. We demonstrate prototype "tags" - MEMS chips placed on a credit card-like substrate - to show how the system could be used in standard identification or authentication applications. We have integrated power scavenging to provide DC bias for the MEMS chips through the use of a 915 MHz source in the reader and a RF-DC conversion circuit on the tag. The system enables a high level of protection against typical RFID hacking attacks. There is no need for signal encryption, so back-end infrastructure is minimal. We believe this system would make a viable low-cost, high-security system for a variety of identification and authentication applications.

  20. Plausible authentication of manuka honey and related products by measuring leptosperin with methyl syringate.

    PubMed

    Kato, Yoji; Fujinaka, Rie; Ishisaka, Akari; Nitta, Yoko; Kitamoto, Noritoshi; Takimoto, Yosuke

    2014-07-09

    Manuka honey, obtained from Leptospermum scoparium flowers in New Zealand, has strong antibacterial properties. In this study, plausible authentication of the manuka honey was inspected by measuring leptosperin, methyl syringate 4-O-β-D-gentiobiose, along with methyl syringate. Despite a gradual decrease in methyl syringate content over 30 days at 50 °C, even at moderate 37 °C, leptosperin remained stable. A considerable correlation between nonperoxide antibacterial activity and leptosperin content was observed in 20 certified manuka honey samples. Leptosperin and methyl syringate in manuka honey and related products were analyzed using HPLC connected with mass spectrometry. One noncertified brand displayed significant variations in the leptosperin and methyl syringate contents between two samples obtained from different regions. Therefore, certification is clearly required to protect consumers from disguised and/or low-quality honey. Because leptosperin is stable during storage and specific to manuka honey, its measurement may be applicable for manuka honey authentication.

  1. Laser-heat puncturing as highly effective method of post-tuberculous cystalgia treatment

    NASA Astrophysics Data System (ADS)

    Koultchavenia, Ekaterina V.

    1999-07-01

    The tuberculosis of an urine bladder in men develops is authentic less often, and recovery is authentic more often, than in the women. In 39,1 percent of the women with nephrotuberculosis and urocystis and urocystis tuberculosis a specific cystitides is finished in development of post- tuberculous cystalgia. One of starting mechanism of dysuria after the transferred urocystis tuberculosis in the women in menopause is hormonal insufficiency. The method of laser heat puncturing, developed by us, for the treatment this complication is highly effective, does not require additional introduction of medicines, can be executed as in hospitals, and in our-patient.

  2. The effects of authentic leadership, six areas of worklife, and occupational coping self-efficacy on new graduate nurses' burnout and mental health: A cross-sectional study.

    PubMed

    Laschinger, Heather K Spence; Borgogni, Laura; Consiglio, Chiara; Read, Emily

    2015-06-01

    New nurse burnout has personal and organizational costs. The combined effect of authentic leadership, person-job fit within areas of worklife, and occupational coping self-efficacy on new nurses' burnout and emotional wellbeing has not been investigated. This study tested a model linking authentic leadership, areas of worklife, occupational coping self-efficacy, burnout, and mental health among new graduate nurses. We also tested the validity of the concept of interpersonal strain at work as a facet of burnout. A cross-sectional national survey of Canadian new graduate nurses was conducted. Registered nurses working in direct patient care in acute care settings with less than 3 years of experience were selected from provincial registry databases of 10 Canadian provinces. A total of 1009 of 3743 surveyed new graduate nurses were included in the final sample (useable response rate 27%). Participants received a mail survey package that included a letter of information, study questionnaire, and a $2 coffee voucher. To optimize response rates non-responders received a reminder letter four weeks after the initial mailing, followed by a second survey package four weeks after that. Ethics approval was obtained from the university ethics board prior to starting the study. Descriptive statistics and scale reliabilities were analyzed. Structural equation modelling with maximum likelihood estimation was used to test the fit between the data and the hypothesized model and to assess the factor structure of the expanded burnout measure. The hypothesized model was an acceptable fit for the data (χ(2) (164)=1221.38; χ(2) ratio=7.447; CFI=.921; IFI=.921; RMSEA=.08). All hypothesized paths were significant. Authentic leadership had a positive effect on areas of worklife, which in turn had a positive effect on occupational coping self-efficacy, resulting in lower burnout, which was associated with poor mental health. Authentic leaders may play an important role in creating positive working conditions and strengthening new nurses' confidence that help them cope with job demands, thereby protecting them from developing burnout and poor mental health. Leadership training to develop supervisors' authentic leadership skills may promote the development of person-job fit, thereby increasing occupational self-efficacy and new nurses' wellbeing. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. Role-Play Game-Enhanced English for a Specific-Purpose Vocabulary-Acquisition Framework

    ERIC Educational Resources Information Center

    Lu, Fang-Chen; Chang, Ben

    2016-01-01

    With the advantages of an engaged and authentic role-play game (RPG), this study aims to develop an RPG-enhanced English for specific purposes (ESP) vocabulary-acquisition framework, providing teachers and students a systematic way to incorporate RPG into ESP learning. The framework is composed of five parts: goal, three-level vocabulary sets, RPG…

  4. Integrating Iris and Signature Traits for Personal Authentication Using User-Specific Weighting

    PubMed Central

    Viriri, Serestina; Tapamo, Jules R.

    2012-01-01

    Biometric systems based on uni-modal traits are characterized by noisy sensor data, restricted degrees of freedom, non-universality and are susceptible to spoof attacks. Multi-modal biometric systems seek to alleviate some of these drawbacks by providing multiple evidences of the same identity. In this paper, a user-score-based weighting technique for integrating the iris and signature traits is presented. This user-specific weighting technique has proved to be an efficient and effective fusion scheme which increases the authentication accuracy rate of multi-modal biometric systems. The weights are used to indicate the importance of matching scores output by each biometrics trait. The experimental results show that our biometric system based on the integration of iris and signature traits achieve a false rejection rate (FRR) of 0.08% and a false acceptance rate (FAR) of 0.01%. PMID:22666032

  5. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    PubMed

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  6. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    PubMed Central

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887

  7. Molecular Authentication of the Traditional Medicinal Plant "Lakshman Booti" (Smithia conferta Sm.) and Its Adulterants through DNA Barcoding.

    PubMed

    Umdale, Suraj D; Kshirsagar, Parthraj R; Lekhak, Manoj M; Gaikwad, Nikhil B

    2017-07-01

    Smithia conferta Sm. is an annual herb widely used in Indian traditional medical practice and commonly known as "Lakshman booti" in Sanskrit. Morphological resemblance among the species of genus Smithia Aiton . leads to inaccurate identification and adulteration. This causes inconsistent therapeutic effects and also affects the quality of herbal medicine. This study aimed to generate potential barcode for authentication of S. conferta and its adulterants through DNA barcoding technique. Genomic DNA extracted from S. conferta and its adulterants was used as templates for polymerase chain reaction amplification of the barcoding regions. The amplicons were directed for sequencing, and species identification was conducted using BLASTn and unweighted pair-group method with arithmetic mean trees. In addition, the secondary structures of internal transcribed spacer (ITS) 2 region were predicted. The nucleotide sequence of ITS provides species-specific single nucleotide polymorphisms and sequence divergence (22%) than psb A- trn H (10.9%) and rbc L (3.1%) sequences. The ITS barcode indicates that S. conferta and Smithia sensitiva are closely related compared to other species. ITS is the most applicable barcode for molecular authentication of S. conferta , and further chloroplast barcodes should be tested for phylogenetic analysis of genus Smithia. The present investigation is the first effort of utilization of DNA barcode for molecular authentication of S. conferta and its adulterants. Also, this study expanded the application of the ITS2 sequence data in the authentication. The ITS has been proved as a potential and reliable candidate barcode for the authentication of S. conferta . Abbreviations used: BLASTn: Basic Local Alignment Search Tool for Nucleotide; MEGA: Molecular Evolutionary Genetic Analysis; EMBL: European Molecular Biology Laboratory; psb A- trn H: Photosystem II protein D1- stuctural RNA: His tRNA gene; rbcL: Ribulose 1,5 bi-phosphate carboxylase/oxygenase large subunit gene.

  8. Quantum dots for a high-throughput Pfu polymerase based multi-round polymerase chain reaction (PCR).

    PubMed

    Sang, Fuming; Zhang, Zhizhou; Yuan, Lin; Liu, Deli

    2018-02-26

    Multi-round PCR is an important technique for obtaining enough target DNA from rare DNA resources, and is commonly used in many fields including forensic science, ancient DNA analysis and cancer research. However, multi-round PCR is often aborted, largely due to the accumulation of non-specific amplification during repeated amplifications. Here, we developed a Pfu polymerase based multi-round PCR technique assisted by quantum dots (QDs). Different PCR assays, DNA polymerases (Pfu and Taq), DNA sizes and GC amounts were compared in this study. In the presence of QDs, PCR specificity could be retained even in the ninth-round amplification. Moreover, the longer and more complex the targets were, the earlier the abortion happened in multi-round PCR. However, no obvious enhancement of specificity was found in multi-round PCR using Taq DNA polymerase. Significantly, the fidelity of Pfu polymerase based multi-round PCR was not sacrificed in the presence of QDs. Besides, pre-incubation at 50 °C for an hour had no impact on multi-round PCR performance, which further authenticated the hot start effect of QDs modulated in multi-round PCR. The findings of this study demonstrated that a cost-effective and promising multi-round PCR technique for large-scale and high-throughput sample analysis could be established with high specificity, sensibility and accuracy.

  9. Philosophically Rooted Educational Authenticity as a Normative Ideal for Education: Is the International Baccalaureate's Primary Years Programme an Example of an Authentic Curriculum?

    ERIC Educational Resources Information Center

    Lüddecke, Florian

    2016-01-01

    Whereas the importance of authenticity in relation to educational contexts has been highlighted, educational authenticity (EA) has mainly referred to a real-life/world convergence or the notion of teacher authenticity, implying that authenticity can be taught and learnt. This view, however, has largely overlooked philosophical considerations so…

  10. The Effect of Authentic versus Non-Authentic Texts on Upper Intermediate Iranian EFL Learners' Vocabulary Retention

    ERIC Educational Resources Information Center

    Nematollahi, Shirin; Maghsoudi, Mojtaba

    2015-01-01

    In this current study the researchers have tried to investigate the possible effect of authentic and non-authentic texts on Iranian EFL learners' vocabulary retention. Despite the great deal of studies conducted in the area of EFL/ESL learning, the effect of authentic versus non-authentic texts have almost gained little attention and been…

  11. Fulfillment of HTTP Authentication Based on Alcatel OmniSwitch 9700

    NASA Astrophysics Data System (ADS)

    Liu, Hefu

    This paper provides a way of HTTP authentication On Alcatel OmniSwitch 9700. Authenticated VLANs control user access to network resources based on VLAN assignment and user authentication. The user can be authenticated through the switch via any standard Web browser software. Web browser client displays the username and password prompts. Then a way for HTML forms can be given to pass HTTP authentication data when it's submitted. A radius server will provide a database of user information that the switch checks whenever it tries to authenticate through the switch. Before or after authentication, the client can get an address from a Dhcp server.

  12. Authentic early experience in Medical Education: a socio-cultural analysis identifying important variables in learning interactions within workplaces.

    PubMed

    Yardley, Sarah; Brosnan, Caragh; Richardson, Jane; Hays, Richard

    2013-12-01

    This paper addresses the question 'what are the variables influencing social interactions and learning during Authentic Early Experience (AEE)?' AEE is a complex educational intervention for new medical students. Following critique of the existing literature, multiple qualitative methods were used to create a study framework conceptually orientated to a socio-cultural perspective. Study participants were recruited from three groups at one UK medical school: students, workplace supervisors, and medical school faculty. A series of intersecting spectra identified in the data describe dyadic variables that make explicit the parameters within which social interactions are conducted in this setting. Four of the spectra describe social processes related to being in workplaces and developing the ability to manage interactions during authentic early experiences. These are: (1) legitimacy expressed through invited participation or exclusion; (2) finding a role-a spectrum from student identity to doctor mindset; (3) personal perspectives and discomfort in transition from lay to medical; and, (4) taking responsibility for 'risk'-moving from aversion to management through graded progression of responsibility. Four further spectra describe educational consequences of social interactions. These spectra identify how the reality of learning is shaped through social interactions and are (1) generic-specific objectives, (2) parallel-integrated-learning, (3) context specific-transferable learning and (4) performing or simulating-reality. Attention to these variables is important if educators are to maximise constructive learning from AEE. Application of each of the spectra could assist workplace supervisors to maximise the positive learning potential of specific workplaces.

  13. Graph State-Based Quantum Group Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Liao, Longxia; Peng, Xiaoqi; Shi, Jinjing; Guo, Ying

    2017-02-01

    Motivated by the elegant structure of the graph state, we design an ingenious quantum group authentication scheme, which is implemented by operating appropriate operations on the graph state and can solve the problem of multi-user authentication. Three entities, the group authentication server (GAS) as a verifier, multiple users as provers and the trusted third party Trent are included. GAS and Trent assist the multiple users in completing the authentication process, i.e., GAS is responsible for registering all the users while Trent prepares graph states. All the users, who request for authentication, encode their authentication keys on to the graph state by performing Pauli operators. It demonstrates that a novel authentication scheme can be achieved with the flexible use of graph state, which can synchronously authenticate a large number of users, meanwhile the provable security can be guaranteed definitely.

  14. 22 CFR 92.36 - Authentication defined.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication defined. 92.36 Section 92.36... Notarial Acts § 92.36 Authentication defined. An authentication is a certification of the genuineness of... recognized in another jurisdiction. Documents which may require authentication include legal instruments...

  15. Authentic feminist? Authenticity and feminist identity in teenage feminists' talk.

    PubMed

    Calder-Dawe, Octavia; Gavey, Nicola

    2017-12-01

    This article explores how young people's feminist identities take shape in conjunction with a contemporary ideal of personal authenticity: to know and to express the 'real me'. Drawing from interviews with 18 teenagers living in Auckland, New Zealand, we examine a novel convergence of authenticity and feminism in participants' identity talk. For social psychologists interested in identity and politics, this convergence is intriguing: individualizing values such as authenticity are generally associated with disengagement with structural critique and with a repudiation of politicized and activist identities. Rather than seeking to categorize authentic feminism as an instance of either 'good/collective' or 'bad/individualized' feminist politics, we use discourse analysis to examine how the identity position of authentic feminist was constructed and to explore implications for feminist politics. On one hand, interviewees mobilized authentic feminism to affirm their commitment to normative liberal values of authenticity and self-expression. At the same time, the position of authentic feminist appeared to authorize risky feminist identifications and to justify counter-normative feelings, desires, and actions. To conclude, we explore how encountering others' intolerance of authentic feminism exposed interviewees to the limits of authenticity discourse, propelling some towards new understandings of the social world and their space for action within it. © 2017 The British Psychological Society.

  16. Evaluation and selection of security products for authentication of computer software

    NASA Astrophysics Data System (ADS)

    Roenigk, Mark W.

    2000-04-01

    Software Piracy is estimated to cost software companies over eleven billion dollars per year in lost revenue worldwide. Over fifty three percent of all intellectual property in the form of software is pirated on a global basis. Software piracy has a dramatic effect on the employment figures for the information industry as well. In the US alone, over 130,000 jobs are lost annually as a result of software piracy.

  17. Drawing on Indigenous Criteria for More Authentic Assessment in a Specific-Purpose Language Test: Health Professionals Interacting with Patients

    ERIC Educational Resources Information Center

    Pill, John

    2016-01-01

    The "indigenous assessment practices" (Jacoby & McNamara, 1999) in selected health professions were investigated to inform a review of the scope of assessment in the speaking sub-test of a specific-purpose English language test for health professionals, the Occupational English Test (OET). The assessment criteria in current use on…

  18. Authentication of an endangered herb Changium smyrnioides from different producing areas based on rDNA ITS sequences and allele-specific PCR.

    PubMed

    Sun, Xiaoqin; Wei, Yanglian; Qin, Minjian; Guo, Qiaosheng; Guo, Jianlin; Zhou, Yifeng; Hang, Yueyu

    2012-03-01

    The rDNA ITS region of 18 samples of Changium smyrnioides from 7 areas and of 2 samples of Chuanminshen violaceum were sequenced and analyzed. The amplified ITS region of the samples, including a partial sequence of ITS1 and complete sequences of 5.8S and ITS2, had a total length of 555 bp. After complete alignment, there were 49 variable sites, of which 45 were informative, when gaps were treated as missing data. Samples of C. smyrnioides from different locations could be identified exactly based on the variable sites. The maximum parsimony (MP) and neighbor joining (NJ) tree constructed from the ITS sequences based on Kumar's two-parameter model showed that the genetic distances of the C. smyrnioides samples from different locations were not always related to their geographical distances. A specific primer set for Allele-specific PCR authentication of C. violaceum from Jurong of Jiangsu was designed based on the SNP in the ITS sequence alignment. C. violaceum from the major genuine producing area in Jurong of Jiangsu could be identified exactly and quickly by Allele-specific PCR.

  19. Distributed Operations Planning

    NASA Technical Reports Server (NTRS)

    Fox, Jason; Norris, Jeffrey; Powell, Mark; Rabe, Kenneth; Shams, Khawaja

    2007-01-01

    Maestro software provides a secure and distributed mission planning system for long-term missions in general, and the Mars Exploration Rover Mission (MER) specifically. Maestro, the successor to the Science Activity Planner, has a heavy emphasis on portability and distributed operations, and requires no data replication or expensive hardware, instead relying on a set of services functioning on JPL institutional servers. Maestro works on most current computers with network connections, including laptops. When browsing down-link data from a spacecraft, Maestro functions similarly to being on a Web browser. After authenticating the user, it connects to a database server to query an index of data products. It then contacts a Web server to download and display the actual data products. The software also includes collaboration support based upon a highly reliable messaging system. Modifications made to targets in one instance are quickly and securely transmitted to other instances of Maestro. The back end that has been developed for Maestro could benefit many future missions by reducing the cost of centralized operations system architecture.

  20. 18 CFR 375.102 - Custody and authentication of Commission records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... authentication of Commission records. 375.102 Section 375.102 Conservation of Power and Water Resources FEDERAL... Provisions § 375.102 Custody and authentication of Commission records. (a) Custody of official records. (1...) Authentication of Commission action. All orders and other actions of the Commission shall be authenticated or...

  1. Should Teachers Be Authentic?

    ERIC Educational Resources Information Center

    Bialystok, Lauren

    2015-01-01

    Authenticity is often touted as an important virtue for teachers. But what do we mean when we say that a teacher ought to be "authentic"? Research shows that discussions of teacher authenticity frequently refer to other character traits or simply to teacher effectiveness, but authenticity is a unique concept with a long philosophical…

  2. Richard Peters and Valuing Authenticity

    ERIC Educational Resources Information Center

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  3. Defining the questions: a research agenda for nontraditional authentication in arms control

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hauck, Danielle K; Mac Arthur, Duncan W; Smith, Morag K

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidencesmore » in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.« less

  4. Do We Need to Design Course-Based Undergraduate Research Experiences for Authenticity?

    PubMed Central

    Rowland, Susan; Pedwell, Rhianna; Lawrie, Gwen; Lovie-Toon, Joseph; Hung, Yu

    2016-01-01

    The recent push for more authentic teaching and learning in science, technology, engineering, and mathematics indicates a shared agreement that undergraduates require greater exposure to professional practices. There is considerable variation, however, in how “authentic” science education is defined. In this paper we present our definition of authenticity as it applies to an “authentic” large-scale undergraduate research experience (ALURE); we also look to the literature and the student voice for alternate perceptions around this concept. A metareview of science education literature confirmed the inconsistency in definitions and application of the notion of authentic science education. An exploration of how authenticity was explained in 604 reflections from ALURE and traditional laboratory students revealed contrasting and surprising notions and experiences of authenticity. We consider the student experience in terms of alignment with 1) the intent of our designed curriculum and 2) the literature definitions of authentic science education. These findings contribute to the conversation surrounding authenticity in science education. They suggest two things: 1) educational experiences can have significant authenticity for the participants, even when there is no purposeful design for authentic practice, and 2) the continuing discussion of and design for authenticity in UREs may be redundant. PMID:27909029

  5. Teaching Environmental Geochemistry: An Authentic Inquiry Approach

    ERIC Educational Resources Information Center

    Koretsky, Carla M.; Petcovic, Heather L.; Rowbotham, Katherine L.

    2012-01-01

    A field-based environmental geochemistry course was developed at Western Michigan University for undergraduate geosciences and environmental studies students to (1) improve student understanding of complex environmental systems, specifically targeting lake systems; (2) facilitate student development of professional-level, field- and…

  6. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  7. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  8. Identification of chemical markers in Cordyceps sinensis by HPLC-MS/MS.

    PubMed

    Hu, Hankun; Xiao, Ling; Zheng, Baogen; Wei, Xin; Ellis, Alexis; Liu, Yi-Ming

    2015-10-01

    Authentication and quality assessment of Cordyceps sinensis, a precious and pricey natural product that offers a variety of health benefits, is highly significant. To identify effective chemical markers, authentic C. sinensis was thoroughly screened by using HPLC-MS/MS. In addition to many previously reported ingredients, two glycosides, i.e., cyclo-Ala-Leu-rhamnose and Phe-o-glucose, were detected for the first time in this material. Six ingredients detected, including cordycepin, D-mannitol, Phe, Phe-o-glucose, cyclo-Gly-Pro, and cyclo-Ala-Leu-rhamnose, were selected as a collection of chemical markers. An HPLC-MS/MS method was developed to simultaneously quantify them with sensitivity and specificity. The method had limits of detection ranging from 0.008 μg mL(-1) for cordycepin to 0.75 μg mL(-1) for cyclo-Gly-Pro. Recovery was found between 96 and 103 % in all tests. To evaluate the effectiveness of the marker collection proposed, five authentic C. sinensis samples and five samples of its substitutes were analyzed. Cordycepin, D-mannitol, and Phe were found present in all samples. The contents ranged from 0.0076 to 0.029 % (w/w) for cordycepin, 0.33 to 18.9 % for mannitol, and 0.0013 to 0.642 % for Phe. Interestingly, the two glycosides, Phe-o-glucose and cyclo-Ala-Leu-rhamnose, were detected only in authentic C. sinensis samples. These results indicated that the proposed protocol based on HPLC-MS/MS quantification of the markers might have a great potential in authentication and quality assessment of C. sinensis. Graphical abstract Chemical markers of C. sinensis identified in this work.

  9. Provably Secure Password-based Authentication in TLS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised tomore » the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.« less

  10. Promises and Challenges in Continuous Tracking Utilizing Amino Acids in Skin Secretions for Active Multi-Factor Biometric Authentication for Cybersecurity.

    PubMed

    Agudelo, Juliana; Privman, Vladimir; Halámek, Jan

    2017-07-05

    We consider a new concept of biometric-based cybersecurity systems for active authentication by continuous tracking, which utilizes biochemical processing of metabolites present in skin secretions. Skin secretions contain a large number of metabolites and small molecules that can be targeted for analysis. Here we argue that amino acids found in sweat can be exploited for the establishment of an amino acid profile capable of identifying an individual user of a mobile or wearable device. Individual and combinations of amino acids processed by biocatalytic cascades yield physical (optical or electronic) signals, providing a time-series of several outputs that, in their entirety, should suffice to authenticate a specific user based on standard statistical criteria. Initial results, motivated by biometrics, indicate that single amino acid levels can provide analog signals that vary according to the individual donor, albeit with limited resolution versus noise. However, some such assays offer digital separation (into well-defined ranges of values) according to groups such as age, biological sex, race, and physiological state of the individual. Multi-input biocatalytic cascades that handle several amino acid signals to yield a single digital-type output, as well as continuous-tracking time-series data rather than a single-instance sample, should enable active authentication at the level of an individual. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. Experimental demonstration of an isotope-sensitive warhead verification technique using nuclear resonance fluorescence.

    PubMed

    Vavrek, Jayson R; Henderson, Brian S; Danagoulian, Areg

    2018-04-24

    Future nuclear arms reduction efforts will require technologies to verify that warheads slated for dismantlement are authentic without revealing any sensitive weapons design information to international inspectors. Despite several decades of research, no technology has met these requirements simultaneously. Recent work by Kemp et al. [Kemp RS, Danagoulian A, Macdonald RR, Vavrek JR (2016) Proc Natl Acad Sci USA 113:8618-8623] has produced a novel physical cryptographic verification protocol that approaches this treaty verification problem by exploiting the isotope-specific nature of nuclear resonance fluorescence (NRF) measurements to verify the authenticity of a warhead. To protect sensitive information, the NRF signal from the warhead is convolved with that of an encryption foil that contains key warhead isotopes in amounts unknown to the inspector. The convolved spectrum from a candidate warhead is statistically compared against that from an authenticated template warhead to determine whether the candidate itself is authentic. Here we report on recent proof-of-concept warhead verification experiments conducted at the Massachusetts Institute of Technology. Using high-purity germanium (HPGe) detectors, we measured NRF spectra from the interrogation of proxy "genuine" and "hoax" objects by a 2.52 MeV endpoint bremsstrahlung beam. The observed differences in NRF intensities near 2.2 MeV indicate that the physical cryptographic protocol can distinguish between proxy genuine and hoax objects with high confidence in realistic measurement times.

  12. Using standardized patients versus video cases for representing clinical problems in problem-based learning.

    PubMed

    Yoon, Bo Young; Choi, Ikseon; Choi, Seokjin; Kim, Tae-Hee; Roh, Hyerin; Rhee, Byoung Doo; Lee, Jong-Tae

    2016-06-01

    The quality of problem representation is critical for developing students' problem-solving abilities in problem-based learning (PBL). This study investigates preclinical students' experience with standardized patients (SPs) as a problem representation method compared to using video cases in PBL. A cohort of 99 second-year preclinical students from Inje University College of Medicine (IUCM) responded to a Likert scale questionnaire on their learning experiences after they had experienced both video cases and SPs in PBL. The questionnaire consisted of 14 items with eight subcategories: problem identification, hypothesis generation, motivation, collaborative learning, reflective thinking, authenticity, patient-doctor communication, and attitude toward patients. The results reveal that using SPs led to the preclinical students having significantly positive experiences in boosting patient-doctor communication skills; the perceived authenticity of their clinical situations; development of proper attitudes toward patients; and motivation, reflective thinking, and collaborative learning when compared to using video cases. The SPs also provided more challenges than the video cases during problem identification and hypotheses generation. SPs are more effective than video cases in delivering higher levels of authenticity in clinical problems for PBL. The interaction with SPs engages preclinical students in deeper thinking and discussion; growth of communication skills; development of proper attitudes toward patients; and motivation. Considering the higher cost of SPs compared with video cases, SPs could be used most advantageously during the preclinical period in the IUCM curriculum.

  13. Multi-factor authentication

    DOEpatents

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  14. Examining the relationship between authenticity and self-handicapping.

    PubMed

    Akin, Ahmet; Akin, Umran

    2014-12-01

    Self-handicapping includes strategies of externalization in which people excuse failure and internalize success, but which also prevents them from behaving in an authentic way. The goal was to investigate the relation of authenticity with self-handicapping. The study was conducted with 366 university students (176 men, 190 women; M age = 20.2 yr.). Participants completed the Turkish version of the Authenticity Scale and the Self-handicapping Scale. Self-handicapping was correlated positively with two factors of authenticity, accepting external influence and self-alienation, and negatively with the authentic living factor. A multiple regression analysis indicated that self-handicapping was predicted positively by self-alienation and accepting external influence and negatively by authentic living, accounting for 21% of the variance collectively. These results demonstrated the negative association of authenticity with self-handicapping.

  15. Image authentication using distributed source coding.

    PubMed

    Lin, Yao-Chung; Varodayan, David; Girod, Bernd

    2012-01-01

    We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.

  16. Resource optimized TTSH-URA for multimedia stream authentication in swallowable-capsule-based wireless body sensor networks.

    PubMed

    Wang, Wei; Wang, Chunqiu; Zhao, Min

    2014-03-01

    To ease the burdens on the hospitalization capacity, an emerging swallowable-capsule technology has evolved to serve as a remote gastrointestinal (GI) disease examination technique with the aid of the wireless body sensor network (WBSN). Secure multimedia transmission in such a swallowable-capsule-based WBSN faces critical challenges including energy efficiency and content quality guarantee. In this paper, we propose a joint resource allocation and stream authentication scheme to maintain the best possible video quality while ensuring security and energy efficiency in GI-WBSNs. The contribution of this research is twofold. First, we establish a unique signature-hash (S-H) diversity approach in the authentication domain to optimize video authentication robustness and the authentication bit rate overhead over a wireless channel. Based on the full exploration of S-H authentication diversity, we propose a new two-tier signature-hash (TTSH) stream authentication scheme to improve the video quality by reducing authentication dependence overhead while protecting its integrity. Second, we propose to combine this authentication scheme with a unique S-H oriented unequal resource allocation (URA) scheme to improve the energy-distortion-authentication performance of wireless video delivery in GI-WBSN. Our analysis and simulation results demonstrate that the proposed TTSH with URA scheme achieves considerable gain in both authenticated video quality and energy efficiency.

  17. Infusing Authentic Inquiry into Biotechnology

    NASA Astrophysics Data System (ADS)

    Hanegan, Nikki L.; Bigler, Amber

    2009-10-01

    Societal benefit depends on the general public's understandings of biotechnology (Betsch in World J Microbiol Biotechnol 12:439-443, 1996; Dawson and Cowan in Int J Sci Educ 25(1):57-69, 2003; Schiller in Business Review: Federal Reserve Bank of Philadelphia (Fourth Quarter), 2002; Smith and Emmeluth in Am Biol Teach 64(2):93-99, 2002). A National Science Foundation funded survey of high school biology teachers reported that hands-on biotechnology education exists in advanced high school biology in the United States, but is non-existent in mainstream biology coursework (Micklos et al. in Biotechnology labs in American high schools, 1998). The majority of pre-service teacher content preparation courses do not teach students appropriate content knowledge through the process of inquiry. A broad continuum exists when discussing inquiry-oriented student investigations (Hanegan et al. in School Sci Math J 109(2):110-134, 2009). Depending on the amount of structure in teacher lessons, inquiries can often be categorized as guided or open. The lesson can be further categorized as simple or authentic (Chinn and Malhotra in Sci Educ 86(2):175-218, 2002). Although authentic inquiries provide the best opportunities for cognitive development and scientific reasoning, guided and simple inquiries are more often employed in the classroom (Crawford in J Res Sci Teach 37(9):916-937, 2000; NRC in Inquiry and the national science education standards: a guide for teaching and learning, 2000). For the purposes of this study we defined inquiry as "authentic" if original research problems were resolved (Hanegan et al. in School Sci Math J 109(2):110-134, 2009; Chinn and Malhotra in Sci Educ 86(2):175-218, 2002; Roth in Authentic school science: knowing and learning in open-inquiry science laboratories, 1995). The research question to guide this study through naturalistic inquiry research methods was: How will participants express whether or not an authentic inquiry experience enhanced their understanding of biotechnology? As respondents explored numerous ideas in order to develop a workable research question, struggled to create a viable protocol, executed their experiment, and then evaluated their results, they commented on unexpected topics regarding the nature of science as well as specific content knowledge relating to their experiments. Four out of five participants reported they learned the most during authentic inquiry laboratory experience.

  18. Authentic leadership: application to women leaders

    PubMed Central

    Hopkins, Margaret M.; O’Neil, Deborah A.

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women. PMID:26236254

  19. Xavier's Take on Authentic Writing: Structuring Choices for Expression and Impact

    ERIC Educational Resources Information Center

    Behizadeh, Nadia

    2015-01-01

    Because authenticity in education is a subjective judgment regarding the meaningfulness of an activity, a need exists to co-investigate with students classroom factors increasing authenticity of writing. In this case study, one 8th grade student's needs for authentic writing are explored in detail. Xavier's take on authentic writing…

  20. Authentic leadership: application to women leaders.

    PubMed

    Hopkins, Margaret M; O'Neil, Deborah A

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women.

  1. Science Immersion

    ERIC Educational Resources Information Center

    Burgin, Stephen R.; Sadler, Troy D.

    2013-01-01

    This article describes summer programs that allow high school students to participate in an "authentic scientific research experience" (ASRE). These summer programs are specifically designed to embed students in working laboratories and research groups. Summer ASRE programs for secondary learners range in length from a couple of weeks to…

  2. How Captain Amerika uses neural networks to fight crime

    NASA Technical Reports Server (NTRS)

    Rogers, Steven K.; Kabrisky, Matthew; Ruck, Dennis W.; Oxley, Mark E.

    1994-01-01

    Artificial neural network models can make amazing computations. These models are explained along with their application in problems associated with fighting crime. Specific problems addressed are identification of people using face recognition, speaker identification, and fingerprint and handwriting analysis (biometric authentication).

  3. Review of modern biometric user authentication and their development prospects

    NASA Astrophysics Data System (ADS)

    Boriev, Z. V.; Sokolov, S. S.; Nyrkov, A. P.

    2015-09-01

    This article discusses the possibility of using biometric information technologies in management. Made a brief overview of access control and time attendance. Analyzed biometrics and identification system user. Recommendations on the use of various systems depending on the specific tasks.

  4. Biometric identity management for standard mobile medical networks.

    PubMed

    Egner, Alexandru; Soceanu, Alexandru; Moldoveanu, Florica

    2012-01-01

    The explosion of healthcare costs over the last decade has prompted the ICT industry to respond with solutions for reducing costs while improving healthcare quality. The ISO/IEEE 11073 family of standards recently released is the first step towards interoperability of mobile medical devices used in patient environments. The standards do not, however, tackle security problems, such as identity management, or the secure exchange of medical data. This paper proposes an enhancement of the ISO/IEEE 11073-20601 protocol with an identity management system based on biometry. The paper describes a novel biometric-based authentication process, together with the biometric key generation algorithm. The proposed extension of the ISO/IEEE 11073-20601 is also presented.

  5. Localized lossless authentication watermark (LAW)

    NASA Astrophysics Data System (ADS)

    Celik, Mehmet U.; Sharma, Gaurav; Tekalp, A. Murat; Saber, Eli S.

    2003-06-01

    A novel framework is proposed for lossless authentication watermarking of images which allows authentication and recovery of original images without any distortions. This overcomes a significant limitation of traditional authentication watermarks that irreversibly alter image data in the process of watermarking and authenticate the watermarked image rather than the original. In particular, authenticity is verified before full reconstruction of the original image, whose integrity is inferred from the reversibility of the watermarking procedure. This reduces computational requirements in situations when either the verification step fails or the zero-distortion reconstruction is not required. A particular instantiation of the framework is implemented using a hierarchical authentication scheme and the lossless generalized-LSB data embedding mechanism. The resulting algorithm, called localized lossless authentication watermark (LAW), can localize tampered regions of the image; has a low embedding distortion, which can be removed entirely if necessary; and supports public/private key authentication and recovery options. The effectiveness of the framework and the instantiation is demonstrated through examples.

  6. Authentication of meat and meat products vs. detection of animal species in feed - what is the difference?

    NASA Astrophysics Data System (ADS)

    Nešić, K.; Stojanović, D.; Baltić, Ž. M.

    2017-09-01

    Authenticity of food is an issue that is growing in awareness and concern. Although food adulteration has been present since antiquity, it has broadened to include entire global populations as modern food supply chains have expanded, enriched and become more complex. Different forms of adulteration influence not only the quality of food products, but also may cause harmful health effects. Meat and meat products are often subjected to counterfeiting, mislabelling and similar fraudulent activities, while substitutions of meat ingredients with other animal species is one among many forms of food fraud. Feed is also subject to testing for the presence of different animal species, but as part of the eradication process of transmissible spongiform encephalopathies (TSE). In both food and feed cases, the final goal is consumer protection, which should be provided by quick, precise and specific tools. Several analytical tests have been employed for such needs. This paper provides an overview of authentication of meat and meat products compared with species identification in feed control, highlighting the most prevalent laboratory methods.

  7. Authentication of Cordyceps sinensis by DNA Analyses: Comparison of ITS Sequence Analysis and RAPD-Derived Molecular Markers.

    PubMed

    Lam, Kelly Y C; Chan, Gallant K L; Xin, Gui-Zhong; Xu, Hong; Ku, Chuen-Fai; Chen, Jian-Ping; Yao, Ping; Lin, Huang-Quan; Dong, Tina T X; Tsim, Karl W K

    2015-12-15

    Cordyceps sinensis is an endoparasitic fungus widely used as a tonic and medicinal food in the practice of traditional Chinese medicine (TCM). In historical usage, Cordyceps specifically is referring to the species of C. sinensis. However, a number of closely related species are named themselves as Cordyceps, and they are sold commonly as C. sinensis. The substitutes and adulterants of C. sinensis are often introduced either intentionally or accidentally in the herbal market, which seriously affects the therapeutic effects or even leads to life-threatening poisoning. Here, we aim to identify Cordyceps by DNA sequencing technology. Two different DNA-based approaches were compared. The internal transcribed spacer (ITS) sequences and the random amplified polymorphic DNA (RAPD)-sequence characterized amplified region (SCAR) were developed here to authenticate different species of Cordyceps. Both approaches generally enabled discrimination of C. sinensis from others. The application of the two methods, supporting each other, increases the security of identification. For better reproducibility and faster analysis, the SCAR markers derived from the RAPD results provide a new method for quick authentication of Cordyceps.

  8. Application of high-resolution melting analysis for authenticity testing of valuable Dendrobium commercial products.

    PubMed

    Dong, Xiaoman; Jiang, Chao; Yuan, Yuan; Peng, Daiyin; Luo, Yuqin; Zhao, Yuyang; Huang, Luqi

    2018-01-01

    The accurate identification of botanical origin in commercial products is important to ensure food authenticity and safety for consumers. The Dendrobium species have long been commercialised as functional food supplements and herbal medicines in Asia. Three valuable Dendrobium species, namely Dendrobium officinale, D. huoshanense and D. moniliforme, are often mutually adulterated in trade products in pursuit of higher profit. In this paper, a rapid and reliable semi-quantitative method for identifying the botanical origin of Dendrobium products in terminal markets was developed using high-resolution melting (HRM) analysis with specific primer pairs to target the trnL-F region. The HRM analysis method detected amounts of D. moniliforme adulterants as low as 1% in D. huoshanense or D. officinale products. The results have demonstrated that HRM analysis is a fast and effective tool for the differentiation of these Dendrobium species both for their authenticity as well as for the semi-quantitative determination of the purity of their processed products. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  9. Time-Domain Reflectometry for Tamper Indication in Unattended Monitoring Systems for Safeguards

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tedeschi, Jonathan R.; Smith, Leon E.; Moore, David E.

    2014-12-01

    The International Atomic Energy Agency (IAEA) continues to expand its use of unattended, remotely monitored measurement systems. An increasing number of systems and an expanding family of instruments create challenges in terms of deployment efficiency and the implementation of data authentication measures. Pacific Northwest National Laboratory (PNNL) leads a collaboration that is exploring various tamper-indicating (TI) measures that could help to address some of the long-standing detector and data-transmission authentication challenges with IAEA’s unattended systems. PNNL is investigating the viability of active time-domain reflectometry (TDR) along two parallel but interconnected paths: (1) swept-frequency TDR as the highly flexible, laboratory goldmore » standard to which field-deployable options can be compared, and (2) a low-cost commercially available spread-spectrum TDR technology as one option for field implementation. This report describes PNNL’s progress and preliminary findings from the first year of the study, and describes the path forward.« less

  10. Changing carbon isotope ratio of atmospheric carbon dioxide: implications for food authentication.

    PubMed

    Peck, William H; Tubman, Stephanie C

    2010-02-24

    Carbon isotopes are often used to detect the addition of foreign sugars to foods. This technique takes advantage of the natural difference in carbon isotope ratio between C(3) and C(4) plants. Many foods are derived from C(3) plants, but the low-cost sweeteners corn and sugar cane are C(4) plants. Most adulteration studies do not take into account the secular shift of the carbon isotope ratio of atmospheric carbon dioxide caused by fossil fuel burning, a shift also seen in plant tissues. As a result statistical tests and threshold values that evaluate authenticity of foods based on carbon isotope ratios may need to be corrected for changing atmospheric isotope values. Literature and new data show that the atmospheric trend in carbon isotopes is seen in a 36-year data set of maple syrup analyses (n = 246), demonstrating that published thresholds for cane or corn sugar adulteration in maple syrup (and other foods) have become progressively more lenient over time.

  11. The Technology Information Environment with Industry{trademark} system description

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Detry, R.; Machin, G.

    The Technology Information Environment with Industry (TIE-In{trademark}) provides users with controlled access to distributed laboratory resources that are packaged in intelligent user interfaces. These interfaces help users access resources without requiring the user to have technical or computer expertise. TIE-In utilizes existing, proven technologies such as the Kerberos authentication system, X-Windows, and UNIX sockets. A Front End System (FES) authenticates users and allows them to register for resources and subsequently access them. The FES also stores status and accounting information, and provides an automated method for the resource owners to recover costs from users. The resources available through TIE-In aremore » typically laboratory-developed applications that are used to help design, analyze, and test components in the nation`s nuclear stockpile. Many of these applications can also be used by US companies for non-weapons-related work. TIE-In allows these industry partners to obtain laboratory-developed technical solutions without requiring them to duplicate the technical resources (people, hardware, and software) at Sandia.« less

  12. How to Speak an Authentication Secret Securely from an Eavesdropper

    NASA Astrophysics Data System (ADS)

    O'Gorman, Lawrence; Brotman, Lynne; Sammon, Michael

    When authenticating over the telephone or mobile headphone, the user cannot always assure that no eavesdropper hears the password or authentication secret. We describe an eavesdropper-resistant, challenge-response authentication scheme for spoken authentication where an attacker can hear the user’s voiced responses. This scheme entails the user to memorize a small number of plaintext-ciphertext pairs. At authentication, these are challenged in random order and interspersed with camouflage elements. It is shown that the response can be made to appear random so that no information on the memorized secret can be learned by eavesdroppers. We describe the method along with parameter value tradeoffs of security strength, authentication time, and memory effort. This scheme was designed for user authentication of wireless headsets used for hands-free communication by healthcare staff at a hospital.

  13. A Lightweight Continuous Authentication Protocol for the Internet of Things.

    PubMed

    Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-04-05

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  14. Three-dimensional quick response code based on inkjet printing of upconversion fluorescent nanoparticles for drug anti-counterfeiting.

    PubMed

    You, Minli; Lin, Min; Wang, Shurui; Wang, Xuemin; Zhang, Ge; Hong, Yuan; Dong, Yuqing; Jin, Guorui; Xu, Feng

    2016-05-21

    Medicine counterfeiting is a serious issue worldwide, involving potentially devastating health repercussions. Advanced anti-counterfeit technology for drugs has therefore aroused intensive interest. However, existing anti-counterfeit technologies are associated with drawbacks such as the high cost, complex fabrication process, sophisticated operation and incapability in authenticating drug ingredients. In this contribution, we developed a smart phone recognition based upconversion fluorescent three-dimensional (3D) quick response (QR) code for tracking and anti-counterfeiting of drugs. We firstly formulated three colored inks incorporating upconversion nanoparticles with RGB (i.e., red, green and blue) emission colors. Using a modified inkjet printer, we printed a series of colors by precisely regulating the overlap of these three inks. Meanwhile, we developed a multilayer printing and splitting technology, which significantly increases the information storage capacity per unit area. As an example, we directly printed the upconversion fluorescent 3D QR code on the surface of drug capsules. The 3D QR code consisted of three different color layers with each layer encoded by information of different aspects of the drug. A smart phone APP was designed to decode the multicolor 3D QR code, providing the authenticity and related information of drugs. The developed technology possesses merits in terms of low cost, ease of operation, high throughput and high information capacity, thus holds great potential for drug anti-counterfeiting.

  15. Assessment of the Authenticity of Herbal Dietary Supplements: Comparison of Chemical and DNA Barcoding Methods.

    PubMed

    Pawar, Rahul S; Handy, Sara M; Cheng, Raymond; Shyong, Nicole; Grundel, Erich

    2017-07-01

    About 7 % of the U. S. population reports using botanical dietary supplements. Increased use of such supplements has led to discussions related to their authenticity and quality. Reports of adulteration with substandard materials or pharmaceuticals are of concern because such substitutions, whether inadvertent or deliberate, may reduce the efficacy of specific botanicals or lead to adverse events. Methods for verifying the identity of botanicals include macroscopic and microscopic examinations, chemical analysis, and DNA-based methods including DNA barcoding. Macroscopic and microscopic examinations may fail when a supplement consists of botanicals that have been processed beyond the ability to provide morphological characterizations. Chemical analysis of specific marker compounds encounters problems when these compounds are not distinct to a given species or when purified reference standards are not available. Recent investigations describing DNA barcoding analysis of botanical dietary supplements have raised concerns about the authenticity of the supplements themselves as well as the appropriateness of using DNA barcoding techniques with finished botanical products. We collected 112 market samples of frequently consumed botanical dietary supplements of ginkgo, soy, valerian, yohimbe, and St. John's wort and analyzed each for specific chemical markers (i.e., flavonol glycosides, total isoflavones, total valerenic acids, yohimbine, and hypericins, respectively). We used traditional DNA barcoding techniques targeting the nuclear ITS2 gene and the chloroplast gene psb A- trn H on the same samples to determine the presence of DNA of the labelled ingredient. We compared the results obtained by both methods to assess the contribution of each in determining the identity of the samples. Georg Thieme Verlag KG Stuttgart · New York.

  16. U.S. pharmacy policy: a public health perspective on safety and cost.

    PubMed

    Rosenau, Pauline Vaillancourt; Lal, Lincy S; Glasser, Jay H

    2009-01-01

    A public health perspective based on social justice and a population health point of view emphasizes pharmacy policy innovations regarding safety and costs. Such policies that effectively reduce costs include controlling profits, establishing profit targets, extending prescription providers, revising prescription classification schemes, emphasizing generic medications, and establishing formularies. Public education and universal programs may reduce costs, but co-pays and "cost-sharing" do not. Switching medications to over-the-counter (OTC) status, pill splitting, and importing medication from abroad are poor substitutes for authentic public health pharmacy policy. Where policy changes yield savings, public health insists that these savings should be used to increase access and improve population health. In the future, pharmacy policies may emphasize public health accountability more than individual liberty because of potential cost savings to society. Fear of litigation, as an informal mechanism of focusing manufacturer's attention on safety, is inefficient; public health pharmacy policy regarding safety looks toward a more active regulatory role on the part of government. A case study of direct-to-consumer advertising illustrates the complexity of public health pharmacy policy.

  17. Authentication systems for securing clinical documentation workflows. A systematic literature review.

    PubMed

    Schwartze, J; Haarbrandt, B; Fortmeier, D; Haux, R; Seidel, C

    2014-01-01

    Integration of electronic signatures embedded in health care processes in Germany challenges health care service and supply facilities. The suitability of the signature level of an eligible authentication procedure is confirmed for a large part of documents in clinical practice. However, the concrete design of such a procedure remains unclear. To create a summary of usable user authentication systems suitable for clinical workflows. A Systematic literature review based on nine online bibliographic databases. Search keywords included authentication, access control, information systems, information security and biometrics with terms user authentication, user identification and login in title or abstract. Searches were run between 7 and 12 September 2011. Relevant conference proceedings were searched manually in February 2013. Backward reference search of selected results was done. Only publications fully describing authentication systems used or usable were included. Algorithms or purely theoretical concepts were excluded. Three authors did selection independently. DATA EXTRACTION AND ASSESSMENT: Semi-structured extraction of system characteristics was done by the main author. Identified procedures were assessed for security and fulfillment of relevant laws and guidelines as well as for applicability. Suitability for clinical workflows was derived from the assessments using a weighted sum proposed by Bonneau. Of 7575 citations retrieved, 55 publications meet our inclusion criteria. They describe 48 different authentication systems; 39 were biometric and nine graphical password systems. Assessment of authentication systems showed high error rates above European CENELEC standards and a lack of applicability of biometric systems. Graphical passwords did not add overall value compared to conventional passwords. Continuous authentication can add an additional layer of safety. Only few systems are suitable partially or entirely for use in clinical processes. Suitability strongly depends on national or institutional requirements. Four authentication systems seem to fulfill requirements of authentication procedures for clinical workflows. Research is needed in the area of continuous authentication with biometric methods. A proper authentication system should combine all factors of authentication implementing and connecting secure individual measures.

  18. Authentic leadership: a new theory for nursing or back to basics?

    PubMed

    Wong, Carol; Cummings, Greta

    2009-01-01

    Authentic leadership is an emerging theoretical model purported to focus on the root component of effective leadership. The purpose of this paper is to describe the relevance of authentic leadership to the advancement of nursing leadership practice and research and address the question of whether this is a new theory for leadership or an old one in new packaging. The paper outlines the origins and key elements of the model, assesses the theoretical, conceptual and measurement issues associated with authentic leadership and compares it with other leadership theories frequently reported in the nursing literature. The emerging authentic leadership theory holds promise for explaining the underlying processes by which authentic leaders and followers influence work outcomes and organizational performance. Construct validity of authentic leadership has preliminary documentation and a few studies have shown positive relationships between authenticity and trust. Furthermore, the clarity of the authenticity construct and comprehensiveness of the overall theoretical framework provide a fruitful base for future research examining the relationship between authentic leadership and the creation of healthier work environments. A clear focus on the relational aspects of leadership, the foundational moral/ethical component, a potential linkage of positive psychological capital to work engagement and the emphasis on leader and follower development in the authentic leadership framework are closely aligned to current and future nursing leadership practice and research priorities for the creation of sustainable changes in nursing work environments.

  19. Explicit authenticity and stimulus features interact to modulate BOLD response induced by emotional speech.

    PubMed

    Drolet, Matthis; Schubotz, Ricarda I; Fischer, Julia

    2013-06-01

    Context has been found to have a profound effect on the recognition of social stimuli and correlated brain activation. The present study was designed to determine whether knowledge about emotional authenticity influences emotion recognition expressed through speech intonation. Participants classified emotionally expressive speech in an fMRI experimental design as sad, happy, angry, or fearful. For some trials, stimuli were cued as either authentic or play-acted in order to manipulate participant top-down belief about authenticity, and these labels were presented both congruently and incongruently to the emotional authenticity of the stimulus. Contrasting authentic versus play-acted stimuli during uncued trials indicated that play-acted stimuli spontaneously up-regulate activity in the auditory cortex and regions associated with emotional speech processing. In addition, a clear interaction effect of cue and stimulus authenticity showed up-regulation in the posterior superior temporal sulcus and the anterior cingulate cortex, indicating that cueing had an impact on the perception of authenticity. In particular, when a cue indicating an authentic stimulus was followed by a play-acted stimulus, additional activation occurred in the temporoparietal junction, probably pointing to increased load on perspective taking in such trials. While actual authenticity has a significant impact on brain activation, individual belief about stimulus authenticity can additionally modulate the brain response to differences in emotionally expressive speech.

  20. Optical authentication based on moiré effect of nonlinear gratings in phase space

    NASA Astrophysics Data System (ADS)

    Liao, Meihua; He, Wenqi; Wu, Jiachen; Lu, Dajiang; Liu, Xiaoli; Peng, Xiang

    2015-12-01

    An optical authentication scheme based on the moiré effect of nonlinear gratings in phase space is proposed. According to the phase function relationship of the moiré effect in phase space, an arbitrary authentication image can be encoded into two nonlinear gratings which serve as the authentication lock (AL) and the authentication key (AK). The AL is stored in the authentication system while the AK is assigned to the authorized user. The authentication procedure can be performed using an optoelectronic approach, while the design process is accomplished by a digital approach. Furthermore, this optical authentication scheme can be extended for multiple users with different security levels. The proposed scheme can not only verify the legality of a user identity, but can also discriminate and control the security levels of legal users. Theoretical analysis and simulation experiments are provided to verify the feasibility and effectiveness of the proposed scheme.

  1. Vein matching using artificial neural network in vein authentication systems

    NASA Astrophysics Data System (ADS)

    Noori Hoshyar, Azadeh; Sulaiman, Riza

    2011-10-01

    Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.

  2. Are You Listening to Your Computer?

    ERIC Educational Resources Information Center

    Shugg, Alan

    1992-01-01

    Accepting the great motivational value of computers in second-language learning, this article describes ways to use authentic language recorded on a computer with HyperCard. Graphics, sound, and hardware/software requirements are noted, along with brief descriptions of programing with sound and specific programs. (LB)

  3. Get Linked or Get Lost: Marketing Strategy for the Internet.

    ERIC Educational Resources Information Center

    Aldridge, Alicia; Forcht, Karen; Pierson, Joan

    1997-01-01

    To cultivate an online market share, companies must design marketing strategies specifically for the Internet. This article examines the nature of business on the Internet, highlighting demographics, user control, accessibility, communication, authenticity, competition, and security and proposes a marketing strategy, including targeting and…

  4. Intellectual Entrepreneurship as a Platform for Transforming Higher Education

    ERIC Educational Resources Information Center

    Beckman, Gary D.; Cherwitz, Richard A.

    2008-01-01

    The thesis of this article is that "Intellectual Entrepreneurship (IE)" provides an intellectually authentic philosophical foundation capable of sustaining cross-campus entrepreneurship education. Drawing upon initiatives begun at The University of Texas at Austin, we document how IE educates "citizen-scholars." Specifically,…

  5. Red/Green Currant and Sea Buckthorn Berry Press Residues as Potential Sources of Antioxidants for Food Use.

    PubMed

    Puganen, Anna; Kallio, Heikki P; Schaich, Karen M; Suomela, Jukka-Pekka; Yang, Baoru

    2018-04-04

    The potential for using extracts of press residues from black, green, red, and white currants and from sea buckthorn berries as sources of antioxidants for foods use was investigated. Press residues were extracted with ethanol in four consecutive extractions, and total Folin-Ciocalteu (F-C) reactive material and authentic phenolic compounds were determined. Radical quenching capability and mechanisms were determined from total peroxyl radical-trapping antioxidant capacity (TRAP) and oxygen radical absorbance capacity (ORAC) assays and from diphenylpicrylhydrazyl (DPPH) kinetics, respectively; specific activities were normalized to F-C reactive concentrations. Levels of total F-C reactive materials in press residue extracts were higher than in many fruits and showed significant radical quenching activity. Black currant had the highest authentic phenol content and ORAC, TRAP, and DPPH reactivity. Sea buckthorn grown in northern Finland showed extremely high total specific DPPH reactivity. These results suggest that berry press residues offer attractive value-added products that can provide antioxidants for use in stabilizing and fortifying foods.

  6. Authentication of processed meat products by peptidomic analysis using rapid ambient mass spectrometry.

    PubMed

    Montowska, Magdalena; Alexander, Morgan R; Tucker, Gregory A; Barrett, David A

    2015-11-15

    We present the application of a novel ambient LESA-MS method for the authentication of processed meat products. A set of 25 species and protein-specific heat stable peptide markers has been detected in processed samples manufactured from beef, pork, horse, chicken and turkey meat. We demonstrate that several peptides derived from myofibrillar and sarcoplasmic proteins are sufficiently resistant to processing to serve as specific markers of processed products. The LESA-MS technique required minimal sample preparation without fractionation and enabled the unambiguous and simultaneous identification of skeletal muscle proteins and peptides as well as other components of animal origin, including the milk protein such as casein alpha-S1, in whole meat product digests. We have identified, for the first time, six fast type II and five slow/cardiac type I MHC peptide markers in various processed meat products. The study demonstrates that complex mixtures of processed proteins/peptides can be examined effectively using this approach. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. Kerberos authentication: The security answer for unsecured networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Engert, D.E.

    1995-06-01

    Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.

  8. SSO - Single-Sign-On Profile: Authentication Mechanisms Version 2.0

    NASA Astrophysics Data System (ADS)

    Taffoni, Giuliano; Schaaf, André; Rixon, Guy; Major, Brian; Taffoni, Giuliano

    2017-05-01

    Approved client-server authentication mechanisms are described for the IVOA single-sign-on profile: No Authentication; HTTP Basic Authentication; TLS with passwords; TLS with client certificates; Cookies; Open Authentication; Security Assertion Markup Language; OpenID. Normative rules are given for the implementation of these mechanisms, mainly by reference to pre-existing standards. The Authorization mechanisms are out of the scope of this document.

  9. A Lightweight Continuous Authentication Protocol for the Internet of Things

    PubMed Central

    Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-01-01

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168

  10. The development of loop-mediated isothermal amplification (LAMP) assays for the rapid authentication of five forbidden vegetables in strict vegetarian diets

    PubMed Central

    Lee, Meng-Shiou; Su, Ting-Ying; Lien, Yi-Yang; Sheu, Shyang-Chwen

    2017-01-01

    Plant-based food ingredients such as garlic, Chinese leek, Chinese onion, green onion and onion are widely used in many cuisines around the world. However, these ingredients known as the “five forbidden vegetables” (FFVs) are not allowed in some vegetarian diets. In this study, a loop-mediated isothermal amplification (LAMP) assay was developed for the detection of FFVs using five respective LAMP primer sets. The specific primers targeted the ITS1-5.8S-ITS2 nuclear ribosomal DNA sequence regions among the five vegetables. The results demonstrated that the identification of FFVs using the newly developed LAMP assay is more sensitive than the traditional PCR method. Using pepper, basil, parsley, chili and ginger as references, established LAMP primer sets showed high specificity for the identification of the FFV species. Moreover, when FFVs were mixed with other plant ingredients at different ratios (100:0, 50:50, 20:80, 10:90, 5:95, 2:98, and 1:99), no cross-reactivity was evident using LAMP. Finally, genomic DNAs extracted from boiled and steamed FFVs in processed foods were used as templates; the performance of the LAMP reaction was not influenced using validated LAMP primers. Not only can FFV ingredients be identified but commercial foods containing FFVs can also be authenticated. This LAMP method will be useful for the authentication of FFVs in practical food markets in the future. PMID:28290475

  11. The development of loop-mediated isothermal amplification (LAMP) assays for the rapid authentication of five forbidden vegetables in strict vegetarian diets.

    PubMed

    Lee, Meng-Shiou; Su, Ting-Ying; Lien, Yi-Yang; Sheu, Shyang-Chwen

    2017-03-14

    Plant-based food ingredients such as garlic, Chinese leek, Chinese onion, green onion and onion are widely used in many cuisines around the world. However, these ingredients known as the "five forbidden vegetables" (FFVs) are not allowed in some vegetarian diets. In this study, a loop-mediated isothermal amplification (LAMP) assay was developed for the detection of FFVs using five respective LAMP primer sets. The specific primers targeted the ITS1-5.8S-ITS2 nuclear ribosomal DNA sequence regions among the five vegetables. The results demonstrated that the identification of FFVs using the newly developed LAMP assay is more sensitive than the traditional PCR method. Using pepper, basil, parsley, chili and ginger as references, established LAMP primer sets showed high specificity for the identification of the FFV species. Moreover, when FFVs were mixed with other plant ingredients at different ratios (100:0, 50:50, 20:80, 10:90, 5:95, 2:98, and 1:99), no cross-reactivity was evident using LAMP. Finally, genomic DNAs extracted from boiled and steamed FFVs in processed foods were used as templates; the performance of the LAMP reaction was not influenced using validated LAMP primers. Not only can FFV ingredients be identified but commercial foods containing FFVs can also be authenticated. This LAMP method will be useful for the authentication of FFVs in practical food markets in the future.

  12. Characteristics of PCR-SSCP and RAPD-HPCE methods for identifying authentication of Penis et testis cervi in Traditional Chinese Medicine based on cytochrome b gene.

    PubMed

    Li, Mingcheng; Gao, Lijun; Qu, Li; Sun, Jingyu; Yuan, Guangxin; Xia, Wei; Niu, Jiamu; Fu, Guilian; Zhang, Lihua

    2016-07-01

    The use of Penis et testis cervi, as a kind of precious Traditional Chinese Medicine (TCM), which is derived from dry deer's testis and penis, has been recorded for many years in China. There are abundant species of deer in China, the Penis et testis from species of Cervus Nippon and Cervus elaphusL were authentic, others species were defined as adulterant (different subspecies of deer) or counterfeits (different species). Identification of their origins or authenticity becomes a key in controlling the herbal products. A modified column chromatography was used to extract mitochondrial DNA of dried deer's testis and penis from sika deer (C. Nippon) and red deer (C. elaphusL) in addition to adulterants and counterfeits. Column chromatography requires for a short time to extract mitochondrial DNA of high purity with little damage of DNA molecules, which provides the primary structure of guarantee for the specific PCR; PCR-SSCP method showed a clear intra-specific difference among patterns of single-chain fragments, and completely differentiate Penis et testis origins from C. Nippon and C. elaphusL. RAPD-HPCE was based on the standard electropherograms to compute a control spectrum curve as similarity reference (R) among different samples. The similarity analysis indicated that there were significant inter-species differences among Penis et testis' adulterant or counterfeits. Both techniques provide a fast, simple, and accurate way to directly identify among inter-species or intra-species of Penis et testis.

  13. Identification of powdered Chinese herbal medicines by fluorescence microscopy, Part 1: Fluorescent characteristics of mechanical tissues, conducting tissues, and ergastic substances.

    PubMed

    Wang, Ya-Qiong; Liang, Zhi-Tao; Li, Qin; Yang, Hua; Chen, Hu-Biao; Zhao, Zhong-Zhen; Li, Ping

    2011-03-01

    The light microscope has been successfully used in identification of Chinese herbal medicines (CHMs) for more than a century. However, positive identification is not always possible. Given the popularity of fluorescence microscopy in bioanalysis, researchers dedicated to finding new ways to identify CHMs more effectively are now turning to fluorescence microscopy for authentication purposes. Some studies on distinguishing confused species from the same genus and on exploring distributions of chemicals in tissues of CHMs by fluorescence microscopy have been reported; however, no systematic investigations on fluorescent characteristics of powdered CHMs have been reported. Here, 46 samples of 16 CHMs were investigated. Specifically, the mechanical tissues including stone cells and fibers, the conducting tissues including three types of vessels, and ergastic substances including crystals of calcium oxalate and secretions, in various powdered CHMs were investigated by both light microscope and fluorescence microscope. The results showed many microscopic features emit fluorescence that makes them easily observed, even against complex backgrounds. Under the fluorescence microscope, different microscopic features from the same powdered CHM or some same features from different powdered CHMs emitted the different fluorescence, making this information very helpful for the authentication of CHMs in powder form. Moreover, secretions with unique chemical profiles from different powdered CHMs showed different fluorescent characteristics. Hence, fluorescence microscopy could be a useful additional method for the authentication of powdered CHMs if the fluorescent characteristics of specific CHMs are known. Copyright © 2010 Wiley-Liss, Inc.

  14. Sequential mathematical solution for authentication and authorization technique implementing encryption methodology creating secure transaction using various methods also at quantum level

    NASA Astrophysics Data System (ADS)

    Gharami, Snigdha; Dinakaran, M.

    2017-11-01

    We see challenges in authenticating each aspect of electronic usage, starting from transaction to social interaction the authenticity and availability of correct information is guided in various ways. Authentication and authorization follow one another; a process of authentication is calculated on multiple layers of steps. In this paper we discuss various possibilities of modifying and using ways to deal with authentication and authorization mechanism. Idea is to work through authentication with mathematical calculations. We will go through various scenarios and find out the system of information that fits best at the moment of need. We will take account of new approaches of authentication and authorization while working on mathematical paradigm of information. The paper also takes an eye on quantum cryptography and discusses on how it could help one in the present scenario. This paper is divided into sections discussing on various paradigm of authentication and how one can achieve it in secure way, this paper is part of research work where analysis of various constraints are to be followed in the extended research work.

  15. Phone, Email and Video Interactions with Characters in an Epidemiology Game: Towards Authenticity

    NASA Astrophysics Data System (ADS)

    Ney, Muriel; Gonçalves, Celso; Blacheff, Nicolas; Schwartz, Claudine; Bosson, Jean-Luc

    A key concern in game-based learning is the level of authenticity that the game requires in order to have an accurate match of what the learners can expect in the real world with what they need to learn. In this paper, we show how four challenges to the designer of authentic games have been addressed in a game for an undergraduate course in a medical school. We focus in particular on the system of interaction with different characters of the game, namely, the patients and a number of professionals. Students use their personal phone and email application, as well as various web sites. First, we analyze the authenticity of the game through four attributes, authenticity of the character, of the content of the feedback, of the mode and channel of communication and of the constraints. Second, the perceived authenticity (by students) is analyzed. The later is threefold and defined by an external authenticity (perceived likeness with a real life reference), an internal authenticity (perceived internal coherence of the proposed situations) and a didactical authenticity (perceived relevance with respect to learning goals).

  16. Pride and prejudice: how feelings about the self influence judgments of others.

    PubMed

    Ashton-James, Claire E; Tracy, Jessica L

    2012-04-01

    The present research demonstrates that pride has divergent effects on prejudice, exacerbating or attenuating evaluative biases against stigmatized groups, depending on the form of pride experienced. Specifically, three experiments found that hubristic pride--associated with arrogance and self-aggrandizement--promotes prejudice and discrimination, whereas authentic pride--associated with self-confidence and accomplishment--promotes more positive attitudes toward outgroups and stigmatized individuals. Findings generalized to discriminatory judgments (Experiment 2) and were found to be mediated by empathic concern for the evaluative target. Together, these experiments suggest that pride may be a cause of everyday prejudice and discrimination but that these social consequences depend on whether hubristic or authentic pride is experienced, and the degree to which empathic concern is subsequently aroused.

  17. Experiencing health care service quality: through patients' eyes.

    PubMed

    Schembri, Sharon

    2015-02-01

    The primary aim of the present study was to consider health care service quality from the patients' perspective, specifically through the patient's eyes. A narrative analysis was performed on 300 patient stories. This rigorous analysis of patient stories is designed to identify and describe health care service quality through patients' eyes in an authentic and accurate, experiential manner. The findings show that there are variant and complex ways that patients experience health care service quality. Patient stories offer an authentic view of the complex ways that patients experience health care service quality. Narrative analysis is a useful tool to identify and describe how patients experience health care service quality. Patients experience health care service quality in complex and varying ways.

  18. On securing wireless sensor network--novel authentication scheme against DOS attacks.

    PubMed

    Raja, K Nirmal; Beno, M Marsaline

    2014-10-01

    Wireless sensor networks are generally deployed for collecting data from various environments. Several applications specific sensor network cryptography algorithms have been proposed in research. However WSN's has many constrictions, including low computation capability, less memory, limited energy resources, vulnerability to physical capture, which enforce unique security challenges needs to make a lot of improvements. This paper presents a novel security mechanism and algorithm for wireless sensor network security and also an application of this algorithm. The proposed scheme is given to strong authentication against Denial of Service Attacks (DOS). The scheme is simulated using network simulator2 (NS2). Then this scheme is analyzed based on the network packet delivery ratio and found that throughput has improved.

  19. 22 CFR 131.1 - Certification of documents.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Foreign Relations DEPARTMENT OF STATE MISCELLANEOUS CERTIFICATES OF AUTHENTICATION § 131.1 Certification of documents. The Authentication Officer, Acting Authentication Officer, or any Assistant Authentication Officer designated by either of the former officers may, and is hereby authorized to, sign and...

  20. Study on a Biometric Authentication Model based on ECG using a Fuzzy Neural Network

    NASA Astrophysics Data System (ADS)

    Kim, Ho J.; Lim, Joon S.

    2018-03-01

    Traditional authentication methods use numbers or graphic passwords and thus involve the risk of loss or theft. Various studies are underway regarding biometric authentication because it uses the unique biometric data of a human being. Biometric authentication technology using ECG from biometric data involves signals that record electrical stimuli from the heart. It is difficult to manipulate and is advantageous in that it enables unrestrained measurements from sensors that are attached to the skin. This study is on biometric authentication methods using the neural network with weighted fuzzy membership functions (NEWFM). In the biometric authentication process, normalization and the ensemble average is applied during preprocessing, characteristics are extracted using Haar-wavelets, and a registration process called “training” is performed in the fuzzy neural network. In the experiment, biometric authentication was performed on 73 subjects in the Physionet Database. 10-40 ECG waveforms were tested for use in the registration process, and 15 ECG waveforms were deemed the appropriate number for registering ECG waveforms. 1 ECG waveforms were used during the authentication stage to conduct the biometric authentication test. Upon testing the proposed biometric authentication method based on 73 subjects from the Physionet Database, the TAR was 98.32% and FAR was 5.84%.

  1. Time to unravel the conceptual confusion of authenticity and fidelity and their contribution to learning within simulation-based nurse education. A discussion paper.

    PubMed

    Bland, Andrew J; Topping, Annie; Tobbell, Jane

    2014-07-01

    High-fidelity patient simulation is a method of education increasingly utilised by educators of nursing to provide authentic learning experiences. Fidelity and authenticity, however, are not conceptually equivalent. Whilst fidelity is important when striving to replicate a life experience such as clinical practice, authenticity can be produced with low fidelity. A challenge for educators of undergraduate nursing is to ensure authentic representation of the clinical situation which is a core component for potential success. What is less clear is the relationship between fidelity and authenticity in the context of simulation based learning. Authenticity does not automatically follow fidelity and as a result, educators of nursing cannot assume that embracing the latest technology-based educational tools will in isolation provide a learning environment perceived authentic by the learner. As nursing education programmes increasingly adopt simulators that offer the possibility of representing authentic real world situations, there is an urgency to better articulate and understand the terms fidelity and authenticity. Without such understanding there is a real danger that simulation as a teaching and learning resource in nurse education will never reach its potential and be misunderstood, creating a potential barrier to learning. This paper examines current literature to promote discussion within nurse education, concluding that authenticity in the context of simulation-based learning is complex, relying on far more than engineered fidelity. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. Location-assured, multifactor authentication on smartphones via LTE communication

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using Smartphones. Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about the client itself (via PIN/biometric) as well as the client's current location, thus defines the important aspects of "who", "when", and "where" of the authentication attempt without eaves dropping or man on the middle attacks. To securely integrate location as an authentication factor into the remote authentication scheme, client's location must be verified independently, i.e. the authenticator should not solely rely on the location determined on and reported by the client's Smartphone. The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement of independent location verification. LTE's Control Plane LBS provisions, when integrated with user-based authentication and independent source of localisation factors ensures secure efficient, continuous location tracking of the Smartphone. This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location more securely and accurately. Trials and experiments show that such algorithm implementation is viable for nowadays Smartphone-based banking via LTE communication.

  3. Multi-National Information Sharing -- Cross Domain Collaborative Information Environment (CDCIE) Solution. Revision 4

    DTIC Science & Technology

    2005-04-12

    Hardware, Database, and Operating System independence using Java • Enterprise-class Architecture using Java2 Enterprise Edition 1.4 • Standards based...portal applications. Compliance with the Java Specification Request for Portlet APIs (JSR-168) (Portlet API) and Web Services for Remote Portals...authentication and authorization • Portal Standards using Java Specification Request for Portlet APIs (JSR-168) (Portlet API) and Web Services for Remote

  4. The Use of E-Mail as a Tool To Enhance Second Language Education Programs: An Example from a Core French Classroom.

    ERIC Educational Resources Information Center

    Lawrence, Geoff

    2002-01-01

    Outlines reasons why electronic mail, and specifically e-mail exchanges, are valuable tools for promoting authentic target language interaction in the second language (L2) classroom. Research examining the use of e-mail exchanges on the L2 learning process is outlined, followed by one specific example of an e-mail exchange in a secondary core…

  5. Experimental demonstration of an isotope-sensitive warhead verification technique using nuclear resonance fluorescence

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vavrek, Jayson R.; Henderson, Brian S.; Danagoulian, Areg

    Future nuclear arms reduction efforts will require technologies to verify that warheads slated for dismantlement are authentic without revealing any sensitive weapons design information to international inspectors. Despite several decades of research, no technology has met these requirements simultaneously. Recent work by Kemp et al. [Kemp RS, Danagoulian A, Macdonald RR, Vavrek JR (2016) Proc Natl Acad Sci USA 113:8618–8623] has produced a novel physical cryptographic verification protocol that approaches this treaty verification problem by exploiting the isotope-specific nature of nuclear resonance fluorescence (NRF) measurements to verify the authenticity of a warhead. To protect sensitive information, the NRF signal frommore » the warhead is convolved with that of an encryption foil that contains key warhead isotopes in amounts unknown to the inspector. The convolved spectrum from a candidate warhead is statistically compared against that from an authenticated template warhead to determine whether the candidate itself is authentic. Here in this paper we report on recent proof-of-concept warhead verification experiments conducted at the Massachusetts Institute of Technology. Using high-purity germanium (HPGe) detectors, we measured NRF spectra from the interrogation of proxy “genuine” and “hoax” objects by a 2.52 MeV endpoint bremsstrahlung beam. The observed differences in NRF intensities near 2.2 MeV indicate that the physical cryptographic protocol can distinguish between proxy genuine and hoax objects with high confidence in realistic measurement times.« less

  6. Experimental demonstration of an isotope-sensitive warhead verification technique using nuclear resonance fluorescence

    DOE PAGES

    Vavrek, Jayson R.; Henderson, Brian S.; Danagoulian, Areg

    2018-04-10

    Future nuclear arms reduction efforts will require technologies to verify that warheads slated for dismantlement are authentic without revealing any sensitive weapons design information to international inspectors. Despite several decades of research, no technology has met these requirements simultaneously. Recent work by Kemp et al. [Kemp RS, Danagoulian A, Macdonald RR, Vavrek JR (2016) Proc Natl Acad Sci USA 113:8618–8623] has produced a novel physical cryptographic verification protocol that approaches this treaty verification problem by exploiting the isotope-specific nature of nuclear resonance fluorescence (NRF) measurements to verify the authenticity of a warhead. To protect sensitive information, the NRF signal frommore » the warhead is convolved with that of an encryption foil that contains key warhead isotopes in amounts unknown to the inspector. The convolved spectrum from a candidate warhead is statistically compared against that from an authenticated template warhead to determine whether the candidate itself is authentic. Here in this paper we report on recent proof-of-concept warhead verification experiments conducted at the Massachusetts Institute of Technology. Using high-purity germanium (HPGe) detectors, we measured NRF spectra from the interrogation of proxy “genuine” and “hoax” objects by a 2.52 MeV endpoint bremsstrahlung beam. The observed differences in NRF intensities near 2.2 MeV indicate that the physical cryptographic protocol can distinguish between proxy genuine and hoax objects with high confidence in realistic measurement times.« less

  7. 22 CFR 61.3 - Certification and authentication criteria.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall certify or authenticate audio-visual materials submitted for review as educational, scientific and... of the material. (b) The Department will not certify or authenticate any audio-visual material...

  8. 22 CFR 61.3 - Certification and authentication criteria.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall certify or authenticate audio-visual materials submitted for review as educational, scientific and... of the material. (b) The Department will not certify or authenticate any audio-visual material...

  9. 22 CFR 61.3 - Certification and authentication criteria.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall certify or authenticate audio-visual materials submitted for review as educational, scientific and... of the material. (b) The Department will not certify or authenticate any audio-visual material...

  10. Using Authentic Materials for Extensive Reading to Promote English Proficiency

    ERIC Educational Resources Information Center

    Guo, Siao-cing

    2012-01-01

    Current literature points to the importance and benefits of extensive reading. Extensive reading provides contextualized clues for better reading comprehension (Krashen, 1982), and substantial linguistic input (Bell, 1998) needed for language development. Several studies have found a correlation between extensive reading and specific linguistic…

  11. Exploring Business Request Genres: Students' Rhetorical Choices

    ERIC Educational Resources Information Center

    Nguyen, Hai; Miller, Jennifer

    2012-01-01

    This article presents selective findings from an ongoing study that investigates rhetorical differences in business letter writing between Vietnamese students taking an English for Specific Purposes course in Vietnam and business professionals. Rhetorical analyses are based on two corpora, namely, scenario (N = 20) and authentic business letters…

  12. Optimization of Multimedia English Teaching in Context Creation

    ERIC Educational Resources Information Center

    Yang, Weiyan; Fang, Fan

    2008-01-01

    Using multimedia to create a context to teach English has its unique advantages. This paper explores the characteristics of multimedia and integrates how to use multimedia to optimize the context of English teaching as its purpose. In this paper, eight principles, specifically Systematization, Authenticity, Appropriateness, Interactivity,…

  13. System and method for key generation in security tokens

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  14. Managing authenticity: the paradox of great leadership.

    PubMed

    Goffee, Rob; Jones, Gareth

    2005-12-01

    Leaders and followers both associate authenticity with sincerity, honesty, and integrity. It's the real thing--the attribute that uniquely defines great managers. But while the expression of a genuine self is necessary for great leadership, the concept of authenticity is often misunderstood, not least by leaders themselves. They often assume that authenticity is an innate quality--that a person is either genuine or not. In fact, the authors say, authenticity is largely defined by what other people see in you and, as such, can to a great extent be controlled by you. In this article, the authors explore the qualities of authentic leadership. To illustrate their points, they recount the experiences of some of the authentic leaders they have known and studied, including the BBC's Greg Dyke, Nestlé's Peter Brabeck-Letmathe, and Marks & Spencer's Jean Tomlin. Establishing your authenticity as a leader is a two-part challenge. You have to consistently match your words and deeds; otherwise, followers will never accept you as authentic. But it is not enough just to practice what you preach. To get people to follow you, you also have to get them to relate to you. This means presenting different faces to different audiences--a requirement that many people find hard to square with authenticity. But authenticity is not the product of manipulation. It accurately reflects aspects of the leader's inner self, so it can't be an act. Authentic leaders seem to know which personality traits they should reveal to whom, and when. Highly attuned to their environments, authentic leaders rely on an intuition born of formative, sometimes harsh experiences to understand the expectations and concerns of the people they seek to influence. They retain their distinctiveness as individuals, yet they know how to win acceptance in strong corporate and social cultures and how to use elements of those cultures as a basis for radical change.

  15. Real-time PCR method applied to seafood products for authentication of European sole (Solea solea) and differentiation of common substitute species.

    PubMed

    Herrero, Beatriz; Lago, Fátima C; Vieites, Juan M; Espiñeira, Montserrat

    2012-01-01

    Judged by quality and taste, the European sole (Solea solea) is considered one of the finest flatfish and is, thus, of considerable commercial value. In the present work, a specific fast real-time PCR was developed for the authentication of S. solea, i.e. to distinguish it from other related species and avoid substitution of this species, either deliberately or unintentionally. The method is based on a species-specific set of primers and MGB Taqman probe which amplifies a 116-bp fragment of the internal transcribed spacer 1 (ITS 1) ribosomal DNA region. This assay combines the high specificity and sensitivity of real-time PCR with the rapidity of the fast mode, allowing the detection of S. solea in a short period of time. The present methodology was validated for application to all types of manufactured products for the presence of S. solea, with successful results. Subsequently, the method was applied to 40 commercial samples to determine whether correct labeling had been employed in the market. It was demonstrated that the assay is a useful tool in monitoring and verifying food labeling regulations.

  16. South African managers in public service: On being authentic

    PubMed Central

    Simbhoo, Nirvana

    2014-01-01

    South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work–life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work. PMID:24434054

  17. South African managers in public service: on being authentic.

    PubMed

    Barnard, Antoni; Simbhoo, Nirvana

    2014-01-01

    South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work-life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work.

  18. Study on the security of the authentication scheme with key recycling in QKD

    NASA Astrophysics Data System (ADS)

    Li, Qiong; Zhao, Qiang; Le, Dan; Niu, Xiamu

    2016-09-01

    In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero.

  19. Using standardized patients versus video cases for representing clinical problems in problem-based learning

    PubMed Central

    2016-01-01

    Purpose: The quality of problem representation is critical for developing students’ problem-solving abilities in problem-based learning (PBL). This study investigates preclinical students’ experience with standardized patients (SPs) as a problem representation method compared to using video cases in PBL. Methods: A cohort of 99 second-year preclinical students from Inje University College of Medicine (IUCM) responded to a Likert scale questionnaire on their learning experiences after they had experienced both video cases and SPs in PBL. The questionnaire consisted of 14 items with eight subcategories: problem identification, hypothesis generation, motivation, collaborative learning, reflective thinking, authenticity, patient-doctor communication, and attitude toward patients. Results: The results reveal that using SPs led to the preclinical students having significantly positive experiences in boosting patient-doctor communication skills; the perceived authenticity of their clinical situations; development of proper attitudes toward patients; and motivation, reflective thinking, and collaborative learning when compared to using video cases. The SPs also provided more challenges than the video cases during problem identification and hypotheses generation. Conclusion: SPs are more effective than video cases in delivering higher levels of authenticity in clinical problems for PBL. The interaction with SPs engages preclinical students in deeper thinking and discussion; growth of communication skills; development of proper attitudes toward patients; and motivation. Considering the higher cost of SPs compared with video cases, SPs could be used most advantageously during the preclinical period in the IUCM curriculum. PMID:26923094

  20. Security Concepts for Satellite Links

    NASA Astrophysics Data System (ADS)

    Tobehn, C.; Penné, B.; Rathje, R.; Weigl, A.; Gorecki, Ch.; Michalik, H.

    2008-08-01

    The high costs to develop, launch and maintain a satellite network makes protecting the assets imperative. Attacks may be passive such as eavesdropping on the payload data. More serious threat are active attacks that try to gain control of the satellite, which may lead to the total lost of the satellite asset. To counter these threats, new satellite and ground systems are using cryptographic technologies to provide a range of services: confidentiality, entity & message authentication, and data integrity. Additionally, key management cryptographic services are required to support these services. This paper describes the key points of current satellite control and operations, that are authentication of the access to the satellite TMTC link and encryption of security relevant TM/TC data. For payload data management the key points are multi-user ground station access and high data rates both requiring frequent updates and uploads of keys with the corresponding key management methods. For secure satellite management authentication & key negotiation algorithms as HMAC-RIPEMD160, EC- DSA and EC-DH are used. Encryption of data uses algorithms as IDEA, AES, Triple-DES, or other. A channel coding and encryption unit for payload data provides download data rates up to Nx250 Mbps. The presented concepts are based on our experience and heritage of the security systems for all German MOD satellite projects (SATCOMBw2, SAR-Lupe multi- satellite system and German-French SAR-Lupe-Helios- II systems inter-operability) as well as for further international (KOMPSAT-II Payload data link system) and ESA activities (TMTC security and GMES).

  1. Recent advances in the identification and authentication methods of edible bird's nest.

    PubMed

    Lee, Ting Hun; Wani, Waseem A; Koay, Yin Shin; Kavita, Supparmaniam; Tan, Eddie Ti Tjih; Shreaz, Sheikh

    2017-10-01

    Edible bird's nest (EBN) is an expensive animal bioproduct due to its reputation as a food and delicacy with diverse medicinal properties. One kilogram of EBN costs ~$6000 in China. EBN and its products are consumed in mostly Asian countries such as China, Hong Kong, Taiwan, Singapore, Malaysia, Indonesia, Vietnam and Thailand, making up almost 1/3 of world population. The rapid growth in EBN consumption has led to a big rise in the trade scale of its global market. Presently, various fake materials such as tremella fungus, pork skin, karaya gum, fish swimming bladder, jelly, agar, monosodium glutamate and egg white are used to adulterate EBNs for earning extra profits. Adulterated or fake EBN may be hazardous to the consumers. Thus, it is necessary to identify of the adulterants. Several sophisticated techniques based on genetics, immunochemistry, spectroscopy, chromatography and gel electrophoresis have been used for the detection of various types of adulterants in EBN. This article describes the recent advances in the authentication methods for EBN. Different genetic, immunochemical, spectroscopic and analytical methods such as genetics (DNA) based techniques, enzyme-linked immunosorbent assays, Fourier transform infrared and Raman spectroscopic techniques, and chromatographic and gel electrophoretic methods have been discussed. Besides, significance of the reported methods that might pertain them to applications in EBN industry has been described. Finally, efforts have been made to discuss the challenges and future perspectives of the authentication methods for EBN. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. 7 CFR 1.22 - Authentication.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 1 2013-01-01 2013-01-01 false Authentication. 1.22 Section 1.22 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.22 Authentication. When a request is received for an authenticated copy of a document that the agency determines to make...

  3. Authentic Montessori: The Teacher Makes the Difference

    ERIC Educational Resources Information Center

    Huxel, Alexa C.

    2013-01-01

    What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…

  4. 36 CFR 1275.66 - Reproduction and authentication of other materials.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... authentication of other materials. 1275.66 Section 1275.66 Parks, Forests, and Public Property NATIONAL ARCHIVES... Reproduction and authentication of other materials. (a) Copying of materials, including tape recordings... materials when necessary for the purpose of the research. (c) The fees for reproduction and authentication...

  5. 22 CFR 92.37 - Authentication procedure.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication procedure. 92.37 Section 92.37... Notarial Acts § 92.37 Authentication procedure. (a) The consular officer must compare the foreign official...) Where the State law requires the consular officer's certificate of authentication to show that the...

  6. 7 CFR 1.22 - Authentication.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Authentication. 1.22 Section 1.22 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.22 Authentication. When a request is received for an authenticated copy of a document that the agency determines to make...

  7. Authentic leadership: becoming and remaining an authentic nurse leader.

    PubMed

    Murphy, Lin G

    2012-11-01

    This article explores how chief nurse executives became and remained authentic leaders. Using narrative inquiry, this qualitative study focused on the life stories of participants. Results demonstrate the importance of reframing, reflection in alignment with values, and the courage needed as nurse leaders progress to authenticity.

  8. GNSS Spoofing Network Monitoring Based on Differential Pseudorange.

    PubMed

    Zhang, Zhenjun; Zhan, Xingqun

    2016-10-23

    Spoofing is becoming a serious threat to various Global Navigation Satellite System (GNSS) applications, especially for those that require high reliability and security such as power grid synchronization and applications related to first responders and aviation safety. Most current works on anti-spoofing focus on spoofing detection from the individual receiver side, which identifies spoofing when it is under an attack. This paper proposes a novel spoofing network monitoring (SNM) mechanism aiming to reveal the presence of spoofing within an area. Consisting of several receivers and one central processing component, it keeps detecting spoofing even when the network is not attacked. The mechanism is based on the different time difference of arrival (TDOA) properties between spoofing and authentic signals. Normally, TDOAs of spoofing signals from a common spoofer are identical while those of authentic signals from diverse directions are dispersed. The TDOA is measured as the differential pseudorange to carrier frequency ratio (DPF). In a spoofing case, the DPFs include those of both authentic and spoofing signals, among which the DPFs of authentic are dispersed while those of spoofing are almost overlapped. An algorithm is proposed to search for the DPFs that are within a pre-defined small range, and an alarm will be raised if several DPFs are found within such range. The proposed SNM methodology is validated by simulations and a partial field trial. Results show 99.99% detection and 0.01% false alarm probabilities are achieved. The SNM has the potential to be adopted in various applications such as (1) alerting dedicated users when spoofing is occurring, which could significantly shorten the receiver side spoofing cost; (2) in combination with GNSS performance monitoring systems, such as the Continuous Operating Reference System (CORS) and GNSS Availability, Accuracy, Reliability anD Integrity Assessment for Timing and Navigation (GAARDIAN) System, to provide more reliable monitoring services.

  9. Ninth Grade Student Responses to Authentic Science Instruction

    NASA Astrophysics Data System (ADS)

    Ellison, Michael Steven

    This mixed methods case study documents an effort to implement authentic science and engineering instruction in one teacher's ninth grade science classrooms in a science-focused public school. The research framework and methodology is a derivative of work developed and reported by Newmann and others (Newmann & Associates, 1996). Based on a working definition of authenticity, data were collected for eight months on the authenticity in the experienced teacher's pedagogy and in student performance. Authenticity was defined as the degree to which a classroom lesson, an assessment task, or an example of student performance demonstrates construction of knowledge through use of the meaning-making processes of science and engineering, and has some value to students beyond demonstrating success in school (Wehlage et al., 1996). Instruments adapted for this study produced a rich description of the authenticity of the teacher's instruction and student performance. The pedagogical practices of the classroom teacher were measured as moderately authentic on average. However, the authenticity model revealed the teacher's strategy of interspersing relatively low authenticity instructional units focused on building science knowledge with much higher authenticity tasks requiring students to apply these concepts and skills. The authenticity of the construction of knowledge and science meaning-making processes components of authentic pedagogy were found to be greater, than the authenticity of affordances for students to find value in classroom activities beyond demonstrating success in school. Instruction frequently included one aspect of value beyond school, connections to the world outside the classroom, but students were infrequently afforded the opportunity to present their classwork to audiences beyond the teacher. When the science instruction in the case was measured to afford a greater level of authentic intellectual work, a higher level of authentic student performance on science classwork was also measured. In addition, direct observation measures of student behavioral engagement showed that behavioral engagement was generally high, but not associated with the authenticity of the pedagogy. Direct observation measures of student self-regulation found evidence that when instruction focused on core science and engineering concepts and made stronger connections to the student's world beyond the classroom, student self-regulated learning was greater, and included evidence of student ownership. In light of the alignment between the model of authenticity used in this study and the Next Generation Science Standards (NGSS), the results suggest that further research on the value beyond school component of the model could improve understanding of student engagement and performance in response to the implementation of the NGSS. In particular, it suggests a unique role environmental education can play in affording student success in K-12 science and a tool to measure that role.

  10. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  11. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOEpatents

    Kent, Alexander Dale [Los Alamos, NM

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  12. Suppression sours sacrifice: emotional and relational costs of suppressing emotions in romantic relationships.

    PubMed

    Impett, Emily A; Kogan, Aleksandr; English, Tammy; John, Oliver; Oveis, Christopher; Gordon, Amie M; Keltner, Dacher

    2012-06-01

    What happens when people suppress their emotions when they sacrifice for a romantic partner? This multimethod study investigates how suppressing emotions during sacrifice shapes affective and relationship outcomes. In Part 1, dating couples came into the laboratory to discuss important romantic relationship sacrifices. Suppressing emotions was associated with emotional costs for the partner discussing his or her sacrifice. In Part 2, couples participated in a 14-day daily experience study. Within-person increases in emotional suppression during daily sacrifice were associated with decreases in emotional well-being and relationship quality as reported by both members of romantic dyads. In Part 3, suppression predicted decreases in relationship satisfaction and increases in thoughts about breaking up with a romantic partner 3 months later. In the first two parts of the study, authenticity mediated the costly effects of suppression. Implications for research on close relationships and emotion regulation are discussed.

  13. The Hunt for "Indigenous Criteria" in Assessing Communication in the Physiotherapy Workplace

    ERIC Educational Resources Information Center

    Elder, Catherine; McNamara, Tim

    2016-01-01

    Gaining insights from domain experts into how they view communication in real world settings is recognized as an important authenticity consideration in the development of criteria to assess language proficiency for specific academic or occupational purposes. These "indigenous" criteria represent an articulation of the test construct and…

  14. Can We Improve Training for Health Professionals to Sustain Local Health Development?

    PubMed

    King, Stephen

    2016-11-01

    Can we improve training for health professionals? We explore specific variables that need to be accounted for to achieve sustainable local health development through training. A problem-based approach with appreciation of the need for making changes is suggested as the only authentic basis for training.

  15. Thanking Responders in Cameroon English

    ERIC Educational Resources Information Center

    Ouafeu, Yves Talla Sando

    2009-01-01

    An analysis of authentic or genuine interactions among Cameroon English speakers reveals that conversational routines in this variety of English differ a good deal from those obtained in other varieties of English, non-native varieties of English inclusive, and more specifically in native varieties of English. This paper looks at "thanking…

  16. Improving Students' English Speaking Proficiency in Saudi Public Schools

    ERIC Educational Resources Information Center

    Alharbi, Heba Awadh

    2015-01-01

    In English as a foreign language (EFL) contexts, the absence of authentic language learning situations outside the classroom presents a significant challenge to improving students' English communication skills. Specific obstacles in the learning environment can also result in students' limited use of English inside the classroom. These issues…

  17. Math in the Margins: Writing across Curricula into Community Heritage

    ERIC Educational Resources Information Center

    Sunstein, Bonnie S.; Liu, Rossina Zamora; Hunsicker, Arthur W.; Baker, Deidra F.

    2012-01-01

    Imagine two classfuls of American high school students, separated by 1,500 miles and profound differences in local cultures (East Coast urban and Midwestern rural) as they correspond and collaborate in writing between their geometry classes. Reading the students' observations, one sees authentic voice, specific detail, precise language, what…

  18. Reading through Films

    ERIC Educational Resources Information Center

    Raman, Madhavi Gayathri; Vijaya

    2016-01-01

    This paper captures the design of a comprehensive curriculum incorporating the four skills based exclusively on the use of parallel audio-visual and written texts. We discuss the use of authentic materials to teach English to Indian undergraduates aged 18 to 20 years. Specifically, we talk about the use of parallel reading (screen-play) and…

  19. A Walk on Ice.

    ERIC Educational Resources Information Center

    Turner, Jane

    1998-01-01

    Exploration of a specific use of Text Based Virtual Reality--not just as powerful communities for authentic communication and collaboration in language learning but exploiting role-playing and writing aspects. The "Walk on Ice" takes a group of adult English-as-a-Second-Language learners through the creation of imaginary characters who…

  20. Watching What We Say: Using Video to Learn about Discussions

    ERIC Educational Resources Information Center

    Basmadjian, Kevin G.

    2008-01-01

    This article considers the benefits and challenges of using English teacher candidates' videotaped discussions of literature as tools to facilitate authentic and engaging discussions of literature. More specifically, this article examines the use of teacher candidates' videotaped discussions in a secondary English methods course to expand…

  1. Barriers to Securing Data on Bluetooth®-Enabled Mobile Devices: A Phenomenological Study

    ERIC Educational Resources Information Center

    Hines, Natasha

    2015-01-01

    Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated…

  2. Learning Together and Working Apart: Routines for Organizational Learning in Virtual Teams

    ERIC Educational Resources Information Center

    Dixon, Nancy

    2017-01-01

    Purpose: Research suggests that teaming routines facilitate learning in teams. This paper identifies and details how specific teaming routines, implemented in a virtual team, support its continual learning. The study's focus was to generate authentic and descriptive accounts of the interviewees' experiences with virtual teaming routines.…

  3. The Effect of Password Management Procedures on the Entropy of User Selected Passwords

    ERIC Educational Resources Information Center

    Enamait, John D.

    2012-01-01

    Maintaining the security of information contained within computer systems poses challenges for users and administrators. Attacks on information systems continue to rise. Specifically, attacks that target user authentication are increasingly popular. These attacks are based on the common perception that traditional alphanumeric passwords are weak…

  4. Advanced Listening Comprehension Training in Occupational ESL.

    ERIC Educational Resources Information Center

    Smart, Graham

    1982-01-01

    In the English Language Training Unit of the Bank of Canada, the duties performed by an individual worker are examined closely and a language-use profile developed. Authentic recordings of specific problematic occupational situations are used and found to be highly motivating in training. Examples of exercise discourse are given. (MSE)

  5. "Jaja" in Spoken German: Managing Knowledge Expectations

    ERIC Educational Resources Information Center

    Taleghani-Nikazm, Carmen; Golato, Andrea

    2016-01-01

    In line with the other contributions to this issue on teaching pragmatics, this paper provides teachers of German with a two-day lesson plan for integrating authentic spoken language and its associated cultural background into their teaching. Specifically, the paper discusses how "jaja" and its phonetic variants are systematically used…

  6. Exploring Civic Practices and Service Learning through School-Wide Recycling

    ERIC Educational Resources Information Center

    Chessin, Debby; Moore, Virginia J.; Theobald, Becky

    2011-01-01

    Young children can make real-life connections to the ideals, principles, and practices of citizenship through Service Learning, a teaching pedagogy and philosophy that addresses real community needs while fulfilling academic goals that meet specific national and state curricula and standards. Authentic and effective service learning projects offer…

  7. Relations between Student Perceptions of Assessment Authenticity, Study Approaches and Learning Outcome

    ERIC Educational Resources Information Center

    Gulikers, Judith T. M.; Bastiaens, Theo J.; Kirschner, Paul A.; Kester, Liesbeth

    2006-01-01

    This article examines the relationships between perceptions of authenticity and alignment on study approach and learning outcome. Senior students of a vocational training program performed an authentic assessment and filled in a questionnaire about the authenticity of various assessment characteristics and the alignment between the assessment and…

  8. School Principals' Authentic Leadership and Teachers' Psychological Capital: Teachers' Perspectives

    ERIC Educational Resources Information Center

    Feng, Feng-I

    2016-01-01

    This study examined teachers' perceptions of principals' authentic leadership and the relationship of authentic leadership to teachers' psychological capital in Taiwan. A total of 1,429 elementary and secondary school teachers were surveyed. The results showed that teachers perceived their principals' authentic leadership as moderate and that the…

  9. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... substance prescriptions and who has obtained a two-factor authentication credential as provided in § 1311... his two-factor authentication credential to satisfy the logical access controls. The second individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised. Such...

  10. 31 CFR 363.21 - When may you require offline authentication and documentary evidence?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... authentication and documentary evidence? 363.21 Section 363.21 Money and Finance: Treasury Regulations Relating... TreasuryDirect § 363.21 When may you require offline authentication and documentary evidence? We may require offline authentication and documentary evidence at our option. [74 FR 19419, Apr. 29, 2009] ...

  11. 21 CFR 1311.110 - Requirements for obtaining an authentication credential-Individual practitioners eligible to use...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for obtaining an authentication... Prescriptions § 1311.110 Requirements for obtaining an authentication credential—Individual practitioners... credentialing office) may conduct identity proofing and authorize the issuance of the authentication credential...

  12. Toward Developing Authentic Leadership: Team-Based Simulations

    ERIC Educational Resources Information Center

    Shapira-Lishchinsky, Orly

    2014-01-01

    Although there is a consensus that authentic leadership should be an essential component in educational leadership, no study to date has ever tried to find whether team-based simulations may promote authentic leadership. The purpose of this study was to identify whether principal trainees can develop authentic leadership through ethical decision…

  13. Learning How to Lead: A Lifetime Journey

    ERIC Educational Resources Information Center

    Baugher, Shirley L.

    2005-01-01

    Much has been written about theories of leadership, leadership qualities, and the development of leadership. In this article, the author focuses on the work of Kevin Cashman, who proposed the following "Five Touchstones" that are crucial to authentic leadership: (1) Know Yourself Authentically; (2) Listen Authentically; (3) Express Authentically;…

  14. Authenticity in the Bureau-Enterprise Culture: The Struggle for Authentic Meaning

    ERIC Educational Resources Information Center

    Woods, Philip A.

    2007-01-01

    This article emphasizes the extent to which conceptions of authenticity are forged through social interaction and socially mediated identities and how, in turn, authentic leadership involves the transformation of the organizational, social or cultural order in which leadership is situated. The overarching context for this exploration of authentic…

  15. Teachers' Development Model to Authentic Assessment by Empowerment Evaluation Approach

    ERIC Educational Resources Information Center

    Charoenchai, Charin; Phuseeorn, Songsak; Phengsawat, Waro

    2015-01-01

    The purposes of this study were 1) Study teachers authentic assessment, teachers comprehension of authentic assessment and teachers needs for authentic assessment development. 2) To create teachers development model. 3) Experiment of teachers development model. 4) Evaluate effectiveness of teachers development model. The research is divided into 4…

  16. Trustworthiness and Authenticity: Alternate Ways To Judge Authentic Assessments.

    ERIC Educational Resources Information Center

    Hipps, Jerome A.

    New methods are needed to judge the quality of alternative student assessment, methods which complement the philosophy underlying authentic assessments. This paper examines assumptions underlying validity, reliability, and objectivity, and why they are not matched to authentic assessment, concentrating on the constructivist paradigm of E. Guba and…

  17. Ubuntu Core Snaps for Science

    NASA Astrophysics Data System (ADS)

    Wyngaard, J.

    2017-12-01

    A key challenge in the burgeoning sector of IoT (Internet of Things) is ensuring device and communication security. Ubuntu Core's approach to this is the use of 'snaps'. Along side this growth, scientists are increasingly utilising the many new low cost sensors now available. This work prototypes the use of snaps as a possible avenue to reducing the barrier to entry for scientific use of these low cost sensors while also ensuring proper meta-data is captured. Snaps are contained applications that have been signed. This means that a snap application is unable to read or write to any area of the system beyond its assigned reach, thereby significantly limiting the possible impact of any break in security higher up the stack. Further, application and system updates are automatically verified as authentic before being applied. Additionally, on an embedded system running Ubuntu Core the hardware interface (Gadget), kernel, and OS (Core) are all also snaps and therefore also have acquired these same gains. The result is an architecture that enables: (1) Secure, robust, remote automatic updates of both the OS and applications. (2) A user friendly deployment mechanism.(3) A easy to maintain means of supporting multiple platforms. The above is primarily targeted at non-academic domains, however, it is proposed that the Scientific community can benefit from it too. This work therefore prototypes a snap for sensors on board a small Unmanned Aircraft System (sUAS). For demonstration purposes this snap specifically targets connecting a popular low cost CO2 meter to a Raspberry Pi3 and the popular open source sUAS autopilot Arducopter.

  18. [Causes for change in producing areas of geo-authentic herbs].

    PubMed

    Liang, Fei; Li, Jian; Zhang, Wei; Zhang, Rui-Xian

    2013-05-01

    Geo-authentic herbs lay stress on their producing areas. The producing areas of most geo-authentic herbs have never changed since the ancient times. However, many other geo-authentic herbs have experienced significant changes in the long history. There are two main causes for the change in producing areas of herbs-change of natural environment and development of human society, which are restricted by each other and play a great role throughout the development process of geo-authentic herbs.

  19. An Efficient Authenticated Key Transfer Scheme in Client-Server Networks

    NASA Astrophysics Data System (ADS)

    Shi, Runhua; Zhang, Shun

    2017-10-01

    In this paper, we presented a novel authenticated key transfer scheme in client-server networks, which can achieve two secure goals of remote user authentication and the session key establishment between the remote user and the server. Especially, the proposed scheme can subtly provide two fully different authentications: identity-base authentication and anonymous authentication, while the remote user only holds a private key. Furthermore, our scheme only needs to transmit 1-round messages from the remote user to the server, thus it is very efficient in communication complexity. In addition, the most time-consuming computation in our scheme is elliptic curve scalar point multiplication, so it is also feasible even for mobile devices.

  20. Individualism and the Extended-Self: Cross-Cultural Differences in the Valuation of Authentic Objects

    PubMed Central

    Gjersoe, Nathalia L.; Newman, George E.; Chituc, Vladimir; Hood, Bruce

    2014-01-01

    The current studies examine how valuation of authentic items varies as a function of culture. We find that U.S. respondents value authentic items associated with individual persons (a sweater or an artwork) more than Indian respondents, but that both cultures value authentic objects not associated with persons (a dinosaur bone or a moon rock) equally. These differences cannot be attributed to more general cultural differences in the value assigned to authenticity. Rather, the results support the hypothesis that individualistic cultures place a greater value on objects associated with unique persons and in so doing, offer the first evidence for how valuation of certain authentic items may vary cross-culturally. PMID:24658437

  1. Individualism and the extended-self: cross-cultural differences in the valuation of authentic objects.

    PubMed

    Gjersoe, Nathalia L; Newman, George E; Chituc, Vladimir; Hood, Bruce

    2014-01-01

    The current studies examine how valuation of authentic items varies as a function of culture. We find that U.S. respondents value authentic items associated with individual persons (a sweater or an artwork) more than Indian respondents, but that both cultures value authentic objects not associated with persons (a dinosaur bone or a moon rock) equally. These differences cannot be attributed to more general cultural differences in the value assigned to authenticity. Rather, the results support the hypothesis that individualistic cultures place a greater value on objects associated with unique persons and in so doing, offer the first evidence for how valuation of certain authentic items may vary cross-culturally.

  2. Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing

    NASA Astrophysics Data System (ADS)

    Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo

    2016-12-01

    Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.

  3. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    PubMed Central

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  4. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    PubMed

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  5. Secure ADS-B authentication system and method

    NASA Technical Reports Server (NTRS)

    Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)

    2010-01-01

    A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.

  6. Reconciling Divisions in the Field of Authentic Education

    ERIC Educational Resources Information Center

    Sarid, Ariel

    2015-01-01

    The aim of this article is twofold: first, to identify and address three central divisions in the field of authentic education that introduce ambiguity and at times inconsistencies within the field of authentic education. These divisions concern a) the relationship between autonomy and authenticity; b) the division between the two basic attitudes…

  7. Authenticity in Teaching and Teachers' Emotions: A Hermeneutic Phenomenological Study of the Classroom Reality

    ERIC Educational Resources Information Center

    Ramezanzadeh, Akram; Adel, Seyyed Mohammad Reza; Zareian, Gholamreza

    2016-01-01

    This study probed the conceptualization of authenticity in teaching and its link to teachers' emotional life through critical emotional praxis because emotions are integral to discovering who we really are (McCarthy, E. D. 2009. "Emotional Performances as Dramas of Authenticity." In "Authenticity in Culture, Self, and Society,"…

  8. 33 CFR 20.1303 - Authentication and certification of extracts from shipping articles, logbooks, and the like.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Authentication and certification... Suspension and Revocation Hearings § 20.1303 Authentication and certification of extracts from shipping...) Authentication and certification must include a statement that the person acting has seen the original, compared...

  9. An Examination of Teacher Authenticity in the College Classroom

    ERIC Educational Resources Information Center

    Johnson, Zac D.; LaBelle, Sara

    2017-01-01

    This study sought to generate a more robust understanding of teacher (in)authenticity. In other contexts, authenticity is regarded as a display of true self and has been positively linked to beneficial psychological (e.g., increased self-esteem) and social outcomes (e.g., higher relational satisfaction). However, what it means to be authentic in…

  10. Marketing Education Assessment Guide. Performance-Based Activities with Authentic Assessments Instruments.

    ERIC Educational Resources Information Center

    Everett, Donna R.

    This guide presents performance-based authentic assessment ideas, samples, and suggestions to help marketing teachers and students respond to changes and pressures from outside the classroom. It contains 21 activities, each accompanied by a method of authentic assessment. In most cases, the authentic assessment method is a scoring device. The…

  11. Perceptions of Leadership Coaches Regarding Leader Authenticity and Authenticity Development Strategies

    ERIC Educational Resources Information Center

    Stone, Anne H.

    2012-01-01

    Purpose: The purpose of this study was to identify what leadership coaches perceive to be the benefits of authenticity to their clients' success. Another purpose was to identify what barriers leadership coaches perceive as preventing their clients from developing authenticity. A final purpose of this study was to identify which strategies…

  12. Authentic e-Learning in a Multicultural Context: Virtual Benchmarking Cases from Five Countries

    ERIC Educational Resources Information Center

    Leppisaari, Irja; Herrington, Jan; Vainio, Leena; Im, Yeonwook

    2013-01-01

    The implementation of authentic learning elements at education institutions in five countries, eight online courses in total, is examined in this paper. The International Virtual Benchmarking Project (2009-2010) applied the elements of authentic learning developed by Herrington and Oliver (2000) as criteria to evaluate authenticity. Twelve…

  13. Developmental Changes in Judgments of Authentic Objects

    ERIC Educational Resources Information Center

    Frazier, Brandy N.; Gelman, Susan A.

    2009-01-01

    This study examined the development of an understanding of authenticity among 112 children (preschoolers, kindergarten, 1st graders, and 4th graders) and 119 college students. Participants were presented with pairs of photographs depicting authentic and non-authentic objects and asked to pick which one belongs in a museum and which one they would…

  14. Using Horses to Teach Authentic Leadership Skills to At-Risk Youth

    ERIC Educational Resources Information Center

    Adams, Brittany Lee

    2013-01-01

    The primary purpose of this study was to determine the impact of an equine-facilitated authentic leadership development program on at-risk youth. Participants were asked to participate in two focus groups and a 3-day equine-facilitated authentic leadership development program based on Bill George's Model of Authentic Leadership. Participants were…

  15. Application of Structured Light System Technique for Authentication of Wooden Panel Paintings.

    PubMed

    Buchón-Moragues, Fernando; Bravo, José María; Ferri, Marcelino; Redondo, Javier; Sánchez-Pérez, Juan Vicente

    2016-06-14

    This paper presents a new application of photogrammetric techniques for protecting cultural heritage. The accuracy of the method and the fact that it can be used to carry out different tests without contact between the sample and the instruments can make this technique very useful for authenticating and cataloging artworks. The application focuses on the field of pictorial artworks, and wooden panel paintings in particular. In these works, the orography formed by the brushstrokes can be easily digitalized using a photogrammetric technique, called Structured Light System, with submillimeter accuracy. Thus, some of the physical characteristics of the brushstrokes, like minimum and maximum heights or slopes become a fingerprint of the painting. We explain in detail the general principles of the Structured Light System Technique and the specific characteristics of the commercial set-up used in this work. Some experiments are carried out on a sample painted by us to check the accuracy limits of the technique and to propose some tests that can help to stablish a methodology for authentication purposes. Finally, some preliminary results obtained on a real pictorial artwork are presented, providing geometrical information of its metric features as an example of the possibilities of this application.

  16. Application of Structured Light System Technique for Authentication of Wooden Panel Paintings

    PubMed Central

    Buchón-Moragues, Fernando; Bravo, José María; Ferri, Marcelino; Redondo, Javier; Sánchez-Pérez, Juan Vicente

    2016-01-01

    This paper presents a new application of photogrammetric techniques for protecting cultural heritage. The accuracy of the method and the fact that it can be used to carry out different tests without contact between the sample and the instruments can make this technique very useful for authenticating and cataloging artworks. The application focuses on the field of pictorial artworks, and wooden panel paintings in particular. In these works, the orography formed by the brushstrokes can be easily digitalized using a photogrammetric technique, called Structured Light System, with submillimeter accuracy. Thus, some of the physical characteristics of the brushstrokes, like minimum and maximum heights or slopes become a fingerprint of the painting. We explain in detail the general principles of the Structured Light System Technique and the specific characteristics of the commercial set-up used in this work. Some experiments are carried out on a sample painted by us to check the accuracy limits of the technique and to propose some tests that can help to stablish a methodology for authentication purposes. Finally, some preliminary results obtained on a real pictorial artwork are presented, providing geometrical information of its metric features as an example of the possibilities of this application. PMID:27314353

  17. Manticore and CS mode : parallelizable encryption with joint cipher-state authentication.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Torgerson, Mark Dolan; Draelos, Timothy John; Schroeppel, Richard Crabtree

    2004-10-01

    We describe a new mode of encryption with inexpensive authentication, which uses information from the internal state of the cipher to provide the authentication. Our algorithms have a number of benefits: (1) the encryption has properties similar to CBC mode, yet the encipherment and authentication can be parallelized and/or pipelined, (2) the authentication overhead is minimal, and (3) the authentication process remains resistant against some IV reuse. We offer a Manticore class of authenticated encryption algorithms based on cryptographic hash functions, which support variable block sizes up to twice the hash output length and variable key lengths. A proof ofmore » security is presented for the MTC4 and Pepper algorithms. We then generalize the construction to create the Cipher-State (CS) mode of encryption that uses the internal state of any round-based block cipher as an authenticator. We provide hardware and software performance estimates for all of our constructions and give a concrete example of the CS mode of encryption that uses AES as the encryption primitive and adds a small speed overhead (10-15%) compared to AES alone.« less

  18. A Key Establishment Protocol for RFID User in IPTV Environment

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  19. Authenticity identification and classification of Rhodiola species in traditional Tibetan medicine based on Fourier transform near-infrared spectroscopy and chemometrics analysis.

    PubMed

    Li, Tao; Su, Chen

    2018-06-02

    Rhodiola is an increasingly widely used traditional Tibetan medicine and traditional Chinese medicine in China. The composition profiles of bioactive compounds are somewhat jagged according to different species, which makes it crucial to identify authentic Rhodiola species accurately so as to ensure clinical application of Rhodiola. In this paper, a nondestructive, rapid, and efficient method in classification of Rhodiola was developed by Fourier transform near-infrared (FT-NIR) spectroscopy combined with chemometrics analysis. A total of 160 batches of raw spectra were obtained from four different species of Rhodiola by FT-NIR, such as Rhodiola crenulata, Rhodiola fastigiata, Rhodiola kirilowii, and Rhodiola brevipetiolata. After excluding the outliers, different performances of 3 sample dividing methods, 12 spectral preprocessing methods, 2 wavelength selection methods, and 2 modeling evaluation methods were compared. The results indicated that this combination was superior than others in the authenticity identification analysis, which was FT-NIR combined with sample set partitioning based on joint x-y distances (SPXY), standard normal variate transformation (SNV) + Norris-Williams (NW) + 2nd derivative, competitive adaptive reweighted sampling (CARS), and kernel extreme learning machine (KELM). The accuracy (ACCU), sensitivity (SENS), and specificity (SPEC) of the optimal model were all 1, which showed that this combination of FT-NIR and chemometrics methods had the optimal authenticity identification performance. The classification performance of the partial least squares discriminant analysis (PLS-DA) model was slightly lower than KELM model, and PLS-DA model results were ACCU = 0.97, SENS = 0.93, and SPEC = 0.98, respectively. It can be concluded that FT-NIR combined with chemometrics analysis has great potential in authenticity identification and classification of Rhodiola, which can provide a valuable reference for the safety and effectiveness of clinical application of Rhodiola. Copyright © 2018 Elsevier B.V. All rights reserved.

  20. The influence of authentic leadership on safety climate in nursing.

    PubMed

    Dirik, Hasan Fehmi; Seren Intepeler, Seyda

    2017-07-01

    This study analysed nurses' perceptions of authentic leadership and safety climate and examined the contribution of authentic leadership to the safety climate. It has been suggested and emphasised that authentic leadership should be used as a guidance to ensure quality care and the safety of patients and health-care personnel. This predictive study was conducted with 350 nurses in three Turkish hospitals. The data were collected using the Authentic Leadership Questionnaire and the Safety Climate Survey and analysed using hierarchical regression analysis. The mean authentic leadership perception and the safety climate scores of the nurses were 2.92 and 3.50, respectively. The percentage of problematic responses was found to be less than 10% for only four safety climate items. Hierarchical regression analysis revealed that authentic leadership significantly predicted the safety climate. Procedural and political improvements are required in terms of the safety climate in institutions, where the study was conducted, and authentic leadership increases positive perceptions of safety climate. Exhibiting the characteristics of authentic leadership, or improving them and reflecting them on to personnel can enhance the safety climate. Planning information sharing meetings to raise the personnel's awareness of safety climate and systemic improvements can contribute to creating safe care climates. © 2017 John Wiley & Sons Ltd.

  1. Limitations and requirements of content-based multimedia authentication systems

    NASA Astrophysics Data System (ADS)

    Wu, Chai W.

    2001-08-01

    Recently, a number of authentication schemes have been proposed for multimedia data such as images and sound data. They include both label based systems and semifragile watermarks. The main requirement for such authentication systems is that minor modifications such as lossy compression which do not alter the content of the data preserve the authenticity of the data, whereas modifications which do modify the content render the data not authentic. These schemes can be classified into two main classes depending on the model of image authentication they are based on. One of the purposes of this paper is to look at some of the advantages and disadvantages of these image authentication schemes and their relationship with fundamental limitations of the underlying model of image authentication. In particular, we study feature-based algorithms which generate an authentication tag based on some inherent features in the image such as the location of edges. The main disadvantage of most proposed feature-based algorithms is that similar images generate similar features, and therefore it is possible for a forger to generate dissimilar images that have the same features. On the other hand, the class of hash-based algorithms utilizes a cryptographic hash function or a digital signature scheme to reduce the data and generate an authentication tag. It inherits the security of digital signatures to thwart forgery attacks. The main disadvantage of hash-based algorithms is that the image needs to be modified in order to be made authenticatable. The amount of modification is on the order of the noise the image can tolerate before it is rendered inauthentic. The other purpose of this paper is to propose a multimedia authentication scheme which combines some of the best features of both classes of algorithms. The proposed scheme utilizes cryptographic hash functions and digital signature schemes and the data does not need to be modified in order to be made authenticatable. Several applications including the authentication of images on CD-ROM and handwritten documents will be discussed.

  2. Homogeneous fluorescent specific PCR for the authentication of medicinal snakes using cationic conjugated polymers.

    PubMed

    Jiang, Chao; Yuan, Yuan; Liu, Libing; Hou, Jingyi; Jin, Yan; Huang, Luqi

    2015-11-05

    A label-free, homogenous and sensitive one-step method for the molecular authentication of medicinal snakes has been developed by combining a rapid PCR technique with water-soluble cationic conjugated polyelectrolytes (CCPs). Three medicinal snake materials (Deinagkistrodon acutus, Zaocys dhumnades and Bungarus multicinctus; a total of 35 specimens) and 48 snake specimens with similar morphologies and textures were clearly distinguished by the naked eye by utilizing a CCP-based assay in a high-throughput manner. The identification of medicinal snakes in patented Chinese drugs was successfully performed using this detection system. In contrast to previous fluorescence-labeled oligonucleotide detection and direct DNA stain hybridization assays, this method does not require designing dye-labeled primers, and unfavorable dimer fluorescence is avoided in this homogenous method.

  3. Caring for self-harming patients in general practice.

    PubMed

    Rowe, Joanne; Jaye, Chrystal

    2017-12-01

    INTRODUCTION Intentional self-harm is an international public health issue with high personal, social and financial costs to society. Poor relationship dynamics are known to have a negative influence on the psyche of people who self-harm, and this can increase anxiety and decrease self-esteem, both shown to be significant contributors to self-harm behaviours. Positive and functional social supports have been proposed as a cost-effective and constructive approach in diminishing self-harming behaviours. AIM This qualitative study investigated the aspects of professional, social, familial and romantic relationships that people who have self-harmed identified as having a positive and constructive effect on their self-harm behaviour. METHODS Twelve participants with a history of self-harming behaviours were recruited through free press advertising in primary care and interviewed. The participants ranged in age from 19 to 70 years, and represented New Zealand (NZ) European and Māori from across the Southern region of NZ. RESULTS This study shows that constructive relationships that inhibit self-harm behaviours are characterised by participants' perceptions of authenticity in their relationships, and knowing that other people genuinely care. Feeling cared for within an authentic therapeutic relationship enabled participants to overcome their perception of being damaged selves and gave them the skills and confidence to develop functional relationships within their communities. A relationship-centred care approach may be useful for general practitioners seeking to develop more effective therapeutic relationships with patients who deliberately self-harm.

  4. Authenticating Children's Literature: Raising Cultural Awareness with an Inquiry-Based Project in a Teacher Education Course

    ERIC Educational Resources Information Center

    Smith, Jane; Wiese, Patricia

    2006-01-01

    This article discusses the importance of authentic picture-storybook adaptations of multicultural folktales and describes an action research project through which a children's picture-book adaptation of a traditional tale can be authenticated using an inquiry-based process. In addition to modeling an actual authentication project using "The Golden…

  5. 21 CFR 20.3 - Certification and authentication of Food and Drug Administration records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Certification and authentication of Food and Drug... authentication of Food and Drug Administration records. (a) Upon request, the Food and Drug Administration will... or for authentication of records shall be sent in writing to the Freedom of Information Staff (HFI-35...

  6. Children's and Adolescents' Perception of the Authenticity of Smiles

    ERIC Educational Resources Information Center

    Thibault, Pascal; Gosselin, Pierre; Brunel, Marie-Lise; Hess, Ursula

    2009-01-01

    Recently, Thibault and colleagues described the Duchenne marker as a cultural dialect for the perception of smile authenticity. The current study had the goal to follow up on this finding and to investigate the cues that French Canadian children use to evaluate the authenticity of smiles from members of three ethnic groups. The authenticity of six…

  7. Meeting EFL Learners Halfway by Using Locally Relevant Authentic Materials

    ERIC Educational Resources Information Center

    Thomas, Catherine

    2014-01-01

    The author defines and describes authentic materials and discusses their benefits--citing the Input Hypothesis and the Output Principle in support of such materials--as well as some challenges of using authentic materials. Five categories of authentic materials are presented, and sources for materials and ways to use them in the EFL classroom are…

  8. Service Oriented Architecture Security Risks and their Mitigation

    DTIC Science & Technology

    2012-10-01

    this section can be mitigated by making use of suitable authentication , confidentiality, integrity, and authorisation standards such as Security...for authorisation . Machines/non-human users should be clearly identified and authenticated by the identity provision and authentication services... authentication , any security related attributes for the subject, and the authorisation decisions given based on the security and privilege attributes

  9. A Framework for Determining the Authenticity of Assessment Tasks: Applied to an Example in Law

    ERIC Educational Resources Information Center

    Burton, Kelley

    2011-01-01

    Authentic assessment tasks enhance engagement, retention and the aspirations of students. This paper explores the discipline-generic features of authentic assessment, which reflect what students need to achieve in the real world. Some assessment tasks are more authentic than others and this paper designs a proposed framework supported by the…

  10. Considering Components, Types, and Degrees of Authenticity in Designing Technology to Support Transfer

    ERIC Educational Resources Information Center

    Hardre, Patricia L.

    2013-01-01

    Authenticity is a key to using technology for instruction in ways that enhance learning and support learning transfer. Simply put, a representation is authentic when it shows learners clearly what a task, context, or experience will be like in real practice. More authentic representations help people learn and understand better. They support…

  11. Authentic leadership: develop the leader within.

    PubMed

    Yasinski, Lesia

    2014-03-01

    Great leadership usually starts with a willing heart, a positive attitude, and a desire to make a difference. Strong leadership is important, in today's health care climate, to ensure optimal patient outcomes and the fostering of future generations of knowledgeable, motivated and enthusiastic perioperative nurses. This article will explore key elements necessary for the development of authentic leadership. While highlighting the role that personal development plays in leadership skills, this article will also discuss ways to cultivate authenticity in leadership. The following questions will be addressed: What is authentic leadership? How does one become an authentic leader?

  12. [Brief introduction of geo-authentic herbs].

    PubMed

    Liang, Fei; Li, Jian; Zhang, Wei; Zhang, Rui-Xian

    2013-05-01

    The science of geo-authentic herbs is a characteristic discipline of traditional Chinese medicine established during thousands of years of clinical practices. It has a long history under the guidance of profound theories of traditional Chinese medicine. The words of "geo-authentic product" were derived from an administrative division unit in the ancient times, which layed stress on the good quality of products in particular regions. In ancient records of traditional Chinese medicine, the words of "geo-authentic product" were first found in Concise Herbal Foundation Compilation of the Ming dynasty, and the words of "geo-authentic herbs" were first discovered in Peony Pavilion of the late Ming dynasty. After all, clinical effect is the fundamental evaluation standard of geo-authentic herbs.

  13. Women outperform men in distinguishing between authentic and nonauthentic smiles.

    PubMed

    Spies, Maren; Sevincer, A Timur

    2017-11-28

    Women tend to be more accurate in decoding facial expressions than men. We hypothesized that women's better performance in decoding facial expressions extends to distinguishing between authentic and nonauthentic smiles. We showed participants portrait photos of persons who smiled because either they saw a pleasant picture (authentic smile) or were instructed to smile by the experimenter (nonauthentic smile) and asked them to identify the smiles. Participants judged single photos of persons depicting either an authentic or a nonauthentic smile, and they judged adjacent photos of the same person depicting an authentic smile and a nonauthentic smile. Women outperformed men in identifying the smiles when judging the adjacent photos. We discuss implications for judging smile authenticity in real life and limitations for the observed sex difference.

  14. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    NASA Astrophysics Data System (ADS)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  15. Relationship authenticity partially mediates the effects of attachment on relationship satisfaction.

    PubMed

    Rasco, Danney; Warner, Rebecca M

    2017-01-01

    Individuals with anxious and avoidant attachment tend to experience less satisfaction in their relationships. Past research suggests the negative effects of attachment on relationship satisfaction may be partially mediated by self-disclosure and self-concealment; the present study evaluated relationship authenticity as a potential additional mediator. Confirmatory factor analysis indicated that relationship authenticity is distinct from self-disclosure and self-concealment. Relationship authenticity predicted additional variance in relationship satisfaction controlling for attachment, self-disclosure, and self-concealment. The results were consistent with relationship authenticity, along with self-disclosure and self-concealment, partially mediating the effects of attachment on relationship satisfaction. These findings suggest that relationship authenticity may play a unique role in understanding how attachment influences relationship satisfaction. Theoretical and clinical implications are discussed.

  16. Developments of next generation monitor and control systems for radio telescopes

    NASA Astrophysics Data System (ADS)

    Kodilkar, J.; Uprade, R.; Nayak, S.; Wadadekar, Y.; Chengalur, J.; Gupta, Y.

    2013-04-01

    As part of the ongoing upgrade of the GMRT observatory, the monitor and control (M&C) system is being upgraded to a modern specification driven system. The basic building block of the proposed M&C framework is a SACE node which provides command, response and event data streaming interfaces to the child and parent nodes running locally or remotely in a heterogeneous operating system environment. A prototype M&C system formed by hierarchically composing SACE nodes at different levels has been successfully tested at the GMRT. For the recently built 15m antenna at NCRA, a generic, web based M&C system has been developed which allows remote, authenticated operation. We discuss issues relevant to the development of the next generation M&C systems for radio telescopes using the lessons learned from these two systems. We also summarize flexible, reusable and cost-effective approaches using off the shelf packages and technologies used in generic frameworks, which can contribute to form the basis for M&C systems of very large radio telescopes like the SKA.

  17. Detection and characterisation of frauds in bovine meat in natura by non-meat ingredient additions using data fusion of chemical parameters and ATR-FTIR spectroscopy.

    PubMed

    Nunes, Karen M; Andrade, Marcus Vinícius O; Santos Filho, Antônio M P; Lasmar, Marcelo C; Sena, Marcelo M

    2016-08-15

    Concerns about meat authenticity are increasing recently, due to great fraud scandals. This paper analysed real samples (43 adulterated and 12 controls) originated from criminal networks dismantled by the Brazilian Police. This fraud consisted of injecting solutions of non-meat ingredients (NaCl, phosphates, carrageenan, maltodextrin) in bovine meat, aiming to increase its water holding capacity. Five physico-chemical variables were determined, protein, ash, chloride, sodium, phosphate. Additionally, infrared spectra were recorded. Supervised classification PLS-DA models were built with each data set individually, but the best model was obtained with data fusion, correctly detecting 91% of the adulterated samples. From this model, a variable selection based on the highest VIPscores was performed and a new data fusion model was built with only one chemical variable, providing slightly lower predictions, but a good cost/performance ratio. Finally, some of the selected infrared bands were specifically associated to the presence of adulterants NaCl, tripolyphosphate and carrageenan. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. Authentication via wavefront-shaped optical responses

    NASA Astrophysics Data System (ADS)

    Eilers, Hergen; Anderson, Benjamin R.; Gunawidjaja, Ray

    2018-02-01

    Authentication/tamper-indication is required in a wide range of applications, including nuclear materials management and product counterfeit detection. State-of-the-art techniques include reflective particle tags, laser speckle authentication, and birefringent seals. Each of these passive techniques has its own advantages and disadvantages, including the need for complex image comparisons, limited flexibility, sensitivity to environmental conditions, limited functionality, etc. We have developed a new active approach to address some of these short-comings. The use of an active characterization technique adds more flexibility and additional layers of security over current techniques. Our approach uses randomly-distributed nanoparticles embedded in a polymer matrix (tag/seal) which is attached to the item to be secured. A spatial light modulator is used to adjust the wavefront of a laser which interacts with the tag/seal, and a detector is used to monitor this interaction. The interaction can occur in various ways, including transmittance, reflectance, fluorescence, random lasing, etc. For example, at the time of origination, the wavefront-shaped reflectance from a tag/seal can be adjusted to result in a specific pattern (symbol, words, etc.) Any tampering with the tag/seal would results in a disturbance of the random orientation of the nanoparticles and thus distort the reflectance pattern. A holographic waveplate could be inserted into the laser beam for verification. The absence/distortion of the original pattern would then indicate that tampering has occurred. We have tested the tag/seal's and authentication method's tamper-indicating ability using various attack methods, including mechanical, thermal, and chemical attacks, and have verified our material/method's robust tamper-indicating ability.

  19. Real-Time Food Authentication Using a Miniature Mass Spectrometer.

    PubMed

    Gerbig, Stefanie; Neese, Stephan; Penner, Alexander; Spengler, Bernhard; Schulz, Sabine

    2017-10-17

    Food adulteration is a threat to public health and the economy. In order to determine food adulteration efficiently, rapid and easy-to-use on-site analytical methods are needed. In this study, a miniaturized mass spectrometer in combination with three ambient ionization methods was used for food authentication. The chemical fingerprints of three milk types, five fish species, and two coffee types were measured using electrospray ionization, desorption electrospray ionization, and low temperature plasma ionization. Minimum sample preparation was needed for the analysis of liquid and solid food samples. Mass spectrometric data was processed using the laboratory-built software MS food classifier, which allows for the definition of specific food profiles from reference data sets using multivariate statistical methods and the subsequent classification of unknown data. Applicability of the obtained mass spectrometric fingerprints for food authentication was evaluated using different data processing methods, leave-10%-out cross-validation, and real-time classification of new data. Classification accuracy of 100% was achieved for the differentiation of milk types and fish species, and a classification accuracy of 96.4% was achieved for coffee types in cross-validation experiments. Measurement of two milk mixtures yielded correct classification of >94%. For real-time classification, the accuracies were comparable. Functionality of the software program and its performance is described. Processing time for a reference data set and a newly acquired spectrum was found to be 12 s and 2 s, respectively. These proof-of-principle experiments show that the combination of a miniaturized mass spectrometer, ambient ionization, and statistical analysis is suitable for on-site real-time food authentication.

  20. Shifted excitation Raman difference spectroscopy for authentication of cheese and cheese analogues

    NASA Astrophysics Data System (ADS)

    Sowoidnich, Kay; Kronfeldt, Heinz-Detlef

    2016-04-01

    Food authentication and the detection of adulterated products are recent major issues in the food industry as these topics are of global importance for quality control and food safety. To effectively address this challenge requires fast, reliable and non-destructive analytical techniques. Shifted Excitation Raman Difference Spectroscopy (SERDS) is well suited for identification purposes as it combines the chemically specific information obtained by Raman spectroscopy with the ability for efficient fluorescence rejection. The two slightly shifted excitation wavelengths necessary for SERDS are realized by specially designed microsystem diode lasers. At 671 nm the laser (optical power: 50 mW, spectral shift: 0.7 nm) is based on an external cavity configuration whereas an emission at 783 nm (optical power: 110 mW, spectral shift: 0.5 nm) is achieved by a distributed feedback laser. To investigate the feasibility of SERDS for rapid and nondestructive authentication purposes four types of cheese and three different cheese analogues were selected. Each sample was probed at 8 different positions using integration times of 3-10 seconds and 10 spectra were recorded at each spot. Principal components analysis was applied to the SERDS spectra revealing variations in fat and protein signals as primary distinction criterion between cheese and cheese analogues for both excitation wavelengths. Furthermore, to some extent, minor compositional differences could be identified to discriminate between individual species of cheese and cheese analogues. These findings highlight the potential of SERDS for rapid food authentication potentially paving the way for future applications of portable SERDS systems for non-invasive in situ analysis.

  1. PCPA: A Practical Certificateless Conditional Privacy Preserving Authentication Scheme for Vehicular Ad Hoc Networks

    PubMed Central

    2018-01-01

    Vehicle ad hoc networks (VANETs) is a promising network scenario for greatly improving traffic efficiency and safety, in which smart vehicles can communicate with other vehicles or roadside units. For the availability of VANETs, it is very important to deal with the security and privacy problems for VANETs. In this paper, based on certificateless cryptography and elliptic curve cryptography, we present a certificateless signature with message recovery (CLS-MR), which we believe are of independent interest. Then, a practical certificateless conditional privacy preserving authentication (PCPA) scheme is proposed by incorporating the proposed CLS-MR scheme. Furthermore, the security analysis shows that PCPA satisfies all security and privacy requirements. The evaluation results indicate that PCPA achieves low computation and communication costs because there is no need to use the bilinear pairing and map-to-point hash operations. Moreover, extensive simulations show that PCPA is feasible and achieves prominent performances in terms of message delay and message loss ratio, and thus is more suitable for the deployment and adoption of VANETs. PMID:29762511

  2. The Analysis of Physics Learning in Senior High School of Semarang Based on The Scientific Approach and Assessment

    NASA Astrophysics Data System (ADS)

    Hardyanti, R. C.; Hartono; Fianti

    2018-03-01

    Physics Learning in Curriculum of 2013 is closely related to the implementation of scientific approach and authentic assessment in learning. This study aims to analyze the implementation of scientific approaches and authentic assessment in physics learning, as well as to analyze the constraints of scientific approach and authentic assessment in physics learning. The data collection techniques used in this study are questionnaires, observations, interviews, and documentation. The calculation results used are percentage techniques and analyzed by using qualitative descriptive approach. Based on the results of research and discussion, the implementation of physics learning based on the scientific approach goes well with the percentage of 84.60%. Physical learning activity based on authentic assessment also goes well with the percentage of 88%. The results of the percentage of scientific approaches and authentic assessment approaches are less than 100%. It shows that there are obstacles to the implementation of the scientific approach and the constraints of authentic assessment. The obstacles to the implementation of scientific approach include time, heavy load of material, input or ability of learners, the willingness of learners in asking questions, laboratory support, and the ability of students to process data. While the obstacles to the implementation of authentic assessment include the limited time for carrying out of authentic assessment, the components of the criteria in carrying out the authentic assessment, the lack of discipline in administering the administration, the difficulty of changing habits in carrying out the assessment from traditional assessment to the authentic assessment, the obstacle to process the score in accordance with the format Curriculum of 2013.

  3. Discovering your authentic leadership.

    PubMed

    George, Bill; Sims, Peter; McLean, Andrew N; Mayer, Diana

    2007-02-01

    The ongoing problems in business leadership over the past five years have underscored the need for a new kind of leader in the twenty-first century: the authentic leader. Author Bill George, a Harvard Business School professor and the former chairman and CEO of Medtronic, and his colleagues, conducted the largest leadership development study ever undertaken. They interviewed 125 business leaders from different racial, religious, national, and socioeconomic backgrounds to understand how leaders become and remain authentic. Their interviews showed that you do not have to be born with any particular characteristics or traits to lead. You also do not have to be at the top of your organization. Anyone can learn to be an authentic leader. The journey begins with leaders understanding their life stories. Authentic leaders frame their stories in ways that allow them to see themselves not as passive observers but as individuals who learn from their experiences. These leaders make time to examine their experiences and to reflect on them, and in doing so they grow as individuals and as leaders. Authentic leaders also work hard at developing self-awareness through persistent and often courageous self-exploration. Denial can be the greatest hurdle that leaders face in becoming self-aware, but authentic leaders ask for, and listen to, honest feedback. They also use formal and informal support networks to help them stay grounded and lead integrated lives. The authors argue that achieving business results over a sustained period of time is the ultimate mark of authentic leadership. It may be possible to drive short-term outcomes without being authentic, but authentic leadership is the only way to create long-term results.

  4. More Than a Game: Eight Transition Lessons Chess Teaches.

    ERIC Educational Resources Information Center

    Kennedy, Mark

    1998-01-01

    Chess is an interactive, authentic, three-dimensional activity that naturally supports and encourages marginalized students in successful transitions. Chess can also help educators gain a wider understanding of what it means to be, and who is perceived to be, intelligent. Discusses eight specific ways in which chess can be beneficial in an…

  5. Accommodating Taboo Language in English Language Teaching: Issues of Appropriacy and Authenticity

    ERIC Educational Resources Information Center

    Liyanage, Indika; Walker, Tony; Bartlett, Brendan; Guo, Xuhong

    2015-01-01

    Culturally specific language practices related to vernacular uses of taboo language such as swearing represent a socially communicative minefield for learners of English. The role of classroom learning experiences to prepare learners for negotiation of taboo language use in social interactions is correspondingly complicated and ignored in much of…

  6. MULTIPLE ENZYME RESTRICTION FRAGMENT LENGTH POLYMORPHISM ANALYSIS FOR HIGH RESOLUTION DISTINCTION OF PSEUDOMONAS (SENSU STRICTO) 16S RRNA GENES

    EPA Science Inventory

    Pseudomonas specific 16S rDNA PCR amplification and multiple enzyme restriction fragment length polymorphism (MERFLP) analysis using a single digestion mixture of Alu I, Hinf I, Rsa I, and Tru 9I distinguished 150 published sequences and reference strains of authentic Pseudomonas...

  7. The Relationship between Spirituality and Sexual Identity among Lesbian and Gay Undergraduate Students: A Qualitative Analysis

    ERIC Educational Resources Information Center

    Johnson, Danielle Marie

    2013-01-01

    Within higher education today, the student population in American colleges and universities is becoming increasingly diverse, relative to students' racial/ethnic, sexual, religion, and gender identities. Specifically, students who identify as Lesbian and gay are more often seeking personal authenticity and opportunities to make meaning of their…

  8. Composing Critical Pedagogies: Teaching Writing as Revision. Refiguring English Studies Series.

    ERIC Educational Resources Information Center

    Lee, Amy

    Taking readers inside a first-year college writing classroom and inviting them to reflect on the social, interpersonal, and institutional issues being worked through in specific classroom discussions, this book presents an account of an honestly politicized college writing classroom and focuses on authentic classroom practices and actual students'…

  9. Storying Cultural Specificities of ESL Teaching in Fiji: A Grounded Composite Narrative.

    ERIC Educational Resources Information Center

    Boufoy-Bastick, Beatrice

    This paper utilizes a grounded narrative to report characteristics of teaching that are most culturally Fijian. Grounded narrative is a data reduction methodology of qualitative reporting evidenced by the data. It is used to portray vividly and authentically the Fijian educational setting by highlighting the salient cultural characteristics that…

  10. Using Authentic Resources in Teaching French. Teaching Languages, 4.

    ERIC Educational Resources Information Center

    Jones, Barry, Ed.

    A collection of papers gives ideas for exploitation of resources easily available to the language teacher. Although the papers apply specifically to French instruction, the ideas may be of interest to all language teachers. "Realia in the Classroom" (Norman Hill) concerns the contribution to language instruction of such materials as containers,…

  11. A Corpus-Based Approach to Online Materials Development for Writing Research Articles

    ERIC Educational Resources Information Center

    Chang, Ching-Fen; Kuo, Chih-Hua

    2011-01-01

    There has been increasing interest in the possible applications of corpora to both linguistic research and pedagogy. This study takes a corpus-based, genre-analytic approach to discipline-specific materials development. Combining corpus analysis with genre analysis makes it possible to develop teaching materials that are not only authentic but…

  12. Can We Improve Training for Health Professionals to Sustain Local Health Development?

    PubMed Central

    King, Stephen

    2016-01-01

    Can we improve training for health professionals? We explore specific variables that need to be accounted for to achieve sustainable local health development through training. A problem-based approach with appreciation of the need for making changes is suggested as the only authentic basis for training. PMID:28090174

  13. Captions and Reduced Forms Instruction: The Impact on EFL Students' Listening Comprehension

    ERIC Educational Resources Information Center

    Yang, Jie Chi; Chang, Peichin

    2014-01-01

    For many EFL learners, listening poses a grave challenge. The difficulty in segmenting a stream of speech and limited capacity in short-term memory are common weaknesses for language learners. Specifically, reduced forms, which frequently appear in authentic informal conversations, compound the challenges in listening comprehension. Numerous…

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Solis, John Hector

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a securemore » program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.« less

  15. 42 CFR 401.140 - Fees and charges.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... for records; and (3) Certification or authentication of records. (b) Fee schedules. The fee schedule.... (3) Certification or authentication of records. Three dollars per certification or authentication. (4...

  16. 31 CFR 363.19 - What should I do if I become aware that my password or other form of authentication has become...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... that my password or other form of authentication has become compromised? 363.19 Section 363.19 Money... that my password or other form of authentication has become compromised? If you become aware that your password has become compromised, that any other form of authentication has been compromised, lost, stolen...

  17. Assessment of Web-Based Authentication Methods in the U.S.: Comparing E-Learning Systems to Internet Healthcare Information Systems

    ERIC Educational Resources Information Center

    Mattord, Herbert J.

    2012-01-01

    Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS). It developed an Authentication Method System Index (AMSI) to analyze collected data from…

  18. Authenticity in Education: From Narcissism and Freedom to the Messy Interplay of Self-Exploration and Acceptable Tension

    ERIC Educational Resources Information Center

    Thompson, Merlin B.

    2015-01-01

    The problem with authenticity--the idea of being "true to one's self"--is that its somewhat checkered reputation garners a complete range of favorable and unfavorable reactions. In educational settings, authenticity is lauded as one of the top two traits students desire in their teachers. Yet, authenticity is criticized for its tendency…

  19. Robust authentication through stochastic femtosecond laser filament induced scattering surfaces

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Haisu; Tzortzakis, Stelios, E-mail: stzortz@iesl.forth.gr; Materials Science and Technology Department, University of Crete, 71003 Heraklion

    2016-05-23

    We demonstrate a reliable authentication method by femtosecond laser filament induced scattering surfaces. The stochastic nonlinear laser fabrication nature results in unique authentication robust properties. This work provides a simple and viable solution for practical applications in product authentication, while also opens the way for incorporating such elements in transparent media and coupling those in integrated optical circuits.

  20. Obfuscated authentication systems, devices, and methods

    DOEpatents

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  1. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    PubMed

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  2. Girls' relationship authenticity and self-esteem across adolescence.

    PubMed

    Impett, Emily A; Sorsoli, Lynn; Schooler, Deborah; Henson, James M; Tolman, Deborah L

    2008-05-01

    Feminist psychologists have long posited that relationship authenticity (i.e., the congruence between what one thinks and feels and what one does and says in relational contexts) is integral to self-esteem and well-being. Guided by a feminist developmental framework, the authors investigated the role of relationship authenticity in promoting girls' self-esteem over the course of adolescence. Latent growth curve modeling was used to test the association between relationship authenticity and self-esteem with data from a 5-year, 3-wave longitudinal study of 183 adolescent girls. Results revealed that both relationship authenticity and self-esteem increased steadily in a linear fashion from the 8th to the 12th grade. Girls who scored high on the measure of relationship authenticity in the 8th grade experienced greater increases in self-esteem over the course of adolescence than girls who scored low on relationship authenticity. Further, girls who increased in authenticity also tended to increase in self-esteem over the course of adolescence. The importance of a feminist developmental framework for identifying and understanding salient dimensions of female adolescence is discussed. (PsycINFO Database Record (c) 2008 APA, all rights reserved).

  3. Picasso Paintings, Moon Rocks, and Hand-Written Beatles Lyrics: Adults' Evaluations of Authentic Objects.

    PubMed

    Frazier, Brandy N; Gelman, Susan A; Wilson, Alice; Hood, Bruce

    2009-01-01

    Authentic objects are those that have an historical link to a person, event, time, or place of some significance (e.g., original Picasso painting; gown worn by Princess Diana; your favorite baby blanket). The current study examines everyday beliefs about authentic objects, with three primary goals: to determine the scope of adults' evaluation of authentic objects, to examine such evaluation in two distinct cultural settings, and to determine whether a person's attachment history (i.e., whether or not they owned an attachment object as a child) predicts evaluation of authentic objects. We found that college students in the U.K. (N = 125) and U.S. (N = 119) consistently evaluate a broad range of authentic items as more valuable than matched control (inauthentic) objects, more desirable to keep, and more desirable to touch, though only non-personal authentic items were judged to be more appropriate for display in a museum. These patterns were remarkably similar across the two cultural contexts. Additionally, those who had an attachment object as a child evaluated objects more favorably, and in particular judged authentic objects to be more valuable. Altogether, these results demonstrate broad endorsement of "positive contagion" among college-educated adults.

  4. Picasso Paintings, Moon Rocks, and Hand-Written Beatles Lyrics: Adults’ Evaluations of Authentic Objects

    PubMed Central

    Frazier, Brandy N.; Gelman, Susan A.; Wilson, Alice; Hood, Bruce

    2010-01-01

    Authentic objects are those that have an historical link to a person, event, time, or place of some significance (e.g., original Picasso painting; gown worn by Princess Diana; your favorite baby blanket). The current study examines everyday beliefs about authentic objects, with three primary goals: to determine the scope of adults’ evaluation of authentic objects, to examine such evaluation in two distinct cultural settings, and to determine whether a person’s attachment history (i.e., whether or not they owned an attachment object as a child) predicts evaluation of authentic objects. We found that college students in the U.K. (N = 125) and U.S. (N = 119) consistently evaluate a broad range of authentic items as more valuable than matched control (inauthentic) objects, more desirable to keep, and more desirable to touch, though only non-personal authentic items were judged to be more appropriate for display in a museum. These patterns were remarkably similar across the two cultural contexts. Additionally, those who had an attachment object as a child evaluated objects more favorably, and in particular judged authentic objects to be more valuable. Altogether, these results demonstrate broad endorsement of "positive contagion" among college-educated adults. PMID:20631919

  5. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  6. Redefining Authentic Research Experiences in Introductory Biology Laboratories and Barriers to Their Implementation

    PubMed Central

    Spell, Rachelle M.; Guinan, Judith A.; Miller, Kristen R.; Beck, Christopher W.

    2014-01-01

    Incorporating authentic research experiences in introductory biology laboratory classes would greatly expand the number of students exposed to the excitement of discovery and the rigor of the scientific process. However, the essential components of an authentic research experience and the barriers to their implementation in laboratory classes are poorly defined. To guide future reform efforts in this area, we conducted a national survey of biology faculty members to determine 1) their definitions of authentic research experiences in laboratory classes, 2) the extent of authentic research experiences currently experienced in their laboratory classes, and 3) the barriers that prevent incorporation of authentic research experiences into these classes. Strikingly, the definitions of authentic research experiences differ among faculty members and tend to emphasize either the scientific process or the discovery of previously unknown data. The low level of authentic research experiences in introductory biology labs suggests that more development and support is needed to increase undergraduate exposure to research experiences. Faculty members did not cite several barriers commonly assumed to impair pedagogical reform; however, their responses suggest that expanded support for development of research experiences in laboratory classes could address the most common barrier. PMID:24591509

  7. Redefining authentic research experiences in introductory biology laboratories and barriers to their implementation.

    PubMed

    Spell, Rachelle M; Guinan, Judith A; Miller, Kristen R; Beck, Christopher W

    2014-01-01

    Incorporating authentic research experiences in introductory biology laboratory classes would greatly expand the number of students exposed to the excitement of discovery and the rigor of the scientific process. However, the essential components of an authentic research experience and the barriers to their implementation in laboratory classes are poorly defined. To guide future reform efforts in this area, we conducted a national survey of biology faculty members to determine 1) their definitions of authentic research experiences in laboratory classes, 2) the extent of authentic research experiences currently experienced in their laboratory classes, and 3) the barriers that prevent incorporation of authentic research experiences into these classes. Strikingly, the definitions of authentic research experiences differ among faculty members and tend to emphasize either the scientific process or the discovery of previously unknown data. The low level of authentic research experiences in introductory biology labs suggests that more development and support is needed to increase undergraduate exposure to research experiences. Faculty members did not cite several barriers commonly assumed to impair pedagogical reform; however, their responses suggest that expanded support for development of research experiences in laboratory classes could address the most common barrier.

  8. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    PubMed

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  9. Security of fragile authentication watermarks with localization

    NASA Astrophysics Data System (ADS)

    Fridrich, Jessica

    2002-04-01

    In this paper, we study the security of fragile image authentication watermarks that can localize tampered areas. We start by comparing the goals, capabilities, and advantages of image authentication based on watermarking and cryptography. Then we point out some common security problems of current fragile authentication watermarks with localization and classify attacks on authentication watermarks into five categories. By investigating the attacks and vulnerabilities of current schemes, we propose a variation of the Wong scheme18 that is fast, simple, cryptographically secure, and resistant to all known attacks, including the Holliman-Memon attack9. In the new scheme, a special symmetry structure in the logo is used to authenticate the block content, while the logo itself carries information about the block origin (block index, the image index or time stamp, author ID, etc.). Because the authentication of the content and its origin are separated, it is possible to easily identify swapped blocks between images and accurately detect cropped areas, while being able to accurately localize tampered pixels.

  10. State Authenticity as Fit to Environment: The Implications of Social Identity for Fit, Authenticity, and Self-Segregation.

    PubMed

    Schmader, Toni; Sedikides, Constantine

    2017-10-01

    People seek out situations that "fit," but the concept of fit is not well understood. We introduce State Authenticity as Fit to the Environment (SAFE), a conceptual framework for understanding how social identities motivate the situations that people approach or avoid. Drawing from but expanding the authenticity literature, we first outline three types of person-environment fit: self-concept fit, goal fit, and social fit. Each type of fit, we argue, facilitates cognitive fluency, motivational fluency, and social fluency that promote state authenticity and drive approach or avoidance behaviors. Using this model, we assert that contexts subtly signal social identities in ways that implicate each type of fit, eliciting state authenticity for advantaged groups but state inauthenticity for disadvantaged groups. Given that people strive to be authentic, these processes cascade down to self-segregation among social groups, reinforcing social inequalities. We conclude by mapping out directions for research on relevant mechanisms and boundary conditions.

  11. Compact storage of medical images with patient information.

    PubMed

    Acharya, R; Anand, D; Bhat, S; Niranjan, U C

    2001-12-01

    Digital watermarking is a technique of hiding specific identification data for copyright authentication. This technique is adapted here for interleaving patient information with medical images to reduce storage and transmission overheads. The text data are encrypted before interleaving with images to ensure greater security. The graphical signals are compressed and subsequently interleaved with the image. Differential pulse-code-modulation and adaptive-delta-modulation techniques are employed for data compression, and encryption and results are tabulated for a specific example.

  12. 22 CFR 61.5 - Authentication procedures-Imports.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking Department authentication of foreign produced audio-visual materials shall submit to the Department a bona fide foreign...

  13. 22 CFR 61.5 - Authentication procedures-Imports.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking Department authentication of foreign produced audio-visual materials shall submit to the Department a bona fide foreign...

  14. 22 CFR 61.5 - Authentication procedures-Imports.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... AUDIO-VISUAL MATERIALS § 61.5 Authentication procedures—Imports. (a) Applicants seeking Department authentication of foreign produced audio-visual materials shall submit to the Department a bona fide foreign...

  15. [Inheritance and innovation of traditional Chinese medicinal authentication].

    PubMed

    Zhao, Zhong-zhen; Chen, Hu-biao; Xiao, Pei-gen; Guo, Ping; Liang, Zhi-tao; Hung, Fanny; Wong, Lai-lai; Brand, Eric; Liu, Jing

    2015-09-01

    Chinese medicinal authentication is fundamental for the standardization and globalization of Chinese medicine. The discipline of authentication addresses difficult issues that have remained unresolved for thousands of years, and is essential for preserving safety. Chinese medicinal authentication has both scientific and traditional cultural connotations; the use of scientific methods to elucidate traditional experience-based differentiation carries the legacy of Chinese medicine forward, and offers immediate practical significance and long-term scientific value. In this paper, a path of inheritance and innovation is explored through the scientific exposition of Chinese medicinal authentication, featuring a review of specialized publications, the establishment of a Chinese medicine specimen center and Chinese medicinal image databases, the expansion of authentication technologies, and the formation of a cultural project dedicated to the Compedium of Materia Medica.

  16. Backup key generation model for one-time password security protocol

    NASA Astrophysics Data System (ADS)

    Jeyanthi, N.; Kundu, Sourav

    2017-11-01

    The use of one-time password (OTP) has ushered new life into the existing authentication protocols used by the software industry. It introduced a second layer of security to the traditional username-password authentication, thus coining the term, two-factor authentication. One of the drawbacks of this protocol is the unreliability of the hardware token at the time of authentication. This paper proposes a simple backup key model that can be associated with the real world applications’user database, which would allow a user to circumvent the second authentication stage, in the event of unavailability of the hardware token.

  17. LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP

    NASA Astrophysics Data System (ADS)

    Chenait, Manel

    Mobile IP represents a simple and scalable global mobility solution. However, it inhibits various vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. In this paper, we discuss two authentication schemes suggested for Mobile IP: standard authentication and Mobile IP/AAA authentication. In order to provide Mobile IP roaming services including identity verication, we propose an improvement to Mobile/AAA authentication scheme by applying a local politic key management in each domain, hence we reduce hando latency by avoiding the involvement of AAA infrastructure during mobile node roaming.

  18. Digital holographic-based cancellable biometric for personal authentication

    NASA Astrophysics Data System (ADS)

    Verma, Gaurav; Sinha, Aloka

    2016-05-01

    In this paper, we propose a new digital holographic-based cancellable biometric scheme for personal authentication and verification. The realization of cancellable biometric is presented by using an optoelectronic experimental approach, in which an optically recorded hologram of the fingerprint of a person is numerically reconstructed. Each reconstructed feature has its own perspective, which is utilized to generate user-specific fingerprint features by using a feature-extraction process. New representations of the user-specific fingerprint features can be obtained from the same hologram, by changing the reconstruction distance (d) by an amount Δd between the recording plane and the reconstruction plane. This parameter is the key to make the cancellable user-specific fingerprint features using a digital holographic technique, which allows us to choose different reconstruction distances when reissuing the user-specific fingerprint features in the event of compromise. We have shown theoretically that each user-specific fingerprint feature has a unique identity with a high discrimination ability, and the chances of a match between them are minimal. In this aspect, a recognition system has also been demonstrated using the fingerprint biometric of the enrolled person at a particular reconstruction distance. For the performance evaluation of a fingerprint recognition system—the false acceptance ratio, the false rejection ratio and the equal error rate are calculated using correlation. The obtained results show good discrimination ability between the genuine and the impostor populations with the highest recognition rate of 98.23%.

  19. Antecedents, mediators, and outcomes of authentic leadership in healthcare: A systematic review.

    PubMed

    Alilyyani, Bayan; Wong, Carol A; Cummings, Greta

    2018-07-01

    Leaders are essential in every organization to achieve patient safety and healthy work environments. Authentic leadership is a relational leadership style purported to promote healthy work environments that influence staff performance and organizational outcomes. Given recent growth in authentic leadership research in healthcare and the importance of new knowledge to inform leadership development, there is an obligation to determine what is known about the antecedents and outcomes of authentic leadership in healthcare settings and clarify mechanisms by which authentic leadership affects healthcare staff and patient outcomes. The aim of this systematic review was to examine the antecedents, mediators and outcomes associated with authentic leadership in healthcare. Systematic review. The search strategy included 11 electronic databases: ABI Inform Dateline, Academic Search Complete, Cochrane Database of Systematic Reviews, PubMed, CINAHL, Embase, ERIC, PsycINFO, Scopus, Web of Science, and ProQuest Dissertations & Theses. The search was conducted in January 2017. Published English-only quantitative research that examined the antecedents, mediators and outcomes of authentic leadership practices of leaders in healthcare settings was included. Quality assessment, data extractions, and analysis were completed on all included studies. Data extracted from included studies were analyzed through descriptive and narrative syntheses. Content analysis was used to group antecedents, outcomes and mediators into categories which were then compared to authentic leadership theory. 1036 titles and abstracts were screened yielding 136 manuscripts for full-text review which resulted in 21 included studies reported in 38 manuscripts. Significant associations between authentic leadership and 43 outcomes were grouped into two major themes: healthcare staff outcomes with 5 subthemes (personal psychological states, satisfaction with work, work environment factors, health & well-being, and performance) and patient outcomes. There were 23 mediators between authentic leadership and 35 different outcomes in the included studies and one antecedent of authentic leadership. Findings of this review provide support for authentic leadership theory and suggest need for additional testing in future studies using longitudinal and interventional designs in more varied healthcare settings with diverse and interprofessional healthcare samples. Knowledge generated through this systematic review provides a more comprehensive understanding of authentic leadership, which can be used to educate future leaders and has the potential to improve leadership development strategies and positive outcomes in healthcare workplaces. Copyright © 2018 Elsevier Ltd. All rights reserved.

  20. An Energy Efficient Protocol For The Internet Of Things

    NASA Astrophysics Data System (ADS)

    Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas

    2015-01-01

    The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.

Top