In this thesis, we design three new authentication mechanisms based on user identity. Therefore, we bring improvements in access control for different classes of networks such as Home Network, Governmental Network and Cellular Network. The identity can be biometric public features, simple strings (email addresses, login...), etc. The first solution concerns the use of biometric in Home Network' authentication mechanisms. In the Home Network (HN) case study, we aim at personalizing the access of each user in the HN and preventing illegitimate users (passing by the Home Gateway (HG)) to have any access. We propose a new biometric authentication method which respects the constraint of the non storage of the users' Biometric Template (BT) in th...
This paper reports the phases of study and implementation of a remote biometric authentication proto...
With the rise of the Internet, remote verification of identity is an increasingly important part of ...
Abstract — Electronic passports (e-passports) are to prevent the illegal entry of traveller into a s...
Dans cette thèse, nous concevons trois nouveaux mécanismes d'authentification basés sur l'identité d...
User authentication is an essential task to contribute to efficient security of IT systems. Innovati...
Securing information during its storage and transmission is an important and widely addressed issue....
In this paper we will present some schemes for strengthening network authentification over insecure ...
In this thesis we present a scheme for automating authentication based on social factors using mobil...
© 2016 IEEE. The adoption of Cloud computing involves many advantages in terms of flexibility, scala...
With the globalization of our society we are increasingly engaged in transactions, both ...
This thesis focuses on the analysis and design of secure and privacy-preserving biometric deployment...
Cryptographic credentials allow user authorizations to be granted and verified. and have such applic...
The term 'identification' refers to a situation where a person, or a communicating device, provides ...
IT networks evolution, chiefly Internet, roots within the emergence of preeminent paradigms such as ...
Software Applications are being ubiquitous in our daily life. One application may run in different p...
This paper reports the phases of study and implementation of a remote biometric authentication proto...
With the rise of the Internet, remote verification of identity is an increasingly important part of ...
Abstract — Electronic passports (e-passports) are to prevent the illegal entry of traveller into a s...
Dans cette thèse, nous concevons trois nouveaux mécanismes d'authentification basés sur l'identité d...
User authentication is an essential task to contribute to efficient security of IT systems. Innovati...
Securing information during its storage and transmission is an important and widely addressed issue....
In this paper we will present some schemes for strengthening network authentification over insecure ...
In this thesis we present a scheme for automating authentication based on social factors using mobil...
© 2016 IEEE. The adoption of Cloud computing involves many advantages in terms of flexibility, scala...
With the globalization of our society we are increasingly engaged in transactions, both ...
This thesis focuses on the analysis and design of secure and privacy-preserving biometric deployment...
Cryptographic credentials allow user authorizations to be granted and verified. and have such applic...
The term 'identification' refers to a situation where a person, or a communicating device, provides ...
IT networks evolution, chiefly Internet, roots within the emergence of preeminent paradigms such as ...
Software Applications are being ubiquitous in our daily life. One application may run in different p...
This paper reports the phases of study and implementation of a remote biometric authentication proto...
With the rise of the Internet, remote verification of identity is an increasingly important part of ...
Abstract — Electronic passports (e-passports) are to prevent the illegal entry of traveller into a s...