933 resultados para Fingure Print Authentication
Resumo:
The present work is a preliminary study to settle the optimum experimental conditions and data processing for accomplishing the strategies established by the Action Plan for the EU olive oil sector. The objectives of the work were: a) to monitor the evolution of extra virgin olive oil exposed to indirect solar light in transparent glass bottles during four months; b) to identify spectral differences between edible and lampant virgin olive oil by applying high resolution Nuclear Magnetic Resonance (HR-NMR) Spectroscopy. Pr esent study could contribute to determine the date of minimum storage, their optimum conditions, and to properly characterize olive oil.
Resumo:
This document will be divided into two main parts. The first one will be the classification of the authentication techniques. We will search the main electronic databases for papers related to authentication techniques. We will then summarize the related papers and show what classifications they use for the authentication techniques. After all of the documents have been read and summarized we will analyse them and group the authentication techniques into the classifications found. For the second part of the document we will focus on the study of usability attributes in the authentication techniques. This to know how authentications techniques compare to one another based on their usability attributes. We will search the main electronic databases for papers related to the usability attributes of authentication techniques based on the usability definition of ISO/IEC 25010 (SQuaRE) and its attributes. We will then summarize the related papers and show what authentication methods they describe and which usability attributes they measure. After all of the documents have been read and summarized we will analyse them depending on their usability attribute. At the end we will elaborate those results to show which authentication techniques have better usability in terms of a specific usability attribute. This will help practitioners who are interested in using authentication methods but want or need to focus on a specific usability attribute. They will be able to use this as a guide to help them chose the best option that fits their purpose.
Resumo:
El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de la Internet de las Cosas, el comercio electrónico, las redes sociales, la telefonía móvil y la computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección y privacidad de la información y su contenido, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos o las comunicaciones electrónicas. Este hecho puede verse agravado por la falta de una frontera clara que delimite el mundo personal del mundo laboral en cuanto al acceso de la información. En todos estos campos de la actividad personal y laboral, la Criptografía ha jugado un papel fundamental aportando las herramientas necesarias para garantizar la confidencialidad, integridad y disponibilidad tanto de la privacidad de los datos personales como de la información. Por otro lado, la Biometría ha propuesto y ofrecido diferentes técnicas con el fin de garantizar la autentificación de individuos a través del uso de determinadas características personales como las huellas dáctilares, el iris, la geometría de la mano, la voz, la forma de caminar, etc. Cada una de estas dos ciencias, Criptografía y Biometría, aportan soluciones a campos específicos de la protección de datos y autentificación de usuarios, que se verían enormemente potenciados si determinadas características de ambas ciencias se unieran con vistas a objetivos comunes. Por ello es imperativo intensificar la investigación en estos ámbitos combinando los algoritmos y primitivas matemáticas de la Criptografía con la Biometría para dar respuesta a la demanda creciente de nuevas soluciones más técnicas, seguras y fáciles de usar que potencien de modo simultáneo la protección de datos y la identificacíón de usuarios. En esta combinación el concepto de biometría cancelable ha supuesto una piedra angular en el proceso de autentificación e identificación de usuarios al proporcionar propiedades de revocación y cancelación a los ragos biométricos. La contribución de esta tesis se basa en el principal aspecto de la Biometría, es decir, la autentificación segura y eficiente de usuarios a través de sus rasgos biométricos, utilizando tres aproximaciones distintas: 1. Diseño de un esquema criptobiométrico borroso que implemente los principios de la biometría cancelable para identificar usuarios lidiando con los problemas acaecidos de la variabilidad intra e inter-usuarios. 2. Diseño de una nueva función hash que preserva la similitud (SPHF por sus siglas en inglés). Actualmente estas funciones se usan en el campo del análisis forense digital con el objetivo de buscar similitudes en el contenido de archivos distintos pero similares de modo que se pueda precisar hasta qué punto estos archivos pudieran ser considerados iguales. La función definida en este trabajo de investigación, además de mejorar los resultados de las principales funciones desarrolladas hasta el momento, intenta extender su uso a la comparación entre patrones de iris. 3. Desarrollando un nuevo mecanismo de comparación de patrones de iris que considera tales patrones como si fueran señales para compararlos posteriormente utilizando la transformada de Walsh-Hadarmard. Los resultados obtenidos son excelentes teniendo en cuenta los requerimientos de seguridad y privacidad mencionados anteriormente. Cada uno de los tres esquemas diseñados han sido implementados para poder realizar experimentos y probar su eficacia operativa en escenarios que simulan situaciones reales: El esquema criptobiométrico borroso y la función SPHF han sido implementados en lenguaje Java mientras que el proceso basado en la transformada de Walsh-Hadamard en Matlab. En los experimentos se ha utilizado una base de datos de imágenes de iris (CASIA) para simular una población de usuarios del sistema. En el caso particular de la función de SPHF, además se han realizado experimentos para comprobar su utilidad en el campo de análisis forense comparando archivos e imágenes con contenido similar y distinto. En este sentido, para cada uno de los esquemas se han calculado los ratios de falso negativo y falso positivo. ABSTRACT The extraordinary increase of new information technologies, the development of Internet of Things, the electronic commerce, the social networks, mobile or smart telephony and cloud computing and storage, have provided great benefits in all areas of society. Besides this fact, there are new challenges for the protection and privacy of information and its content, such as the loss of confidentiality and integrity of electronic documents and communications. This is exarcebated by the lack of a clear boundary between the personal world and the business world as their differences are becoming narrower. In both worlds, i.e the personal and the business one, Cryptography has played a key role by providing the necessary tools to ensure the confidentiality, integrity and availability both of the privacy of the personal data and information. On the other hand, Biometrics has offered and proposed different techniques with the aim to assure the authentication of individuals through their biometric traits, such as fingerprints, iris, hand geometry, voice, gait, etc. Each of these sciences, Cryptography and Biometrics, provides tools to specific problems of the data protection and user authentication, which would be widely strengthen if determined characteristics of both sciences would be combined in order to achieve common objectives. Therefore, it is imperative to intensify the research in this area by combining the basics mathematical algorithms and primitives of Cryptography with Biometrics to meet the growing demand for more secure and usability techniques which would improve the data protection and the user authentication. In this combination, the use of cancelable biometrics makes a cornerstone in the user authentication and identification process since it provides revocable or cancelation properties to the biometric traits. The contributions in this thesis involve the main aspect of Biometrics, i.e. the secure and efficient authentication of users through their biometric templates, considered from three different approaches. The first one is designing a fuzzy crypto-biometric scheme using the cancelable biometric principles to take advantage of the fuzziness of the biometric templates at the same time that it deals with the intra- and inter-user variability among users without compromising the biometric templates extracted from the legitimate users. The second one is designing a new Similarity Preserving Hash Function (SPHF), currently widely used in the Digital Forensics field to find similarities among different files to calculate their similarity level. The function designed in this research work, besides the fact of improving the results of the two main functions of this field currently in place, it tries to expand its use to the iris template comparison. Finally, the last approach of this thesis is developing a new mechanism of handling the iris templates, considering them as signals, to use the Walsh-Hadamard transform (complemented with three other algorithms) to compare them. The results obtained are excellent taking into account the security and privacy requirements mentioned previously. Every one of the three schemes designed have been implemented to test their operational efficacy in situations that simulate real scenarios: The fuzzy crypto-biometric scheme and the SPHF have been implemented in Java language, while the process based on the Walsh-Hadamard transform in Matlab. The experiments have been performed using a database of iris templates (CASIA-IrisV2) to simulate a user population. The case of the new SPHF designed is special since previous to be applied i to the Biometrics field, it has been also tested to determine its applicability in the Digital Forensic field comparing similar and dissimilar files and images. The ratios of efficiency and effectiveness regarding user authentication, i.e. False Non Match and False Match Rate, for the schemes designed have been calculated with different parameters and cases to analyse their behaviour.
Resumo:
After thirty-six years of biennial updates, the authors take great pride in being able to publish the nineteenth version (2001) of the “Brandon/Hill Selected List of Print Books and Journals for the Small Medical Library.” This list of 630 books and 143 journals is intended as a selection guide for health sciences libraries or similar facilities. It can also function as a core collection for a library consortium. Books and journals are categorized by subject; the book list is followed by an author/editor index, and the subject list of journals, by an alphabetical title listing. Due to continuing requests from librarians, a “minimal core list” consisting of 81 titles has been pulled out from the 217 asterisked (*) initial-purchase books and marked with daggers (†*) before the asterisks. To purchase the entire collection of 630 books and to pay for 143 2001 journal subscriptions would require $124,000. The cost of only the asterisked items, books and journals, totals $55,000. The “minimal core list” book collection costs approximately $14,300.
Resumo:
This list of 424 books and 77 journals is intended as a selection guide for print literature to be used in a library supporting allied health educational programs or allied health personnel in either an academic or health care setting. Because of the impossibility of covering the large number and wide variety of allied health professions and occupations, the recommended publications are focused primarily on the educational programs listed and recognized by the American Medical Association and other accrediting bodies. Books and journals are categorized by subject; the book list is followed by an author/editor index, and the subject list of journals by an alphabetical title listing. Items suggested for initial purchase (167 books and 31 journals) are indicated by asterisks. To purchase the entire collection of books and journals (2000 subscriptions) would require an expenditure of about $31,970. The cost of only the asterisked items totals $12,515.
Resumo:
Il lavoro di tesi, che si compone di tre articoli di ricerca, analizza, nel contesto della marketing promotion, la risposta del consumatore ai media in termini di ricordo, intenzione di acquisto, comportamento di acquisto e preferenza per il medium. Il lavoro, in particolare, mette a confronto due tipologie di media, carta e online, nell’ambito della price e loyalty promotion, utilizzando due disegni di ricerca sperimentali ed uno correlazionale. I risultati del lavoro mostrano che la risposta del consumatore alla comunicazione promozionale e ai media è eterogenea: segmenti di clienti diversi rispondono in maniera differente sia alla comunicazione promozionale che a carta e digitale. Online e carta hanno in media la stessa efficacia sui comportamenti di acquisto dei clienti, ma differiscono rispetto all’effetto su ricordo e atteggiamento e rispetto alla preferenza per il medium espressa dalla clientela. Lo spostamento delle risorse di marketing dalla carta al digitale permetterebbe quindi di ridurre i costi mantenendo lo stesso livello di efficacia. Inoltre, il presente lavoro mostra come sia possibile aumentare la risposta dei consumatori ai media attraverso un approccio di segmentazione della clientela.
Resumo:
The Colorado Alliance of Research Libraries has launched the Alliance Shared Print Trust and is in the process of developing a shared print analysis tool. The system allows libraries to compare themselves with other libraries that have added their MARC records so that they can easily and quickly determine what records are unique or held in common with other libraries. The comparison system is built on open source tools and has been embedded in the Gold Rush framework. The author provides a brief overview of other shared print analysis tools.
Resumo:
The Journal Retention and Needs Listing (JRNL) program: 1) allows libraries to expose lists of print journals for which they have made retention commitments; 2) express needs (or gaps) in their holdings; and 3) communicate offers to fill the gaps in other participating libraries’ holdings. Multiple library consortia and their member libraries use JRNL to facilitate communication between library staff to identify holding commitments, fill gaps, and guide deselection decisions. JRNL is commonly developed and governed by the participating consortia. Currently, those consortia are the Florida Academic Repository (FLARE), the Association of Southeastern Research Libraries (ASERL)/Washington Research Library Consortium (WRLC), and the Western Regional Storage Trust (WEST).
Resumo:
As the user base of the Internet has grown tremendously, the need for secure services has increased accordingly. Most secure protocols, in digital business and other fields, use a combination of symmetric and asymmetric cryptography, random generators and hash functions in order to achieve confidentiality, integrity, and authentication. Our proposal is an integral security kernel based on a powerful mathematical scheme from which all of these cryptographic facilities can be derived. The kernel requires very little resources and has the flexibility of being able to trade off speed, memory or security; therefore, it can be efficiently implemented in a wide spectrum of platforms and applications, either software, hardware or low cost devices. Additionally, the primitives are comparable in security and speed to well known standards.
Resumo:
Letter from Otis in Boston to his father, James Otis Sr. on June 17, 1743. In the short, half-page letter, Otis asks his father for money to pay for expenses relating to Commencement including the printing of theses, shoes, buckles, and any entertainment. He mentions that he will share entertainment expenses with his classmate Lothrop Russell.