2017
DOI: 10.1007/978-3-319-58808-7_3
|View full text |Cite
|
Sign up to set email alerts
|

Negative Authentication Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…Similarly, the Dendritic Cell algorithm is another example of an Immune algorithm that works in musicale and layered. Few applications in cloud security domains that use Immune algorithms include Identity and Authentication [21], [22], Protocol and Network Security [23]. Figure 2 demonstrates the evolution of nature-inspired algorithms over time in cloud security.…”
Section: Immune Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, the Dendritic Cell algorithm is another example of an Immune algorithm that works in musicale and layered. Few applications in cloud security domains that use Immune algorithms include Identity and Authentication [21], [22], Protocol and Network Security [23]. Figure 2 demonstrates the evolution of nature-inspired algorithms over time in cloud security.…”
Section: Immune Algorithmsmentioning
confidence: 99%
“…However, authentication research using SI did not explore that much. Still, some of the notable works that draw attention is as follows: the author(s) in [17] used Particle Swarm for palm and face identity; [18] used Immune algorithms for signature identification; [21], [22], [36], [37] developed a negative authentication system using Negative Selection algorithms. Apart from this, some studies also distilled promising results for the authentication process considering the GA based approach with adaptive selections [34], [38].…”
Section: Literature Review a Identity And Authentication Securitymentioning
confidence: 99%
“…This profile represents the negative abstraction of valid credentials and is the problem specific realization of the negative database described by [14]. This negative authentication for a system login application has been tested successfully workable [8]. This negative ap- proach has some benefits over the traditional positive authentication approach.…”
Section: Figmentioning
confidence: 99%
“…Nowadays, the NDB has been applied to privacy protection [2,6], information hiding [7], authentication system [8], sensitive data collection [9], biometric template security [10], secure multi-party computation [5], privacy preserving data mining [11] and privacy preserving data publication [12]. If an NDB can be reversed to the hidden DB in polynomial time, it is said to be easy-to-reverse, otherwise it is said to be hard-toreverse.…”
Section: Introductionmentioning
confidence: 99%
“…According to lemma 4, we can assume m the K-hidden algorithm. Then we obtain n 2,0 = n 2,2 by combining(8) and m 0 = m Therefore…”
mentioning
confidence: 96%