Browsing by Author "Santos, Henrique"
Now showing 1 - 6 of 6
Results Per Page
Sort Options
- Cyberwar – Russia the usual suspectPublication . Magalhaes, Sérgio Tenreiro de; Santos, Henrique; Santos, Leonel Duarte dos; Jahankhani, HamidThe evolution of the technology and the changes in the organization and control of the critical infrastructures of nations are creating a new combat front. The cases studied in this paper relate to the attack to the information systems and services of Estonia, in May 2007, and Georgia, in August 2008, occurring at the same time as the conventional military operation executed by the Russian Federation’s army in the South Ossetia. The Russian Federation has been repeatedly accused of this operations, but the data collected raises doubts and in the second case-study showed the existence of a poorly organized network, related to Russian criminal organizations, supporting the possibility of this being an instance of the Maoist concept of the “People’s war”. This paper will also show that, despite the unsophisticated resources used in most of the attacks and to promote them, the damages in the selected targets were considerable.
- Enrollment time as a requirement for biometric hand recognition systemsPublication . Carvalho, João; Sá, Vítor J.; Magalhães, Sérgio Tenreiro de; Santos, HenriqueBiometric systems are increasingly being used as a means for authentication to provide system security in modern technologies. The performance of a biometric system depends on the accuracy, the processing speed, the template size, and the time necessary for enrollment. While much research has focused on the first three factors, enrollment time has not received as much attention. In this work, we present the findings of our research focused upon studying user’s behavior when enrolling in a biometric system. Specifically, we collected information about the user’s availability for enrollment in respect to the hand recognition systems (e.g., hand geometry, palm geometry or any other requiring positioning the hand on an optical scanner). A sample of 19 participants, chosen randomly apart their age, gender, profession and nationality, were used as test subjects in an experiment to study the patience of users enrolling in a biometric hand recognition system.
- Enrolment time as a requirement for face recognition biometric systemsPublication . Sá, Vítor; Magalhães, Sérgio; Santos, HenriqueThe performance of a biometric system depends on the accuracy, the processing speed, the template size, and the time necessary for enrolment. This last factor is not much addressed in literature. In this work we collected information about the users' availability for enrolment in respect to face recognition biometrics. Were involved in testing 26 randomly chosen people. The results are presented globally, by sex, by age group and by previous experience in the use of the technology. We found that there is a generalized positive predisposition for enrolment that is expressed in some by the predisposition to try for many times and in others to try over a long time, and that it may be the youngest and the oldest the least available.
- Feasibility Study of a Multimodal Biometric Authentication Solution Based on Pointer Dynamics and Skin ConductivityPublication . Sá, Vítor J.; Tenreiro De Magalhaes, Sérgio; Santos, HenriqueDue to the constant need to improve authentication systems, since they are constantly emerging new forms of intrusion, based on the current state of knowledge, we intend to study the acceptance of a recognition system based on the combination of two non-physical methods of biometric authentication: pointer dynamics and skin conductivity. With this combination, firstly, it is improved what each can offer individually and, secondly, the problem of replicability present in physical biometric is minimized. We conducted a survey with a representative sample of the Portuguese population, whose construction method and obtained results are presented in this article. We also present an introductory explanation of the involved technologies.
- Keystroke Dynamic and Graphical Authentication SystemsPublication . Tenreiro De Magalhaes, Sérgio; Santos, Leonel; Revett, Kenneth; Santos, HenriqueIn information systems, authentication involves, traditionally, sharing a secret with the authenticating entity and presenting it whenever a confirmation of the user’s identity is needed. In the digital era, that secret is commonly a user name and password pair and/or, sometimes, a biometric feature. Both present difficulties of different kinds once the traditional user name and password are no longer enough to protect these infrastructures, the privacy of those who use it, and the confidentiality of the information, having known vulnerabilities, and the second has many issues related to ethical and social implications of its use. This chapter discusses two behavior biometric technologies.
- Using Technology to Overcome the Password’s ContradictionPublication . Tenreiro De Magalhaes, Sérgio; Revett, Kenneth; Santos, Henrique; Santos, Leonel; Oliveira, André; Ariza, CésarThe traditional approach to security has been the use of passwords. They provide the system with a barrier to access what was quite safe in the analogical world. The digital era provided the means to easily try thousands of passwords in a short period of time and now the password schema is no longer safe. Now it suffers of the password’s contradiction: the fact that it requires both simplicity and complexity to be usable and safe. Being so, new technologies are required that can preserve the easiness of use, but can provide stronger authentication processes. This chapter presents the latest advances in three technologies that can be used, unaided or together, to improve the safety of user/password schemas without significant changes in the protected information system architecture, despite the human factors that traditionally reduce the security of those systems. The presented technologies are Keystroke Dynamics, Graphical Authentication and Pointer Dynamic.