• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Um m?todo para autentica??o multifator baseado em biometria, interfer?ncia de onda e mapas ca?ticos

Souza, Daniel Faustino Lacerda de 28 June 2017 (has links)
Submitted by Automa??o e Estat?stica (sst@bczm.ufrn.br) on 2017-09-19T19:51:48Z No. of bitstreams: 1 DanielFaustinoLacerdaDeSouza_TESE.pdf: 4152761 bytes, checksum: 37df71096ed2230dead9fa2b9675f90f (MD5) / Approved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2017-09-20T19:23:55Z (GMT) No. of bitstreams: 1 DanielFaustinoLacerdaDeSouza_TESE.pdf: 4152761 bytes, checksum: 37df71096ed2230dead9fa2b9675f90f (MD5) / Made available in DSpace on 2017-09-20T19:23:56Z (GMT). No. of bitstreams: 1 DanielFaustinoLacerdaDeSouza_TESE.pdf: 4152761 bytes, checksum: 37df71096ed2230dead9fa2b9675f90f (MD5) Previous issue date: 2017-06-28 / Conselho Nacional de Desenvolvimento Cient?fico e Tecnol?gico (CNPq) / A democratiza??o do acesso a Internet tem permitido que cada vez mais empresas possam digitalizar os seus servi?os. ? medida que novos servi?os s?o oferecidos na rede, cresce a preocupa??o com a possibilidade de acesso indevido ?s informa??es sens?veis de usu?rios, empresas e governo. O aumento no n?mero de ataques e roubo de credenciais tem obrigado os promotores de servi?o a desenvolverem novas solu??es de seguran?a. Como resposta a esses ataques, os mecanismos de autentica??o de usu?rios tem evolu?do. Muitas servi?os tem migrado seus m?todos de autentica??o de abordagens baseadas em apenas um fator para abordagens multifator, onde o usu?rio necessita de mais de uma credencial para ter acesso ao sistema. Um novo m?todo para autentica??o de usu?rios baseado em uma abordagem multifator ? apresentado. No m?todo concebido, o usu?rio ganha acesso a um determinado sistema utilizando um conjunto de caracter?sticas relacionadas a fatores f?sicos, de possess?o e conhecimento. A identidade biom?trica representa o fator f?sico. Uma t?cnica de criptografia ?ptica baseada na interfer?ncia de onda e em mapas ca?ticos completam o esquema proposto. Nesse sentido, a semente de um mapa ca?tico representa uma senha de usu?rio, correspondendo ao fator de conhecimento e um interferograma resultante do processo de interfer?ncia de duas ondas planares representa o fator de possess?o. As simula??es num?ricas s?o executadas a fim de demonstrar a efetividade de m?todo. Um conjunto de an?lises estat?sticas, de espa?o das chaves e de sensibilidade s?o feitas. Al?m disso, s?o feitas algumas compara??es com m?todos similares dispon?veis na literatura. / The democratization of Internet access has allowed more and more companies to digitize their services. As new services are offered on the network, there is growing concern about the possibility of undue access to sensitive information from users, businesses and government. The increase in the number of attacks and theft of credentials has forced service delivery companies to develop new security solutions. In response to these attacks, user authentication mechanisms have evolved. Many services have migrated their authentication methods from one-factor approaches to multifactor approaches where the user needs more than one credential to access the system. A novel method for user authentication based on multifactor approach is presented. For this security technique, a user authenticates into a system using a set of three characteristics related to physical, possession and knowledge factors. Biometrics authentication represents the physical factor. An optical authentication technique based on two-beam interference and chaotic maps complete the proposed scheme. In this sense, the seed of a chaotic map represents a user password corresponding to a knowledge factor and a resultant interferogram from an optical authentication technique represents the possession factor. Numerical simulation demonstrate the feasibility of our method. Moreover, we perform key space, sensibility and statistical analysis to demonstrate the effectiveness of the solution. In addition, some comparisons are made with the methods available in the literature.

Page generated in 0.0806 seconds