Articles with "authentication" as a keyword



Photo by drew_hays from unsplash

In Situ Nanoparticle Embedding for Authentication of Epoxy Composites.

Sign Up to like & get
recommendations!
Published in 2018 at "Advanced materials"

DOI: 10.1002/adma.201801523

Abstract: In situ reduction of chloroauric acid inside an amine-cured epoxy matrix leads to formation of gold nanoparticles which are embedded inside the part. This phenomenon is leveraged to design an authentication system for composites wherein… read more here.

Keywords: authentication; authentication epoxy; situ nanoparticle; epoxy composites ... See more keywords

Unclonable Anti‐Counterfeiting Labels Based on Microlens Arrays and Luminescent Microparticles

Sign Up to like & get
recommendations!
Published in 2022 at "Advanced Optical Materials"

DOI: 10.1002/adom.202102402

Abstract: DOI: 10.1002/adom.202102402 Union (EU), counterfeit products traded in 2019 alone were valued at USD 134 billion (5.8% of the EU imports).[1] Beyond economic consequences, counterfeiting can also endanger human lives, for example, by producing unsafe… read more here.

Keywords: anti counterfeiting; database; counterfeiting labels; label ... See more keywords

Preparation of transparent electrospun nanofibrous membrane from long‐persistent phosphor‐reinforced polymer for security authentication

Sign Up to like & get
recommendations!
Published in 2024 at "Journal of Applied Polymer Science"

DOI: 10.1002/app.55472

Abstract: Photochromic inks have been a tempting authentication method to make commercial items more resistant to counterfeiting. However, recent studies have shown that photochromic inks have major drawbacks, such as expensiveness and low durability. Herein, we… read more here.

Keywords: electrospun nanofibrous; authentication; transparent electrospun; nanofibrous membrane ... See more keywords

Authentication through gender classification from iris images using support vector machine

Sign Up to like & get
recommendations!
Published in 2021 at "Microscopy Research and Technique"

DOI: 10.1002/jemt.23816

Abstract: Soft biometric information, such as gender, iris, and voice, can be helpful in various applications, such as security, authentication, and validation. Iris is secure biometrics with low forgery and error rates due to its highly… read more here.

Keywords: gender; authentication; gender classification; iris images ... See more keywords

SCAR marker: A potential tool for authentication of agriculturally important microorganisms

Sign Up to like & get
recommendations!
Published in 2022 at "Journal of Basic Microbiology"

DOI: 10.1002/jobm.202200419

Abstract: Microbial inoculants are globally recommended for plant growth promotion and control of plant pathogens. These inoculants require stringent quality checks for sustainable field efficacy. Questionable regulatory frameworks constantly deteriorate the reliability of bio‐inoculant technology. Existing… read more here.

Keywords: authentication; marker potential; scar; plant ... See more keywords

In-gel and OFFGEL-based proteomic approach for authentication of meat species from minced meat and meat products.

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of the science of food and agriculture"

DOI: 10.1002/jsfa.8572

Abstract: BACKGROUND Fraudulent mislabelling of processed meat products on a global scale that cannot be detected using conventional techniques necessitates sensitive, robust and accurate methods of meat authentication to ensure food safety and public health. In… read more here.

Keywords: based proteomic; authentication; meat; gel offgel ... See more keywords

Differentiation and authentication of fishes at the species level through analysis of fish skin by matrix‐assisted laser desorption/ionization time‐of‐flight mass spectrometry

Sign Up to like & get
recommendations!
Published in 2019 at "Rapid Communications in Mass Spectrometry"

DOI: 10.1002/rcm.8474

Abstract: Rationale Authentication of fish is of importance in the view of toxins, allergen warnings and economic fraud control. Traditional methods in the authentication of fish, e.g. morphological, genetic and proteomic analysis, are either at low… read more here.

Keywords: authentication; mass spectrometry; fish skin; mass ... See more keywords

Time-Controlled Authentication Strategies for Molecular Information Transfer.

Sign Up to like & get
recommendations!
Published in 2024 at "Small"

DOI: 10.1002/smll.202400261

Abstract: Modern cryptography based on computational complexity theory is mainly constructed with silicon-based circuits. As DNA nanotechnology penetrates the molecular domain, utilizing molecular cryptography for data access protection in the biomolecular domain becomes a unique approach… read more here.

Keywords: information; authentication; authentication strategies; cryptography ... See more keywords

A secure key authentication scheme for cryptosystems based on GDLP and IFP

Sign Up to like & get
recommendations!
Published in 2017 at "Soft Computing"

DOI: 10.1007/s00500-016-2440-3

Abstract: The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not… read more here.

Keywords: key authentication; authentication scheme; authentication; public key ... See more keywords
Photo from archive.org

A fuzzy decision support system for multifactor authentication

Sign Up to like & get
recommendations!
Published in 2018 at "Soft Computing"

DOI: 10.1007/s00500-017-2607-6

Abstract: Multifactor authentication (MFA) is a growing trend for the accurate identification of the legitimate users through different modalities such as biometrics, nonbiometric, and cognitive behavior metric. In this paper, we have developed an adaptive MFA… read more here.

Keywords: fuzzy decision; authentication; decision support; multifactor authentication ... See more keywords

An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing

Sign Up to like & get
recommendations!
Published in 2019 at "Soft Computing"

DOI: 10.1007/s00500-019-03881-z

Abstract: AbstractBiometric recognition recognizes an identification of an individual which can be obtained with the biological characteristics such as fingerprint, iris, and voice. The challenge of biometric recognition is the matching of fingerprint database with some… read more here.

Keywords: methodology; distance; authentication; minkowski distance ... See more keywords