ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SAMAS 2013 - International Workshop on Strong Authentication Methods and Systems (SAMAS'13)

Date2013-09-08 - 2013-09-11

Deadline2013-05-12

VenueKrakow, Poland Poland

Keywords

Websitehttp://fedcsis.org

Topics/Call fo Papers

Bruce Schneier once said: ?Authentication is more important than encryption. Most people's security intuition says exactly the opposite, but it's true”. Undoubtedly, there is a need for permanent analysis and development in the field of authentication.
Current level of requirements related to strong authentication systems is either achieved by constructing a single, strong authentication factor solution or a solution that utilizes the multifactor approach. Analogically, in case of user verification or identification, biometric methods are widely applied as single modal or multimodal systems. Contemporary theoretical and empirical approaches to constructing strong authentication systems focus on converging different authentication factors, algorithms, protocols and equipment in networked environments. This emphasizes the emerging role of methods and tools used to model, simulate and analyze networked and more complex than single instance systems.
There are also many fascinating challenges arising from the application of strong authentication methods in different areas of our everyday life.
The workshop is organized for researchers and practitioners as an opportunity to discuss current achievements in authentication methods and systems based on knowledge, possession and biometrics.
Topics:
authentication methods and systems based on knowledge (Something You Know)
authentication methods and systems based on possesion (Something You Have)
authentication methods and systems based on physiological and behavioral human characteristics, including: bitemarks, blood pulse, bone sound transmission, ear geometry, EEG, eye movement, facial geometry, facial thermogram, finger wrinkles, fingerprint patterns, gait dynamics, iris patterns, keystroke dynamics, knuckle creases, lip movement, mouse movement, nail patterns, reflection of acoustic waves in the head, retina patterns, signature dynamics, skin impedance, vein patterns and others
data exploration in biometric authentication systems
networked authentications systems
multifactor authentication systems
authentication in operating systems
authentication methods applied in databases
authentication methods applied in internet applications
security of authentication systems
social aspects of strong authentication systems
legal aspects of strong authentication systems
economic aspects of strong authentication systems
usability of authentication systems
authentication and e-documents
applications of authentication methods and systems
other theoretical and practical aspects of authentication systems and methods

Last modified: 2013-03-18 22:16:01