Machine learning & AI

Researchers develop a machine learning method to identify fake honey

A team of researchers at Imperial College London and UCL have recently developed a new method to authenticate honey using machine learning and microscopy. Their technique, outlined in a paper pre-published on arXiv, could ...

Engineering

A new smartphone user authentication system based on gait analysis

A team of researchers at the University of Pretoria and City University of Hong Kong has recently developed a continuous smartphone user authentication system based on gait analysis. This system, outlined in a paper presented ...

Security

Windows Hello: Researchers bypass face authentication

In the course of a research project, security experts Matthias Deeg and Philipp Buchegger of penetration-testing company SySS found out something that put Windows Hello in spoofing-attack news this week: They were able to ...

Security

The age of hacking brings a return to the physical key

With all the news about Yahoo accounts being hacked and other breaches of digital security, it's easy to wonder if there's any real way to keep unauthorized users out of our email and social media accounts.

page 1 from 3

Authentication

Authentication (from Greek: αὐθεντικός; real or genuine, from αὐθέντης authentes; author) is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labeling claims to be, or assuring that a computer program is a trusted one.

This text uses material from Wikipedia, licensed under CC BY-SA