Explore chapters and articles related to this topic
Biometrics-Based Authentication Scheme for Cloud Environment
Published in S. Ramakrishnan, Cryptographic and Information Security, 2018
Similar to any smart card based scheme, in the biometric based user authentication scheme there exists a mandatory registration phase. In the registration phase, the user is requested to enter his/her biometric data into the SP database. Privacy as well as non-repudiated user authentication is a must for cloud computing. This is due to the fact that it involves data access, storage and metering/paying for the resource used. The smart card assumed to be used in the biometric based authentication scheme is a contactless type of a smart card. Though contactless smart cards have some security threats, it can be removed by the usage of strong cryptography (Kundarap et al. 2010). In many cases the user identifier (ID) refers to the username that is provided by the user. But in the biometric based authentication scheme, the identifier for every user is based on the username and the concatenation of the data related specifically to the server of the SP. Such a method can help identify the validity of the user identity specific to the SP. The notations used in this chapter are given in Table 31.3.
Providing Dual Awareness using Multimodal Cues for Collaborative Manipulation in Virtual Environments
Published in International Journal of Human–Computer Interaction, 2023
The interactions performed independently by each user, namely attach, select, transform, and release, are expressed as transitions. According to the interaction, the states of the hand and the target object are also changed. The states of the hand and the object are each expressed as a place. That is, the state of the hand was modeled as a place representing an empty hand (EH), an attaching hand (AH), a selecting hand (SH), and a transforming hand (TH). The object was modeled as an empty object (EO), which is a non-manipulated state, and a manipulated object (MO) place, which is a manipulated state. To model collaborative manipulation without limiting the number of users and objects, users’ hands and objects in the virtual space are expressed as tokens. Tokens representing the user’s hand include a user identifier (User-id), left or right hand (Hand-type), and object identifier with interaction (Obj-id). The virtual object token has Obj-id, with the state of an object (Obj-state) representing its interaction state, and information on all hands interacting with the object (Hands-info). When the user interacts with an object by hand, the object token stores the Obj-id, Hand-type, and Hand-state in Hands-info and creates the interaction state of the object from Hands-info.