Discovery Logo
Sign In
Paper
Search Paper
Cancel
Pricing Sign In
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Citation Generator iconCitation Generator
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
  • Paperpal iconPaperpal
    External link
  • Mind the Graph iconMind the Graph
    External link
  • Journal Finder iconJournal Finder
    External link
Discovery Logo menuClose menu
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Citation Generator iconCitation Generator
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
  • Paperpal iconPaperpal
    External link
  • Mind the Graph iconMind the Graph
    External link
  • Journal Finder iconJournal Finder
    External link

Related Topics

  • Authentication Mechanism
  • Authentication Mechanism
  • Authentication Protocol
  • Authentication Protocol
  • Authentication Scheme
  • Authentication Scheme
  • Authentication Server
  • Authentication Server

Articles published on Framework For Authentication

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
1010 Search results
Sort by
Recency
  • New
  • Research Article
  • 10.11114/ijecs.v9i1.8437
Authenticity Beyond Texts: A Three-Stage Process Model for English Language Teaching
  • Mar 2, 2026
  • International Journal of English and Cultural Studies
  • Mehran Esfandiari + 1 more

The concept of authenticity has long occupied a central position in English Language Teaching (ELT), particularly within Communicative Language Teaching (CLT), where the use of authentic materials is viewed as essential to meaningful language learning. While traditional approaches prioritized simplified and pedagogically modified input, contemporary perspectives emphasize learners’ exposure to language as it occurs in real-world contexts. Building on this shift, the present paper critically revisits the notion of authenticity, arguing against its treatment as a fixed property of instructional materials. Instead, authenticity is conceptualized as a relational and dynamic process that emerges through learners’ engagement with texts. Drawing on developments in learner-centered pedagogy and technology-mediated learning environments, the paper proposes a three-stage framework of authenticity comprising interaction with the text, decoding and interpretation of meaning, and the production of contextually appropriate and genuinely communicative responses. This reconceptualization aims to offer a more nuanced understanding of authenticity and to inform the principled integration of authentic materials into task design in contemporary ELT contexts.

  • New
  • Research Article
  • Cite Count Icon 2
  • 10.1016/j.saa.2025.127261
Optimization of FTIR-PLS models for adulteration detection in sesame oil: a comparative study of genetic algorithm, particle swarm optimization, and a hybrid GA-PSO approach.
  • Mar 1, 2026
  • Spectrochimica acta. Part A, Molecular and biomolecular spectroscopy
  • Rasool Khodabakhshian + 2 more

Optimization of FTIR-PLS models for adulteration detection in sesame oil: a comparative study of genetic algorithm, particle swarm optimization, and a hybrid GA-PSO approach.

  • New
  • Research Article
  • 10.1109/jiot.2025.3646115
A Novel Stateful Authentication Framework Approach With LLM-Based IDS for MQTT Security
  • Mar 1, 2026
  • IEEE Internet of Things Journal
  • Norziana Jamil + 7 more

A Novel Stateful Authentication Framework Approach With LLM-Based IDS for MQTT Security

  • New
  • Research Article
  • 10.1016/j.knosys.2026.115304
SLATSCOG: A secure authentication framework via federated data generation and temporally-enhanced split learning
  • Mar 1, 2026
  • Knowledge-Based Systems
  • Jiayuan Chen + 4 more

SLATSCOG: A secure authentication framework via federated data generation and temporally-enhanced split learning

  • New
  • Research Article
  • 10.22214/ijraset.2026.77497
Algebraic Parameterization of Diophantine Triples for Robust Key Generation and Secure Drone Fleet Coordination
  • Feb 28, 2026
  • International Journal for Research in Applied Science and Engineering Technology
  • S Shanmuga Priya

The security of modern digital infrastructure relies on mathematical problems that are easy to verify but difficult to invert. While the D(1) - Diophantine triple is well-studied, this paper examines a more complex construction using the property D(n), where n=(2m-3)(2m+1)h2 . By linking the elements of the triple to these parameters, a robust framework for authentication and secure key generation is developed. The practical usage of such a framework is exemplified by way of a challenge-response protocol for use on a crew of autonomous unmanned aerial survey drones. This is a practical use case in that a Ground Station has to direct the flight paths of the drones by transmitting numerical challenges A and B, which must be resolved by way of an internal secret polynomial generated by use of the D(n) property to determine a third element C, such that authentic verification is only achievable when the D(n) property is a perfect square.

  • New
  • Research Article
  • 10.52187/rdt.v7i1.383
Cultural and Digital Integration: Revitalization Strategy For Sumbawa Horse Racing As A Sustainable Tourism Destination at Angin Laut Biru Arena
  • Feb 27, 2026
  • Radiant
  • Firno Hadi + 1 more

This study examines a critical intervention in revitalizing intangible cultural heritage through digital symbiosis, focusing on the Sumbawa traditional horse race (Bare Spee) at Angin Laut Biru Arena. As a living embodiment of indigenous values including honor (siri'), communal solidarity (menyama braya), and ethno-ecological wisdom, this tradition faces erosion due to generational disconnect, infrastructural neglect, and rigid management practices. Addressing the lack of integrated digital and cultural frameworks for rural heritage, the study employs an immersive qualitative case study approach. Data were triangulated through participatory observation across two event cycles, in-depth interviews with 22 key stakeholders consisting of ritual elders, kebalan jockeys, samara horse masters, local entrepreneurs, and cultural tourists, as well as digital ethnography. The findings identify a tripartite authenticity framework comprising ritual sanctity, socio-familial reciprocity, and embodied equine knowledge. Based on this analysis, the study proposes a Symbiotic Digital Mediation Model implemented through four strategies, namely community-curated digital storytelling by local youth, context-aware augmented reality using QR-based cultural portals with native-language narratives, an integrated digital ecosystem encompassing a heritage portal, blockchain-based ticketing, and a local product e-marketplace, and the use of appropriate lightweight digital tools for event management and documentation. Crucially, the study demonstrates that digital mediation must adhere to cultural subsidiarity so that technology amplifies rather than replaces indigenous epistemologies. The model supports regenerative cultural governance by enabling community-led digital stewardship and offers broader implications for safeguarding living heritage in the digital era.

  • New
  • Research Article
  • 10.55041/ijsrem56664
A Conceptual Framework for Neuro-Cognitive Identity Authentication (NCIA)
  • Feb 17, 2026
  • International Journal of Scientific Research in Engineering and Management
  • Vaidehi K Gadhave + 2 more

Abstract-Traditional authentication mechanisms, rang- ing from knowledge-based passwords to static physio- logical biometrics, face increasing vulnerabilities re- garding theft, spoofing, and irreversibility. This paper proposes the Neuro-Cognitive Identity Authentication (NCIA) framework, a novel conceptual approach that models user identity as a probabilistic cognitive signa- ture rather than a static credential. Unlike standard be- havioral biometrics that focus on motor skills, NCIA authenticates users based on high-level cognitive reason- ing behaviors—such as decision latency, strategy prefer- ence, and error correction—captured during dynamic, structured challenges. We present a layered system ar- chitecture integrating a Dynamic Challenge Generator and a Profile Modeling Engine to extract and verify these cognitive feature vectors. The proposed framework aims to mitigate replay and imitation attacks by leverag- ing the inherent entropy and stability of human problem- solving patterns. This study details the system model, analyzes the security threat landscape, and discusses the feasibility of using cognitive reasoning as a complemen- tary, high-security authentication layer. Keywords: Neuro-Cognitive Authentication, Behavioral Biometrics, Cognitive Security, Identity Verification, Dynamic Challenge, Cybersecurity.

  • New
  • Research Article
  • 10.1007/s11760-025-04997-6
A novel authentication framework using multimodal-based periocular biometrics data with feature integration and adaptive deep learning network
  • Feb 16, 2026
  • Signal, Image and Video Processing
  • V Sivasakthi + 1 more

A novel authentication framework using multimodal-based periocular biometrics data with feature integration and adaptive deep learning network

  • New
  • Research Article
  • 10.1038/s41598-026-39415-5
BBAS: A blockchain-based authentication system for e-health with multi-factor authentication, access control, and post-quantum security.
  • Feb 15, 2026
  • Scientific reports
  • Rabia Latif + 4 more

The rapid digitisation of healthcare services presents challenges in guaranteeing safe, scalable, and privacy-preserving access to sensitive medical information. This article presents BBAS, a blockchain-based authentication system for e-Health. BBAS incorporates a multi-factor authentication (MFA) framework that includes password hashing, one-time passwords (OTP), and biometric verification, with a hybrid access control model that combines role-based access control (RBAC) and attribute-based access control (ABAC). To guarantee enduring security, BBAS utilises post-quantum digital signatures (CRYSTALS-Dilithium) and exploits the InterPlanetary file system (IPFS) for off-chain data storage, assuring tamper-resistance and scalability. We implemented the system using solidity smart contracts on a permissioned Ethereum network and assessed via 500 authentication iterations. Results show BBAS outperforms benchmark models across all critical metrics: authentication success rate (ASR: 98.6%), latency (0.05s), throughput (19,000 req/s), gas cost (35,000 gas/req), block confirmation time (10s), and storage overhead (0.03 KB/record). Biometric error rates-false acceptance rate (FAR: 0.5%), false rejection rate (FRR: 1.2%), and equal error rate (EER: 0.85%)-are markedly decreased, therefore improving both security and usability. This research validates BBAS as a reliable, scalable, and quantum-resistant authentication framework for contemporary e-Health systems.

  • New
  • Research Article
  • 10.3390/nu18040637
Individually Recognized Functional Ingredients of Korean Health Functional Foods: Functional Classification, Regulatory Context, and Clinical Implication.
  • Feb 15, 2026
  • Nutrients
  • Pureum Kang + 4 more

Background/Objectives: The global health functional food (HFF) market is expanding rapidly, driven by increasing consumer interest in preventive healthcare and evidence-based nutrition. The Republic of Korea has established a systematic regulatory framework for HFFs, through the Individually Recognized Functional Ingredient (IRFI) system introduced in 2004. Designed to accommodate innovative physiologically active ingredients beyond standardized categories, the IRFI system is increasingly discussed as a regulatory model for evidence-based functional foods. This study examines the IRFI system within a comparative regulatory context and evaluates its implications for drug-dietary supplement interactions (DDSIs). Methods: Functional categories were defined according to guidelines issued by the Ministry of Food and Drug Safety (MFDS). Data on Korean IRFIs were obtained from the Food Safety Korea database. A literature search was conducted in PubMed using regulatory keywords which identified through Google searches. Regulatory frameworks in the United States, European Union, Japan, and China were comparatively analyzed. DDSIs were reviewed based on MFDS-approved IRFIs and the relevant literature. Results: The IRFI represents a hybrid regulatory model that combines rigorous pre-market scientific evaluation, including GLP-compliant safety testing and human clinical evidence, with regulatory incentives such as expedited review and temporary market exclusivity. Compared with post-market-oriented systems in the United States and Japan, the stringent authorization framework in the European Union, and the dual-track health food system in Chinese, IRFI integrates clinical evidence requirements within a structured pre-market approval process. Conclusions: The IRFI framework establishes a comparatively stringent evidentiary standard for functional foods while providing a structured basis for evaluating potential DDSIs. Its applicability depends on alignment and mutual recognition of scientific and clinical evaluation criteria across regulatory jurisdictions. DDSIs were reviewed based on MFDS-approved IRFIs and the relevant literature.

  • New
  • Research Article
  • 10.3390/foods15040712
Honey Fraud as a Moving Analytical Target: Omics-Informed Authentication Within a Multi-Layer Analytical Framework.
  • Feb 14, 2026
  • Foods (Basel, Switzerland)
  • Dagmar Schoder

Honey fraud represents a persistent and analytically challenging form of food adulteration, driven by globalised supply chains, strong economic incentives and asymmetries in regulatory oversight and analytical capacity. Conventional physicochemical, spectroscopic and isotopic methods provide legally robust tools for routine control, yet increasingly struggle to detect sophisticated adulteration strategies that are compositionally optimised to mimic authentic honey profiles. These challenges are amplified in a global context, where heterogeneous enforcement landscapes and fragmented analytical infrastructures create exploitable vulnerabilities across international trade networks. This narrative review synthesises current knowledge on honey fraud typologies and critically evaluates established analytical approaches alongside emerging omics-based authentication strategies, including genomics, metabolomics, proteomics and microbiome profiling. Omics-based approaches extend authenticity assessment beyond single-marker paradigms by capturing multidimensional biological and compositional signatures, thereby improving sensitivity to subtle and system-aware fraud (i.e., adulteration strategies that adapt to prevailing analytical detection methods and regulatory thresholds) strategies. To maintain evidentiary clarity, this review explicitly distinguishes between analytically demonstrated vulnerabilities, technically feasible adulteration scenarios and fraud practices documented in regulatory or enforcement contexts. Advanced technology-driven strategies are therefore discussed as potential system-level risks rather than confirmed large-scale honey fraud cases. This differentiation not only safeguards evidentiary precision but also highlights the structural limits of purely analytical solutions. Beyond analytical performance, honey authentication is framed as a systemic challenge embedded in global food systems. This review highlights the need for integrated, data-driven and scalable authentication frameworks that align analytical innovation with reference harmonisation, governance structures and international regulatory cooperation to support resilient and globally robust honey authenticity control.

  • New
  • Research Article
  • 10.64751/ajadtrp.2026.v7.n1.pp38-46
DEEP LEARNING-BASED CONTINUOUS AUTHENTICATION IN ZEROTRUST ENTERPRISE ENVIRONMENTS
  • Feb 12, 2026
  • American Journal of AI Digital Transformation and Regenerative Pharmacist
  • Dr Shanigarapu Naresh Kumar

The rapid expansion of remote work, cloud services, and distributed enterprise infrastructures has significantly increased cybersecurity risks, rendering traditional perimeter-based security models inadequate. Zero-Trust Architecture (ZTA) has emerged as a modern security paradigm that assumes no implicit trust and continuously verifies user identity and device integrity. However, conventional authentication mechanisms such as passwords and one-time verification methods are insufficient to ensure persistent security throughout a user session. This paper proposes a Deep Learning-Based Continuous Authentication Framework tailored for Zero-Trust enterprise environments. The system leverages behavioral biometrics, including keystroke dynamics, mouse movements, and user interaction patterns, to continuously verify user identity in real time. Advanced deep learning models such as Long Short-Term Memory (LSTM) networks and Convolutional Neural Networks (CNNs) are employed to model temporal and spatial behavioral patterns. The framework integrates risk-based scoring and adaptive access control policies to dynamically enforce authentication decisions. Experimental evaluation demonstrates improved detection accuracy, reduced false acceptance rates, and minimal user disruption compared to traditional authentication systems. The proposed solution strengthens enterprise security by enabling adaptive, non-intrusive, and real-time identity verification aligned with Zero-Trust principles

  • Research Article
  • 10.1016/j.bcra.2026.100456
Extending ERC721: Design and implementation of a novel secure NFT framework for IoT asset authentication in cyber-physical systems
  • Feb 1, 2026
  • Blockchain: Research and Applications
  • Usman Khalil + 6 more

Extending ERC721: Design and implementation of a novel secure NFT framework for IoT asset authentication in cyber-physical systems

  • Research Article
  • 10.1016/j.adhoc.2025.104059
A blockchain-integrated PUF framework for secure authentication and communication
  • Feb 1, 2026
  • Ad Hoc Networks
  • Koustav Kumar Mondal + 2 more

A blockchain-integrated PUF framework for secure authentication and communication

  • Research Article
  • 10.1016/j.foodchem.2025.147584
Wheat flour tortilla authenticity verification using targeted elemental profiling-based multifunction classification strategies.
  • Feb 1, 2026
  • Food chemistry
  • Uriel Arellano + 4 more

Wheat flour tortilla authenticity verification using targeted elemental profiling-based multifunction classification strategies.

  • Research Article
  • 10.1002/cpe.70616
Optimization of Security Oriented Authentication and Access Control Framework for Wireless Vehicular Communications
  • Feb 1, 2026
  • Concurrency and Computation: Practice and Experience
  • Shanil Sharma + 1 more

ABSTRACT The Vehicular Internet of Things (VIoT) is revolutionizing the way devices and digital assets communicate, enabling seamless data sharing without the need for human involvement. One of the standout features of VIoT is the immense volume of data generated by end‐user devices, which must be efficiently processed and transmitted to the cloud. Unfortunately, this process can be slow and detrimental to network performance. To tackle these challenges effectively, edge computing emerges as a powerful solution. By decentralizing information processing to the network edge, this innovative architecture significantly enhances operational efficiency, especially within the automotive sector. However, the substantial volume of data produced by these devices can significantly hinder processing efficiency and compromise overall network performance. Despite its advantages, vehicular networking is vulnerable to malicious attacks, underscoring the urgent need for a strong and secure authentication framework. A lattice‐based cryptographic approach offers exceptional privacy and security, making it an ideal choice for VIoT‐enabled vehicles and enhancing the future of smart transportation. In this paper, we introduce an innovative authentication and access control protocol based on a lattice‐based cryptosystem for wireless vehicular communication. Our analysis shows that our proposed scheme is highly efficient and effective compared to existing methods, paving the way for safer and smarter transportation systems.

  • Research Article
  • 10.1016/j.vehcom.2025.100990
LGTWAFIOD: PUF and Fuzzy extractor based lightweight authentication framework for internet of drones
  • Feb 1, 2026
  • Vehicular Communications
  • Naveen Kumar + 1 more

LGTWAFIOD: PUF and Fuzzy extractor based lightweight authentication framework for internet of drones

  • Research Article
  • 10.1109/jbhi.2025.3613234
BrainAuth: A Neuro-Biometric Approach for Personal Authentication.
  • Feb 1, 2026
  • IEEE journal of biomedical and health informatics
  • Muhammad Adil + 4 more

The literature repeatedly reports that the unique nature of individual brainwave patterns makes them suitable for identification and authentication, because they are difficult to replicate or forge. Therefore, many researchers have utilized brainwaves for authentication by training traditional deep learning and machine learning models. However, the internal decision processes of these black-box models have not been evaluated in terms of biases, overfitting, large training data requirements, and handling complex data structures, which keep them in a fuzzy state. To address these limitations, a smart system is needed to be develop that could be capable of making the authentication process user-friendly, robust, and reliable. In this paper, we present a deep reinforcement learning-based biometric authentication framework known as "BrainAuth" for personal identification using the gamma ($\gamma$) and beta ($\beta$) brainwaves. This approach improves the accuracy of authentication by using the (i) Dyna framework and a dual estimation technique. Both these technique helps to maintain the integrity of brainwave patterns, which are needed for authentication and understanding of spoofing activities. (ii) We also introduce a layered structure architecture in the proposed model to reduce the time needed for exploration using two deep neural networks. These networks work together to handle the complex data while making decisions in delay sensitive environment. (iii) We evaluate the model on seen and unseen data to verify its robustness. During analysis, the model achieved an equal error rate (EER) of $\approx$ 0.07% for seen data and $\approx$ 0.15% for unseen data, respectively. Furthermore, the analysis metrics such as true positive (TP), false positive (FP), true negative (TN), and false negative (FN) followed by false acceptance rate (FAR), false rejection rate (FRR), true acceptance rate (TAR) revealed significant improvements compared to existing schemes.

  • Research Article
  • 10.1016/j.talanta.2026.129540
Compound-specific hydrogen isotope analysis of lignin methoxy groups for tea provenance discrimination: Comparison with dual-water equilibration.
  • Feb 1, 2026
  • Talanta
  • Kasun Binduhewa + 5 more

Compound-specific hydrogen isotope analysis of lignin methoxy groups for tea provenance discrimination: Comparison with dual-water equilibration.

  • Research Article
  • 10.3844/jcssp.2026.475.486
A Multiphase Zero-Trust Authentication Framework Using Replicated and Homomorphic Encryption
  • Feb 1, 2026
  • Journal of Computer Science
  • Modisaotsile Marope + 4 more

A Multiphase Zero-Trust Authentication Framework Using Replicated and Homomorphic Encryption

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • .
  • .
  • .
  • 10
  • 1
  • 2
  • 3
  • 4
  • 5

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram
Cactus Communications logo

Copyright 2026 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers