Search Results - Formats authorization algorithm
-
1
Internet of things assisted public security management platform for urban transportation using hybridised cryptographic-integrated steganography
ISSN: 1751-956X, 1751-9578Published: The Institution of Engineering and Technology 01.11.2020Published in IET intelligent transport systems (01.11.2020)“… In this study, the hybridised cryptographic-integrated steganography (HCIS) algorithm has been used with auxiliary data inputs for secured data sharing in an internet of things assisted cloud environment for the urban transportation system…”
Get full text
Journal Article -
2
Secure Authentication and Authorization with MAC Address and Cryptography-Based Multi-Factor Algorithm
Published: IEEE 23.11.2023Published in 2023 Second International Conference on Informatics (ICI) (23.11.2023)“…The aim of this paper is to propose an MFA (Multi-Factor Authentication) algorithm using MAC address that achieves authentication and authorization in a secure and efficient manner…”
Get full text
Conference Proceeding -
3
Secure XML querying based on authorization graphs
ISSN: 1387-3326, 1572-9419Published: Boston Springer US 01.07.2012Published in Information systems frontiers (01.07.2012)“…XML is rapidly emerging as a standard for data representation and exchange over the World Wide Web and an increasing amount of sensitive business data is processed in XML format…”
Get full text
Journal Article -
4
Attribute-Based Private Data Sharing With Script-Driven Programmable Ciphertext and Decentralized Key Management in Blockchain Internet of Things
ISSN: 2327-4662, 2327-4662Published: Piscataway IEEE 01.07.2022Published in IEEE internet of things journal (01.07.2022)“…In this article, we address the problem of secure sensitive data sharing for the specified recipients in Blockchain Internet of Things (BIoT). To do it, we…”
Get full text
Journal Article -
5
Blockchain-based ciphertext access control for data sharing using key encapsulation mechanism
Published: IEEE 01.06.2023Published in 2023 International Conference on Blockchain Technology and Information Security (ICBCTIS) (01.06.2023)“… performance and security. At the same time, the block structure and data format specifications are designed to achieve on-chain supervision with traceable management and operational behavior of the PKEM-CPABE algorithm…”
Get full text
Conference Proceeding -
6
Streamlining the Usage of Authorization or Digital Signature in Digital Processes
ISBN: 9798382210933Published: ProQuest Dissertations & Theses 01.01.2023“… Although, the untrained eye, this transformation may seem to be only the transposition of procedures or documents to a corresponding digital format, the truth is that not everything that humans…”
Get full text
Dissertation -
7
Performance comparison of signed algorithms on JSON Web Token
ISSN: 1757-8981, 1757-899XPublished: Bristol IOP Publishing 01.07.2019Published in IOP conference series. Materials Science and Engineering (01.07.2019)“… JWT is stateless and can include information in the token authorization. JWT has several options for using algorithms namely HMAC, RSA, and ECDSA…”
Get full text
Journal Article -
8
An Empirical Evaluation of Data Integrity Algorithm Performance in Non-Relational Document Databases
ISSN: 2411-6335, 2308-8168Published: 08.12.2023Published in VAWKUM transaction on computer sciences (08.12.2023)“… This can make them more vulnerable to assault if suitable security measures are not taken. Users of database can access data with weak authentication or authorization…”
Get full text
Journal Article -
9
Secured File Storage in Cloud Computing Application: Secura-Drive
Published: IEEE 06.07.2021Published in 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT) (06.07.2021)“… In this paper, we outlined a solution to overcome the problem of unauthorized user's access to the contents of the database by storing the files in the database in an encrypted format that will…”
Get full text
Conference Proceeding -
10
A rapid and affordable point of care test for antibodies against SARS-CoV-2 based on hemagglutination and artificial intelligence interpretation
ISSN: 2045-2322, 2045-2322Published: London Nature Publishing Group UK 30.12.2021Published in Scientific reports (30.12.2021)“…Diagnostic tests that detect antibodies (AB) against SARS-CoV-2 for evaluation of seroprevalence and guidance of health care measures are important tools for…”
Get full text
Journal Article -
11
Design and Development of Secure Data Transfer Modules in Industrial Control Systems
ISSN: 0929-6212, 1572-834XPublished: New York Springer US 01.10.2023Published in Wireless personal communications (01.10.2023)“…Industrial control systems (ICS) like supervisory control and data acquisition (SCADA) systems play a crucial role in monitoring and controlling various…”
Get full text
Journal Article -
12
Image tamper detection and self-recovery using multiple median watermarking
ISSN: 1380-7501, 1573-7721Published: New York Springer US 01.12.2020Published in Multimedia tools and applications (01.12.2020)“… Nowadays, most of these photographs are in the digital format; which can be easily edited in any photo editing software without requiring any special knowledge of the field…”
Get full text
Journal Article -
13
Similarity-based ranking of videos from fixed-size one-dimensional video signature
ISSN: 1386-4564, 1573-7659Published: Dordrecht Springer Nature B.V 14.08.2024Published in Information retrieval (Boston) (14.08.2024)“…The amount of information is multiplying, one of the popular and widely used formats is short videos…”
Get full text
Journal Article -
14
A review of mobile banking security
Published: IEEE 01.05.2016Published in 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) (01.05.2016)“…Nowadays, IT has an important role in people's life. Bank is one of the example of institute which using IT in its daily tasks. Customer's personal information…”
Get full text
Conference Proceeding -
15
SU‐E‐I‐69: A Cloud Based Application for MRI Brain Image Processing
ISSN: 0094-2405, 2473-4209Published: American Association of Physicists in Medicine 01.06.2015Published in Medical physics (Lancaster) (01.06.2015)“…’ requested pipeline. The implemented techniques were incorporated on a cloud application framework consisting of a web interface where the user can upload data (NIfTI format…”
Get full text
Journal Article -
16
MEMOSys: Bioinformatics platform for genome-scale metabolic models
ISSN: 1752-0509, 1752-0509Published: London BioMed Central 31.01.2011Published in BMC systems biology (31.01.2011)“…Background Recent advances in genomic sequencing have enabled the use of genome sequencing in standard biological and biotechnological research projects. The…”
Get full text
Journal Article -
17
Adaptive Automated Teller Machines - Part II
ISBN: 1457715538, 9781457715532Published: IEEE 01.07.2011Published in 2011 International Conference on Information and Communication Technologies (01.07.2011)“…Nowadays, the banking sector is increasingly relying on Automated Teller Machines (ATMs) in order to provide services to its customers. Although thousands of…”
Get full text
Conference Proceeding -
18
Bitstream-Oriented Protection for the H.264/Scalable Video Coding (SVC)
ISSN: 0929-6212, 1572-834XPublished: New York Springer US 01.12.2017Published in Wireless personal communications (01.12.2017)“… Although the network environment, to some extent, provides security protection against the illegal users, it is not enough to protect against the authorized users from digesting contents beyond its authorization…”
Get full text
Journal Article -
19
European solvent industry group generic exposure scenario risk and exposure tool
ISSN: 1559-0631, 1559-064X, 1559-064XPublished: New York Nature Publishing Group US 01.01.2014Published in Journal of exposure science & environmental epidemiology (01.01.2014)“…) was developed to facilitate the safety evaluation of consumer uses of solvents, as required by the European Union Registration, Evaluation and Authorization of Chemicals (REACH) Regulation…”
Get full text
Journal Article -
20
Analysis of the radius and diameter protocols in terms of pricing telecommunication services
ISSN: 0042-8469, 2217-4753Published: University of Defence in Belgrade 01.06.2013Published in Vojnotehnicki glasnik (01.06.2013)“…Accounting of telecommunication services is closely related to the functions of authentication and authorization…”
Get full text
Journal Article

