Search Results - Formats authorization algorithm

Refine Results
  1. 1

    Internet of things assisted public security management platform for urban transportation using hybridised cryptographic-integrated steganography by Bi, Dexu, Kadry, Seifedine, Kumar, Priyan Malarvizhi

    ISSN: 1751-956X, 1751-9578
    Published: The Institution of Engineering and Technology 01.11.2020
    Published in IET intelligent transport systems (01.11.2020)
    “… In this study, the hybridised cryptographic-integrated steganography (HCIS) algorithm has been used with auxiliary data inputs for secured data sharing in an internet of things assisted cloud environment for the urban transportation system…”
    Get full text
    Journal Article
  2. 2

    Secure Authentication and Authorization with MAC Address and Cryptography-Based Multi-Factor Algorithm by Abualkas, Yaser M.A., Lalitha Bhaskari, D.

    Published: IEEE 23.11.2023
    “…The aim of this paper is to propose an MFA (Multi-Factor Authentication) algorithm using MAC address that achieves authentication and authorization in a secure and efficient manner…”
    Get full text
    Conference Proceeding
  3. 3

    Secure XML querying based on authorization graphs by Chebotko, Artem, Chang, Seunghan, Lu, Shiyong, Fotouhi, Farshad

    ISSN: 1387-3326, 1572-9419
    Published: Boston Springer US 01.07.2012
    Published in Information systems frontiers (01.07.2012)
    “…XML is rapidly emerging as a standard for data representation and exchange over the World Wide Web and an increasing amount of sensitive business data is processed in XML format…”
    Get full text
    Journal Article
  4. 4

    Attribute-Based Private Data Sharing With Script-Driven Programmable Ciphertext and Decentralized Key Management in Blockchain Internet of Things by Yin, Hongjian, Chen, E., Zhu, Yan, Zhao, Chengwei, Feng, Rongquan, Yau, Stephen S.

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 01.07.2022
    Published in IEEE internet of things journal (01.07.2022)
    “…In this article, we address the problem of secure sensitive data sharing for the specified recipients in Blockchain Internet of Things (BIoT). To do it, we…”
    Get full text
    Journal Article
  5. 5

    Blockchain-based ciphertext access control for data sharing using key encapsulation mechanism by Feng, Yashi, Zhao, Jinyi, Chen, Taowei, Yu, Yimin

    Published: IEEE 01.06.2023
    “… performance and security. At the same time, the block structure and data format specifications are designed to achieve on-chain supervision with traceable management and operational behavior of the PKEM-CPABE algorithm…”
    Get full text
    Conference Proceeding
  6. 6

    Streamlining the Usage of Authorization or Digital Signature in Digital Processes by Raposo, Rui Miguel Monteiro

    ISBN: 9798382210933
    Published: ProQuest Dissertations & Theses 01.01.2023
    “… Although, the untrained eye, this transformation may seem to be only the transposition of procedures or documents to a corresponding digital format, the truth is that not everything that humans…”
    Get full text
    Dissertation
  7. 7

    Performance comparison of signed algorithms on JSON Web Token by Rahmatulloh, A, Gunawan, R, Nursuwars, F M S

    ISSN: 1757-8981, 1757-899X
    Published: Bristol IOP Publishing 01.07.2019
    “… JWT is stateless and can include information in the token authorization. JWT has several options for using algorithms namely HMAC, RSA, and ECDSA…”
    Get full text
    Journal Article
  8. 8

    An Empirical Evaluation of Data Integrity Algorithm Performance in Non-Relational Document Databases by Jamali, Mujeeb-ur-Rehman, Najma Imtiaz Ali, Imtiaz Ali Brohi, Muhammad Umar Murad, Yasir Nawaz, Uswa Urooj

    ISSN: 2411-6335, 2308-8168
    Published: 08.12.2023
    Published in VAWKUM transaction on computer sciences (08.12.2023)
    “… This can make them more vulnerable to assault if suitable security measures are not taken. Users of database can access data with weak authentication or authorization…”
    Get full text
    Journal Article
  9. 9

    Secured File Storage in Cloud Computing Application: Secura-Drive by Nair, Nidhi, Jain, Tanuj, Gada, Mihir

    Published: IEEE 06.07.2021
    “… In this paper, we outlined a solution to overcome the problem of unauthorized user's access to the contents of the database by storing the files in the database in an encrypted format that will…”
    Get full text
    Conference Proceeding
  10. 10

    A rapid and affordable point of care test for antibodies against SARS-CoV-2 based on hemagglutination and artificial intelligence interpretation by Redecke, Vanessa, Tawaratsumida, Kazuki, Larragoite, Erin T., Williams, Elizabeth S. C. P., Planelles, Vicente, Spivak, Adam M., Hirayama, Lincoln, Elgort, Marc, Swenson, Shane, Smith, Rick, Worthen, Bryan, Zimmerman, Russ, Slev, Patricia, Cahoon, Ben, Astill, Mark, Häcker, Hans

    ISSN: 2045-2322, 2045-2322
    Published: London Nature Publishing Group UK 30.12.2021
    Published in Scientific reports (30.12.2021)
    “…Diagnostic tests that detect antibodies (AB) against SARS-CoV-2 for evaluation of seroprevalence and guidance of health care measures are important tools for…”
    Get full text
    Journal Article
  11. 11

    Design and Development of Secure Data Transfer Modules in Industrial Control Systems by Rajesh, L., Satyanarayana, Penke

    ISSN: 0929-6212, 1572-834X
    Published: New York Springer US 01.10.2023
    Published in Wireless personal communications (01.10.2023)
    “…Industrial control systems (ICS) like supervisory control and data acquisition (SCADA) systems play a crucial role in monitoring and controlling various…”
    Get full text
    Journal Article
  12. 12

    Image tamper detection and self-recovery using multiple median watermarking by Rajput, Vishal, Ansari, Irshad Ahmad

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.12.2020
    Published in Multimedia tools and applications (01.12.2020)
    “… Nowadays, most of these photographs are in the digital format; which can be easily edited in any photo editing software without requiring any special knowledge of the field…”
    Get full text
    Journal Article
  13. 13

    Similarity-based ranking of videos from fixed-size one-dimensional video signature

    ISSN: 1386-4564, 1573-7659
    Published: Dordrecht Springer Nature B.V 14.08.2024
    Published in Information retrieval (Boston) (14.08.2024)
    “…The amount of information is multiplying, one of the popular and widely used formats is short videos…”
    Get full text
    Journal Article
  14. 14

    A review of mobile banking security by Nosrati, Leili, Bidgoli, Amir Massoud

    Published: IEEE 01.05.2016
    “…Nowadays, IT has an important role in people's life. Bank is one of the example of institute which using IT in its daily tasks. Customer's personal information…”
    Get full text
    Conference Proceeding
  15. 15

    SU‐E‐I‐69: A Cloud Based Application for MRI Brain Image Processing by Kagadis, G, Alexakos, C, Papadimitroulas, P, Mihailidis, D, Megalooikonomou, V, Siablis, D, Papanikolaou, N, Karnabatidis, D

    ISSN: 0094-2405, 2473-4209
    Published: American Association of Physicists in Medicine 01.06.2015
    Published in Medical physics (Lancaster) (01.06.2015)
    “…’ requested pipeline. The implemented techniques were incorporated on a cloud application framework consisting of a web interface where the user can upload data (NIfTI format…”
    Get full text
    Journal Article
  16. 16

    MEMOSys: Bioinformatics platform for genome-scale metabolic models by Pabinger, Stephan, Rader, Robert, Agren, Rasmus, Nielsen, Jens, Trajanoski, Zlatko

    ISSN: 1752-0509, 1752-0509
    Published: London BioMed Central 31.01.2011
    Published in BMC systems biology (31.01.2011)
    “…Background Recent advances in genomic sequencing have enabled the use of genome sequencing in standard biological and biotechnological research projects. The…”
    Get full text
    Journal Article
  17. 17

    Adaptive Automated Teller Machines - Part II by Mujtaba, G., Mahmood, T.

    ISBN: 1457715538, 9781457715532
    Published: IEEE 01.07.2011
    “…Nowadays, the banking sector is increasingly relying on Automated Teller Machines (ATMs) in order to provide services to its customers. Although thousands of…”
    Get full text
    Conference Proceeding
  18. 18

    Bitstream-Oriented Protection for the H.264/Scalable Video Coding (SVC) by Ma, Ting, Ma, Maode, Lee, Yee Hui, Hu, Feng

    ISSN: 0929-6212, 1572-834X
    Published: New York Springer US 01.12.2017
    Published in Wireless personal communications (01.12.2017)
    “… Although the network environment, to some extent, provides security protection against the illegal users, it is not enough to protect against the authorized users from digesting contents beyond its authorization…”
    Get full text
    Journal Article
  19. 19

    European solvent industry group generic exposure scenario risk and exposure tool by Zaleski, Rosemary T, Qian, Hua, Zelenka, Michael P, George-Ares, Anita, Money, Chris

    ISSN: 1559-0631, 1559-064X, 1559-064X
    Published: New York Nature Publishing Group US 01.01.2014
    “…) was developed to facilitate the safety evaluation of consumer uses of solvents, as required by the European Union Registration, Evaluation and Authorization of Chemicals (REACH) Regulation…”
    Get full text
    Journal Article
  20. 20

    Analysis of the radius and diameter protocols in terms of pricing telecommunication services by Radonjić, Vesna M., Todosijević, Andrijana N., Petrović, Milica R., Stojanović, Mirjana D., Kostić-Ljubisavljević, Aleksandra K.

    ISSN: 0042-8469, 2217-4753
    Published: University of Defence in Belgrade 01.06.2013
    Published in Vojnotehnicki glasnik (01.06.2013)
    “…Accounting of telecommunication services is closely related to the functions of authentication and authorization…”
    Get full text
    Journal Article