Showing 1 - 10 of 2,703
Some 80 earthquake specialists, architects, engineers and civil servants from a dozen countries met to discuss the different relationships which may occur between educational facilities and natural disasters; the emphasis was on the implications and effects of earthquakes and the appropriate...
Persistent link: https://www.econbiz.de/10004963046
have several essential security and privacy properties. We present a basic yet reasonably expressive language which …
Persistent link: https://www.econbiz.de/10009430549
websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later … continue to influence the way society makes payment for goods and services, the requirement for more advanced security … is to present a conceptual model for authentication, data entry and transaction verification. It is suggested that the …
Persistent link: https://www.econbiz.de/10009440800
RFID authentication protocols based on symmetric key cryptography. We identify the security and privacy requirements for an … healthcare applications to e-passport. The expansion of RFID technology, however, gives rise to severe security and privacy … concerns. To ensure the widespread deployment of this technology, the security and privacy threats must be addressed. However …
Persistent link: https://www.econbiz.de/10009484555
Purpose The purpose of this paper is to provide insights and commentary into issues encountered in providing computing services to library users in an era of shrinking budgets, reductions in staffing and increased costs. Design/methodology/approach Uses examples and illustrations from the...
Persistent link: https://www.econbiz.de/10014686813
This paper presents a robust and imperceptible methodology of watermark embedding. It uses two vital techniques, firstly the Multi-Resolution Singular Value Decomposition (MR-SVD) and an image adaptive algorithm on the lines of the human visual system (HVS), called Noise Visibility Function...
Persistent link: https://www.econbiz.de/10012042710
, these Single Factor Authentication mechanisms are proved to be defective. In virtue of enhancing security, recent researches … the research not just reduces the expense of proposed authentication schemes, yet gives security similarly as smart card … through peer to peer connections (ad hoc mode). Authentication is one among the most primary research challenges for the …
Persistent link: https://www.econbiz.de/10012043265
fully expansion and use of mobile cloud computing is security, and it's because the increasing flows and data circulation … through internet that many security problems emerged and sparked the interest of the attackers. To face all this security … problems, we propose in this paper an authentication and confidentiality scheme based on homomorphic encryption, and also a …
Persistent link: https://www.econbiz.de/10012043376
security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out …The most challenging issues in cloud computing are access control and data security because users of the cloud … throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authentication is the …
Persistent link: https://www.econbiz.de/10012044942
several security threats. A number of authentication protocols have been proposed in the literature but if existing practices … performance is the secure communication delay. An authentication technique having significant delay may enhance the possibility of …
Persistent link: https://www.econbiz.de/10012045707