27   Artículos

 
en línea
Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman    
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity ver... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Todd Dobbs, Abdullah-Al-Raihan Nayeem, Isaac Cho and Zbigniew Ras    
Art authentication is the process of identifying the artist who created a piece of artwork and is manifested through events of provenance, such as art gallery exhibitions and financial transactions. Art authentication has visual influence via the uniquen... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Ashish Koirala, Rabindra Bista and Joao C. Ferreira    
The Internet of Things (IoT) shares the idea of an autonomous system responsible for transforming physical computational devices into smart ones. Contrarily, storing and operating information and maintaining its confidentiality and security is a concerni... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Anfal Ahmed Aleidan, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim and Alaa E. S. Ahmed    
User authentication has become necessary in different life domains. Traditional authentication methods like personal information numbers (PINs), password ID cards, and tokens are vulnerable to attacks. For secure authentication, methods like biometrics h... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mamoona Humayun, Mahmood Niazi, Maram Fahhad Almufareh, N. Z. Jhanjhi, Sajjad Mahmood and Mohammad Alshayeb    
Cloud computing (CC) is the delivery of computing services on demand and is charged using a ?pay per you use? policy. Of the multiple services offered by CC, SaaS is the most popular and widely adapted service platform and is used by billions of organiza... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Kashif Naseer Qureshi, Luqman Shahzad, Abdelzahir Abdelmaboud, Taiseer Abdalla Elfadil Eisa, Bandar Alamri, Ibrahim Tariq Javed, Arafat Al-Dhaqm and Noel Crespi    
The rapid advancement in the area of the Internet of Vehicles (IoV) has provided numerous comforts to users due to its capability to support vehicles with wireless data communication. The exchange of information among vehicle nodes is critical due to the... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Rogelio Reyes-Reyes, Clara Cruz-Ramos, Volodymyr Ponomaryov, Beatriz P. Garcia-Salgado and Javier Molina-Garcia    
In this paper, a fragile watermarking scheme for color image authentication and self-recovery with high tampering rates is proposed. The original image is sub-sampled and divided into non-overlapping blocks, where a watermark used for recovery purposes i... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nasima Begum, Md Azim Hossain Akash, Sayma Rahman, Jungpil Shin, Md Rashedul Islam and Md Ezharul Islam    
Handwriting analysis is playing an important role in user authentication or online writer identification for more than a decade. It has a significant role in different applications such as e-security, signature biometrics, e-health, gesture analysis, dia... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Tony Gwyn, Kaushik Roy and Mustafa Atay    
In the realm of computer security, the username/password standard is becoming increasingly antiquated. Usage of the same username and password across various accounts can leave a user open to potential vulnerabilities. Authentication methods of the futur... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Diego Ordonez-Camacho    
The Internet of Things has emerged as one of the most promising trends today. The speed of its adoption, however, has caused certain gaps. Amongst the most critical there is the one related with the security of the systems involved. This project addresse... ver más
Revista: Ingenius. Revista de Ciencia y TecnologÍ­a    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »