Showing 1 - 10 of 3,515
towards the design of a generic framework to integrate these privacy preserving mechanisms at different layers of IoT …Data privacy is now-a-days a special issue in era of Internet of Things because of the big data stored and transmitted … by the public/private devices. Different types and levels of privacy can be provided at different layers of IoT …
Persistent link: https://www.econbiz.de/10012045715
Persistent link: https://www.econbiz.de/10012520006
Persistent link: https://www.econbiz.de/10014364626
design. To this end, the basic security and privacy requirements that should be considered are introduced. Additionally, a … realized. This implies that security and privacy issues are inherently intertwined and should be viewed synergistically. The … aim of this paper is to elevate modern practices for ensuring security and privacy during software systems analysis and …
Persistent link: https://www.econbiz.de/10012048083
Persistent link: https://www.econbiz.de/10012062282
This paper presents a robust and imperceptible methodology of watermark embedding. It uses two vital techniques, firstly the Multi-Resolution Singular Value Decomposition (MR-SVD) and an image adaptive algorithm on the lines of the human visual system (HVS), called Noise Visibility Function...
Persistent link: https://www.econbiz.de/10012042710
, these Single Factor Authentication mechanisms are proved to be defective. In virtue of enhancing security, recent researches … the research not just reduces the expense of proposed authentication schemes, yet gives security similarly as smart card … through peer to peer connections (ad hoc mode). Authentication is one among the most primary research challenges for the …
Persistent link: https://www.econbiz.de/10012043265
, scalability, and security. This research proposes a secure session initiation protocol model. It called the redundant session … registration mechanism that can be deployed in service provider data centers to maintain the service availability, security and …
Persistent link: https://www.econbiz.de/10012043352
fully expansion and use of mobile cloud computing is security, and it's because the increasing flows and data circulation … through internet that many security problems emerged and sparked the interest of the attackers. To face all this security … problems, we propose in this paper an authentication and confidentiality scheme based on homomorphic encryption, and also a …
Persistent link: https://www.econbiz.de/10012043376
security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out …The most challenging issues in cloud computing are access control and data security because users of the cloud … throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authentication is the …
Persistent link: https://www.econbiz.de/10012044942