Showing 1 - 10 of 9,242
In this article, the authors have proposed a secure two-factor remote user authentication and session key agreement … scheme provides the amenity of mutual authentication and session key agreement safely. The informal security verification has …
Persistent link: https://www.econbiz.de/10012043263
Recently, Om et al. proposed three-factor remote user authentication protocol using ElGamal cryptosystem and ensured … robust anonymous identity based authentication scheme for multi-server environment. The authentication proof of the proposed … scheme has validated using BAN (Burrows-Abadi-Needham) logic, which confirms the protocol facilitates mutual authentication …
Persistent link: https://www.econbiz.de/10012043273
"This study analyzes how far Integrated Reporting tackles shortcomings of corporate reporting. It investigates the IIRC Framework conceptually and provides a descriptive analysis of the degree of IR in existing reports from South Africa and the USA. The study also examines the relationship of IR...
Persistent link: https://www.econbiz.de/10011710338
Persistent link: https://www.econbiz.de/10009730229
Persistent link: https://www.econbiz.de/10010504252
This paper presents a robust and imperceptible methodology of watermark embedding. It uses two vital techniques, firstly the Multi-Resolution Singular Value Decomposition (MR-SVD) and an image adaptive algorithm on the lines of the human visual system (HVS), called Noise Visibility Function...
Persistent link: https://www.econbiz.de/10012042710
through peer to peer connections (ad hoc mode). Authentication is one among the most primary research challenges for the … authentication process, which are of major concern for real-time applications and media streaming application. In the same way, it is … traditional authentication mechanisms frequently adopted the names and passwords of clients as login authentication. However …
Persistent link: https://www.econbiz.de/10012043265
The session initiation protocol is one the most popular protocols that is used in Internet protocol multimedia subsystems and adopted by a wide range of networking vendors. This research suggests a secure distributed session initiation protocol-based architectural model that can be deployed in...
Persistent link: https://www.econbiz.de/10012043352
problems, we propose in this paper an authentication and confidentiality scheme based on homomorphic encryption, and also a …
Persistent link: https://www.econbiz.de/10012043376
authentication watermark for each group, embed the watermark using the improved reversible data hiding approach, and hide the mark of …
Persistent link: https://www.econbiz.de/10012043915