Showing 1 - 10 of 509
security authentication process when accessing remote servers. The security of internet banking application has high level but …€ (Data boxes) were also included to compare the results of agricultural portals security. The aim of this paper is to point … out the lack of security in relation to the management of user identities and suggest measures to improve safety. …
Persistent link: https://www.econbiz.de/10011142397
This paper presents a robust and imperceptible methodology of watermark embedding. It uses two vital techniques, firstly the Multi-Resolution Singular Value Decomposition (MR-SVD) and an image adaptive algorithm on the lines of the human visual system (HVS), called Noise Visibility Function...
Persistent link: https://www.econbiz.de/10012042710
, these Single Factor Authentication mechanisms are proved to be defective. In virtue of enhancing security, recent researches … the research not just reduces the expense of proposed authentication schemes, yet gives security similarly as smart card … through peer to peer connections (ad hoc mode). Authentication is one among the most primary research challenges for the …
Persistent link: https://www.econbiz.de/10012043265
, scalability, and security. This research proposes a secure session initiation protocol model. It called the redundant session … registration mechanism that can be deployed in service provider data centers to maintain the service availability, security and …
Persistent link: https://www.econbiz.de/10012043352
fully expansion and use of mobile cloud computing is security, and it's because the increasing flows and data circulation … through internet that many security problems emerged and sparked the interest of the attackers. To face all this security … problems, we propose in this paper an authentication and confidentiality scheme based on homomorphic encryption, and also a …
Persistent link: https://www.econbiz.de/10012043376
security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out …The most challenging issues in cloud computing are access control and data security because users of the cloud … throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authentication is the …
Persistent link: https://www.econbiz.de/10012044942
several security threats. A number of authentication protocols have been proposed in the literature but if existing practices … performance is the secure communication delay. An authentication technique having significant delay may enhance the possibility of … prove the integrity of proposed work, the performance is measured theoretically and analyzed experimentally over ns2 …
Persistent link: https://www.econbiz.de/10012045707
and evaluated for its performance with security and execution time or primary parameters. Various scenarios are also …
Persistent link: https://www.econbiz.de/10012045715
algorithms. Intended method will implement a basic idea of completeness verification and authentication approach in which the … efficiency by reducing time. In authentication process CaRP is both a captcha and a graphical password scheme. CaRP addresses a … number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual …
Persistent link: https://www.econbiz.de/10012047567
Users are often considered the weakest link in the security chain because of their natural propensity for choosing … user's personal security. However, we don't fully understand the impact on the organisation as a whole when such laxity is … contained in these policies impact on the security of the systems in an organisation. Sometimes a mandated tightening of policy …
Persistent link: https://www.econbiz.de/10010671706