Showing 1 - 10 of 1,068
Persistent link: https://www.econbiz.de/10014364626
Persistent link: https://www.econbiz.de/10012062282
websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later … continue to influence the way society makes payment for goods and services, the requirement for more advanced security … is to present a conceptual model for authentication, data entry and transaction verification. It is suggested that the …
Persistent link: https://www.econbiz.de/10009440800
have several essential security and privacy properties. We present a basic yet reasonably expressive language which …
Persistent link: https://www.econbiz.de/10009430549
Persistent link: https://www.econbiz.de/10011438552
Persistent link: https://www.econbiz.de/10012887818
Persistent link: https://www.econbiz.de/10011698640
Persistent link: https://www.econbiz.de/10011594997
will be analyzed. There will be established the ways to assign access rights. The authentication category will be analyzed …. We will propose an algorithm for the optimization of authentication process. For the application “Evaluation of TIC …
Persistent link: https://www.econbiz.de/10005154571
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that are close to each other according to some distance functions, such that no additional information other than the join...
Persistent link: https://www.econbiz.de/10009430495