Showing 51 - 60 of 9,458
This paper presents a robust and imperceptible methodology of watermark embedding. It uses two vital techniques, firstly the Multi-Resolution Singular Value Decomposition (MR-SVD) and an image adaptive algorithm on the lines of the human visual system (HVS), called Noise Visibility Function...
Persistent link: https://www.econbiz.de/10012042710
, these Single Factor Authentication mechanisms are proved to be defective. In virtue of enhancing security, recent researches … the research not just reduces the expense of proposed authentication schemes, yet gives security similarly as smart card … through peer to peer connections (ad hoc mode). Authentication is one among the most primary research challenges for the …
Persistent link: https://www.econbiz.de/10012043265
, scalability, and security. This research proposes a secure session initiation protocol model. It called the redundant session … registration mechanism that can be deployed in service provider data centers to maintain the service availability, security and …
Persistent link: https://www.econbiz.de/10012043352
fully expansion and use of mobile cloud computing is security, and it's because the increasing flows and data circulation … through internet that many security problems emerged and sparked the interest of the attackers. To face all this security … problems, we propose in this paper an authentication and confidentiality scheme based on homomorphic encryption, and also a …
Persistent link: https://www.econbiz.de/10012043376
security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out …The most challenging issues in cloud computing are access control and data security because users of the cloud … throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authentication is the …
Persistent link: https://www.econbiz.de/10012044942
several security threats. A number of authentication protocols have been proposed in the literature but if existing practices … performance is the secure communication delay. An authentication technique having significant delay may enhance the possibility of …
Persistent link: https://www.econbiz.de/10012045707
threshold. The challenge is that the design of proofs and verification objects has to be customized for different data mining … algorithms. Intended method will implement a basic idea of completeness verification and authentication approach in which the … efficiency by reducing time. In authentication process CaRP is both a captcha and a graphical password scheme. CaRP addresses a …
Persistent link: https://www.econbiz.de/10012047567
design adds another layer of security to existing methods to either prevent a MitM attack or to make the procedure of … prevalent reverse social engineering technique known as phishing; where spam emails are sent to customers with links to fake … websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later …
Persistent link: https://www.econbiz.de/10009440800
Users are often considered the weakest link in the security chain because of their natural propensity for choosing … user's personal security. However, we don't fully understand the impact on the organisation as a whole when such laxity is … contained in these policies impact on the security of the systems in an organisation. Sometimes a mandated tightening of policy …
Persistent link: https://www.econbiz.de/10010671706
will be analyzed. There will be established the ways to assign access rights. The authentication category will be analyzed …. We will propose an algorithm for the optimization of authentication process. For the application “Evaluation of TIC …
Persistent link: https://www.econbiz.de/10005154571