Showing 11 - 20 of 6,926
system security and resources. The author's mechanism should be design in such way, the Confidentiality, Integrity …The preventive control is one of the best well advance control for recent complex IS Security Application to protect … security put forward to the management focus on IT infrastructure. This work contributes to the development of an optimization …
Persistent link: https://www.econbiz.de/10012043937
data security techniques were developed to ensure privacy, integrity and authenticity. One of the techniques developed was … Standards and Technology. It is still a powerful data integrity and authentication tool that provides better protection than … became one the flaws of computer security that needs to be handled. In order to establish a secure data communication, many …
Persistent link: https://www.econbiz.de/10012045717
security facilitated by navigation message authentication is given. The analysis takes into consideration the risk of critical …This paper describes a number of techniques for GNSS navigation message authentication. A detailed analysis of the … cryptographic authentication schemes for navigation data authentication. These authentication schemes provide authenticity and …
Persistent link: https://www.econbiz.de/10009438385
Persistent link: https://www.econbiz.de/10012416431
Persistent link: https://www.econbiz.de/10012271208
Persistent link: https://www.econbiz.de/10012062282
This paper presents a robust and imperceptible methodology of watermark embedding. It uses two vital techniques, firstly the Multi-Resolution Singular Value Decomposition (MR-SVD) and an image adaptive algorithm on the lines of the human visual system (HVS), called Noise Visibility Function...
Persistent link: https://www.econbiz.de/10012042710
, these Single Factor Authentication mechanisms are proved to be defective. In virtue of enhancing security, recent researches … the research not just reduces the expense of proposed authentication schemes, yet gives security similarly as smart card … through peer to peer connections (ad hoc mode). Authentication is one among the most primary research challenges for the …
Persistent link: https://www.econbiz.de/10012043265
, scalability, and security. This research proposes a secure session initiation protocol model. It called the redundant session … registration mechanism that can be deployed in service provider data centers to maintain the service availability, security and …
Persistent link: https://www.econbiz.de/10012043352
fully expansion and use of mobile cloud computing is security, and it's because the increasing flows and data circulation … through internet that many security problems emerged and sparked the interest of the attackers. To face all this security … problems, we propose in this paper an authentication and confidentiality scheme based on homomorphic encryption, and also a …
Persistent link: https://www.econbiz.de/10012043376