26   Artículos

 
en línea
AlsharifHasan Mohamad Aburbeian and Manuel Fernández-Veiga    
Securing online financial transactions has become a critical concern in an era where financial services are becoming more and more digital. The transition to digital platforms for conducting daily transactions exposed customers to possible risks from cyb... ver más
Revista: AI    Formato: Electrónico

 
en línea
Nikolaos Vryzas, Anastasia Katsaounidou, Lazaros Vrysis, Rigas Kotsakis and Charalampos Dimoulas    
Media authentication relies on the detection of inconsistencies that may indicate malicious editing in audio and video files. Traditionally, authentication processes are performed by forensics professionals using dedicated tools. There is rich research o... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Liliya Akhmetzyanova     Pág. 1 - 9
In this paper the security of AEAD mode called the Multilinear Galois Mode (MGM) was analyzed regarding confidentiality property. This mode was originally proposed in CTCrypt 2017. Then it was adopted as a standard AEAD mode in the Ru... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Najm Us Sama, Kartinah Zen, Mamoona Humayun, Noor Zaman Jhanjhi and Atiq Ur Rahman    
The wireless body sensor network (WBSN) is a wireless communication that might enable 24/7 patient monitoring and health findings through the online platform. Although BSN design is becoming simpler, building a secure BSN seems to be more challenging tha... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Sultan Almalki, Nasser Assery and Kaushik Roy    
While the password-based authentication used in social networks, e-mail, e-commerce, and online banking is vulnerable to hackings, biometric-based continuous authentication systems have been used successfully to handle the rise in unauthorized accesses. ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Athanasios Goudosis and Sokratis Katsikas    
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such i... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Guma Ali, Mussa Ally Dida and Anael Elikana Sam    
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Nasima Begum, Md Azim Hossain Akash, Sayma Rahman, Jungpil Shin, Md Rashedul Islam and Md Ezharul Islam    
Handwriting analysis is playing an important role in user authentication or online writer identification for more than a decade. It has a significant role in different applications such as e-security, signature biometrics, e-health, gesture analysis, dia... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Maurizio Talamo, Franco Arcieri, Andrea Dimitri and Christian H. Schunck    
Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others. A PKI is ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
?.?. Cherepniov     Pág. 109 - 115
In this paper, we propose a new collective work scheme for performing the task of secure database creation and storage. Such tasks arise when building electronic payment systems and document management systems with distributed responsibility, that is, wh... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »