|
|
|
AlsharifHasan Mohamad Aburbeian and Manuel Fernández-Veiga
Securing online financial transactions has become a critical concern in an era where financial services are becoming more and more digital. The transition to digital platforms for conducting daily transactions exposed customers to possible risks from cyb...
ver más
|
|
|
|
|
|
|
Nikolaos Vryzas, Anastasia Katsaounidou, Lazaros Vrysis, Rigas Kotsakis and Charalampos Dimoulas
Media authentication relies on the detection of inconsistencies that may indicate malicious editing in audio and video files. Traditionally, authentication processes are performed by forensics professionals using dedicated tools. There is rich research o...
ver más
|
|
|
|
|
|
|
Liliya Akhmetzyanova
Pág. 1 - 9
In this paper the security of AEAD mode called the Multilinear Galois Mode (MGM) was analyzed regarding confidentiality property. This mode was originally proposed in CTCrypt 2017. Then it was adopted as a standard AEAD mode in the Ru...
ver más
|
|
|
|
|
|
|
Najm Us Sama, Kartinah Zen, Mamoona Humayun, Noor Zaman Jhanjhi and Atiq Ur Rahman
The wireless body sensor network (WBSN) is a wireless communication that might enable 24/7 patient monitoring and health findings through the online platform. Although BSN design is becoming simpler, building a secure BSN seems to be more challenging tha...
ver más
|
|
|
|
|
|
|
Sultan Almalki, Nasser Assery and Kaushik Roy
While the password-based authentication used in social networks, e-mail, e-commerce, and online banking is vulnerable to hackings, biometric-based continuous authentication systems have been used successfully to handle the rise in unauthorized accesses. ...
ver más
|
|
|
|
|
|
|
Athanasios Goudosis and Sokratis Katsikas
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such i...
ver más
|
|
|
|
|
|
|
Guma Ali, Mussa Ally Dida and Anael Elikana Sam
With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA...
ver más
|
|
|
|
|
|
|
Nasima Begum, Md Azim Hossain Akash, Sayma Rahman, Jungpil Shin, Md Rashedul Islam and Md Ezharul Islam
Handwriting analysis is playing an important role in user authentication or online writer identification for more than a decade. It has a significant role in different applications such as e-security, signature biometrics, e-health, gesture analysis, dia...
ver más
|
|
|
|
|
|
|
Maurizio Talamo, Franco Arcieri, Andrea Dimitri and Christian H. Schunck
Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others. A PKI is ...
ver más
|
|
|
|
|
|
|
?.?. Cherepniov
Pág. 109 - 115
In this paper, we propose a new collective work scheme for performing the task of secure database creation and storage. Such tasks arise when building electronic payment systems and document management systems with distributed responsibility, that is, wh...
ver más
|
|
|
|