|
|
|
Tony Gwyn, Kaushik Roy and Mustafa Atay
In the realm of computer security, the username/password standard is becoming increasingly antiquated. Usage of the same username and password across various accounts can leave a user open to potential vulnerabilities. Authentication methods of the futur...
ver más
|
|
|
|
|
|
|
Seonghyeon Gong, Abir EL Azzaoui, Jeonghun Cha and Jong Hyuk Park
The service-based architecture of the Fifth Generation(5G) had combined the services and security architectures and enhanced the authentication process of services to expand the coverage of the network, including heterogeneous devices. This architecture ...
ver más
|
|
|
|
|
|
|
Mauro Leonardi and Fabrizio Gerardi
Nowadays, aircraft safety is based on different systems and four of them share the same data-link protocol: Secondary Surveillance Radar, Automatic Dependent Surveillance System, Traffic Collision Avoidance System, and Traffic Information System use the ...
ver más
|
|
|
|
|
|
|
|
Spyridon Arvanitis
Pág. 94 - 98
Peer-to-peer (P2P) lending allows primarily unsecured personal loans to be made between any two or more parties rather than requesting a loan strictly through a financial institution. In a decentralized P2P lending system, using digital blockchain techno...
ver más
|
|
|
|