204   Artículos

 
en línea
Yi Zhao and Song-Kyoo Kim    
This paper addresses the enhancement of modern security through the integration of electrocardiograms (ECGs) into biometric authentication systems. As technology advances, the demand for reliable identity authentication systems has grown, given the rise ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Olga Kurasova, Arnoldas Bud?ys and Viktor Medvedev    
As artificial intelligence has evolved, deep learning models have become important in extracting and interpreting complex patterns from raw multidimensional data. These models produce multidimensional embeddings that, while containing a lot of informatio... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng    
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Burhan Ul Islam Khan, Khang Wen Goh, Mohammad Shuaib Mir, Nur Fatin Liyana Mohd Rosely, Aabid Ahmad Mir and Mesith Chaimanee    
As the Internet of Things (IoT) continues to revolutionize value-added services, its conventional architecture exhibits persistent scalability and security vulnerabilities, jeopardizing the trustworthiness of IoT-based services. These architectural limit... ver más
Revista: Information    Formato: Electrónico

 
en línea
Shi-Yi Jin, Dong-Hyun Seo, Yeon-Jin Kim, Yong-Eun Kim, Samuel Woo and Jin-Gyun Chung    
To authenticate a controller area network (CAN) data frame, a message authentication code (MAC) must be sent along with the CAN frame, but there is no space reserved for the MAC in the CAN frame. Recently, difference-based compression (DBC) algorithms ha... ver más
Revista: Information    Formato: Electrónico

 
en línea
Shengyang Li, Zhen Wang and Wanfeng Zhang    
Cloud computing has become one of the key technologies used for big data processing and analytics. User management on cloud platforms is a growing challenge as the number of users and the complexity of systems increase. In light of the user-management sy... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Georgios M. Nikolopoulos and Marc Fischlin    
Quantum key distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share a short secret key beforehand. This pre-shared secret key is used... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jiawei Han, Qingsa Li, Ying Xu, Yan Zhu and Bingxin Wu    
Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse. How... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman    
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity ver... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan    
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 12     Siguiente »