Results 1 to 10 of about 72,269 (161)
Blockchain Enabled Online-Voting System [PDF]
A blockchain-enabled online-voting system is being proposed in this following paper. Blockchain technologies deliver an endless variety of applications that benefit from distributed economies.
Shah Akhil +4 more
doaj +1 more source
RBEF: Ransomware Efficient Public Blockchain Framework for Digital Healthcare Application
These days, the use of digital healthcare has been growing in practice. Getting remote healthcare services without going to the hospital for essential checkups and reports is easy. It is a cost-saving and time-saving process.
Abdullah Lakhan +3 more
doaj +1 more source
Students' Learning Interest Using Computer and Android in Acid Base Teaching
This research is motivated by the influence of high technology on education; hence educators need to choose the right technology device to use and compare student learning interests with and without the support of computer and android multimedia. It was
Milanda Putri, Yenni Kurniawati
doaj +1 more source
BackgroundWhile early detection and effective control of epidemics depend on appropriate surveillance methods, the Philippines bases its dengue fever surveillance system on a passive surveillance method (notifications from barangay/village health centers,
Herbuela, Von Ralph Dane Marquez +7 more
doaj +1 more source
Several mobile healthcare (mHealth) apps are available in various marketplaces, but there is still concern about their accuracy, data safety, and regulation.
Ali Talyshinskii +5 more
doaj +1 more source
Aplikasi IoT untuk Kendali Beban Listrik
Internet of thing (IoT) is a system that will change the order of human life and industrial operations. In the future, objects that are operated daily with human interaction will be equipped with internet connectivity which is equipped with various ...
Asnil Asnil +4 more
doaj +1 more source
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware [PDF]
Billions of users rely on the security of the Android platform to protect phones, tablets, and many different types of consumer electronics. While Android's permission model is well studied, the enforcement of the protection policy has received ...
Arzt Steven +16 more
core +2 more sources
Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android [PDF]
A common security architecture is based on the protection of certain resources by permission checks (used e.g., in Android and Blackberry). It has some limitations, for instance, when applications are granted more permissions than they actually need ...
Bartel, Alexandre +3 more
core +5 more sources
Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android [PDF]
A common security architecture, called the permission-based security model (used e.g. in Android and Blackberry), entails intrinsic risks. For instance, applications can be granted more permissions than they actually need, what we call a "permission gap".
Bartel, Alexandre +3 more
core +8 more sources
This study aims to implement steganography with 4 bit LSB method combined with Vigenere and substitution encryption algorithms. This combination strengthens the security of text messages that are inserted into the image because the message is already a ...
Priyagung Hernawandra +2 more
doaj +1 more source

