Results 1 to 10 of about 3,059,535 (353)

The Authentication of Information in Egovernment in Administrative Law in Poland [PDF]

open access: diamondWroclaw Review of Law, Administration and Economics, 2017
The process of authentication of information is connected with the transfer of information in e-government. Provisions of e-government regulate the rights and obligations of participants in this process. These provisions are expressed in national and in European law. These participants are providers of authentication of information.
Błażewski Maciej
doaj   +4 more sources

Risk and law in authentication [PDF]

open access: bronzeDigital Evidence and Electronic Signature Law Review, 2014
Dr Schapper, Dr Rivolta and Mr Malta consider the methods used to signify intend in e-commerce and considers some of the ...
Paul Schapper   +2 more
semanticscholar   +5 more sources

Fragile and blind watermarking technique based on Weber's law for medical image authentication

open access: closedIET Computer Vision, 2013
In developing countries such as India, transmission of medical images over the network is essential for providing health services to rural/remote population. During this transmission, a small distortion in the medical image may lead to wrong conclusions.
Ekta Walia, Anu Suneja
doaj   +3 more sources

The Urgency Of Authentication And Protection Of Personal Data In Online Transactions

open access: yesLaw and Justice, 2023
Fraud in online trading is a crime that is difficult to enforce the law. Fraud can be committed by sellers by counterfeiting their products or by driving transactions outside of e-commerce.
Mutimatun Niami
doaj   +2 more sources

Semi-fragile Watermarking and Authentication for Law Enforcement Applications

open access: greenSecond International Conference on Innovative Computing, Informatio and Control (ICICIC 2007), 2007
In this paper, a semi-fragile watermarking method for authentication of law enforcement images such as digital images captured at crime scenes and traffic enforcement situations is proposed using the pinned sine transform (PST). The watermarking system can localize the portions of image that have been tampered maliciously, with high accuracy.
Anthony T. S. Ho
openalex   +6 more sources

On Authentication, Digital Signatures and Signature Laws [PDF]

open access: closed, 1999
The public debate arising from the introduction of signature laws in North America, Europe and elsewhere has prompted this paper. This paper analyses and compares the closely interrelated concepts of authentication, digital signatures and electronic signature laws and tries to explain and resolve some of the ambiguities. Non-trivial problems and issues
Per Kaijser
openalex   +2 more sources

Analysis of non-halal meat adulteration in beef meatball using real-time PCR and mitochondrial D-loop gen-specific primer [PDF]

open access: yesOpen Veterinary Journal
Background: Indonesia, home to the world's largest Muslim population, enforces Law No. 33 of 2014, mandating halal certification for all products in the country.
Halida Rahmania   +3 more
doaj   +2 more sources

The Legal Forensic Model in Determining the Genuineness of Islamic Banking Documents and Their Application in Shariah Courts [PDF]

open access: yesGlobal Journal Al-Thaqafah, 2017
Falsification of documents does not only happen in civil courts. Shariah courts also face the same problems despite being ‘religiously’-oriented courts.
Wan Abdul Fattah Wan Ismail   +1 more
doaj   +1 more source

New Capital Market in the Light of Sixth Development Plan Law (Functionality of blockchain technology in the capital market) [PDF]

open access: yesفصلنامه بورس اوراق بهادار, 2022
The use of advanced information and communication technologies to change the structure of organizations and better information and services presentation in recent years has attracted the attention of many organizations and governments and legislators ...
Mahdi Madadi, Ghasem shafiei
doaj   +1 more source

Design of Secure and Lightweight Authentication Scheme for UAV-Enabled Intelligent Transportation Systems Using Blockchain and PUF

open access: yesIEEE Access, 2023
Unmanned-aerial-vehicle (UAV)-enabled intelligent transportation system (ITS) is an advanced technology that can provide various services including autonomous driving, real-time creation of high-definition maps, and car sharing.
Seunghwan Son   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy