Results 11 to 20 of about 3,158,126 (357)

Risk and law in authentication [PDF]

open access: diamondDigital Evidence and Electronic Signature Law Review, 2014
Dr Schapper, Dr Rivolta and Mr Malta consider the methods used to signify intend in e-commerce and considers some of the ...
Schapper, Paul R.   +2 more
semanticscholar   +4 more sources

Fragile and blind watermarking technique based on Weber's law for medical image authentication

open access: closedIET Computer Vision, 2013
In developing countries such as India, transmission of medical images over the network is essential for providing health services to rural/remote population. During this transmission, a small distortion in the medical image may lead to wrong conclusions.
Ekta Walia, Anu Suneja
doaj   +3 more sources

The Urgency Of Authentication And Protection Of Personal Data In Online Transactions

open access: yesLaw and Justice, 2023
Fraud in online trading is a crime that is difficult to enforce the law. Fraud can be committed by sellers by counterfeiting their products or by driving transactions outside of e-commerce.
Mutimatun Niami
doaj   +2 more sources

On Authentication, Digital Signatures and Signature Laws [PDF]

open access: gold, 1999
The public debate arising from the introduction of signature laws in North America, Europe and elsewhere has prompted this paper. This paper analyses and compares the closely interrelated concepts of authentication, digital signatures and electronic signature laws and tries to explain and resolve some of the ambiguities. Non-trivial problems and issues
Per Kaijser
openaire   +2 more sources

A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data

open access: yesComputers
Despite significant advancements in fingerprint-based authentication, existing models still suffer from challenges such as high false acceptance and rejection rates, computational inefficiency, and vulnerability to spoofing attacks.
Abdulrahman Hussian   +3 more
doaj   +2 more sources

The Authentication of Information in Egovernment in Administrative Law in Poland [PDF]

open access: diamondWroclaw Review of Law, Administration and Economics, 2017
Błażewski Maciej
doaj   +2 more sources

Semi-fragile Watermarking and Authentication for Law Enforcement Applications

open access: closedSecond International Conference on Innovative Computing, Informatio and Control (ICICIC 2007), 2007
In this paper, a semi-fragile watermarking method for authentication of law enforcement images such as digital images captured at crime scenes and traffic enforcement situations is proposed using the pinned sine transform (PST). The watermarking system can localize the portions of image that have been tampered maliciously, with high accuracy.
Anthony T. S. Ho
openaire   +4 more sources

The Authentication of Digital Evidence in Criminal Justice: The Latin and Anglo-Saxon Criminal Law Perspective [PDF]

open access: bronzeLaw & Digital Technologies
The emergence of the internet and the widespread use of information systems have led to new challenges for criminal law, both in terms of substance and procedure.
Abdulkareem Fahil
openalex   +2 more sources

New Capital Market in the Light of Sixth Development Plan Law (Functionality of blockchain technology in the capital market) [PDF]

open access: yesفصلنامه بورس اوراق بهادار, 2022
The use of advanced information and communication technologies to change the structure of organizations and better information and services presentation in recent years has attracted the attention of many organizations and governments and legislators ...
Mahdi Madadi, Ghasem shafiei
doaj   +1 more source

Home - About - Disclaimer - Privacy