Risk and law in authentication [PDF]
Dr Schapper, Dr Rivolta and Mr Malta consider the methods used to signify intend in e-commerce and considers some of the ...
Schapper, Paul R. +2 more
semanticscholar +4 more sources
Fragile and blind watermarking technique based on Weber's law for medical image authentication
In developing countries such as India, transmission of medical images over the network is essential for providing health services to rural/remote population. During this transmission, a small distortion in the medical image may lead to wrong conclusions.
Ekta Walia, Anu Suneja
doaj +3 more sources
The Urgency Of Authentication And Protection Of Personal Data In Online Transactions
Fraud in online trading is a crime that is difficult to enforce the law. Fraud can be committed by sellers by counterfeiting their products or by driving transactions outside of e-commerce.
Mutimatun Niami
doaj +2 more sources
On Authentication, Digital Signatures and Signature Laws [PDF]
The public debate arising from the introduction of signature laws in North America, Europe and elsewhere has prompted this paper. This paper analyses and compares the closely interrelated concepts of authentication, digital signatures and electronic signature laws and tries to explain and resolve some of the ambiguities. Non-trivial problems and issues
Per Kaijser
openaire +2 more sources
A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data
Despite significant advancements in fingerprint-based authentication, existing models still suffer from challenges such as high false acceptance and rejection rates, computational inefficiency, and vulnerability to spoofing attacks.
Abdulrahman Hussian +3 more
doaj +2 more sources
The Authentication of Information in Egovernment in Administrative Law in Poland [PDF]
Błażewski Maciej
doaj +2 more sources
Semi-fragile Watermarking and Authentication for Law Enforcement Applications
In this paper, a semi-fragile watermarking method for authentication of law enforcement images such as digital images captured at crime scenes and traffic enforcement situations is proposed using the pinned sine transform (PST). The watermarking system can localize the portions of image that have been tampered maliciously, with high accuracy.
Anthony T. S. Ho
openaire +4 more sources
Data security and multi-factor authentication: Analysis of requirements under EU law and in selected EU Member States [PDF]
Elizabeth Kennedy, Christopher Millard
openalex +2 more sources
The Authentication of Digital Evidence in Criminal Justice: The Latin and Anglo-Saxon Criminal Law Perspective [PDF]
The emergence of the internet and the widespread use of information systems have led to new challenges for criminal law, both in terms of substance and procedure.
Abdulkareem Fahil
openalex +2 more sources
New Capital Market in the Light of Sixth Development Plan Law (Functionality of blockchain technology in the capital market) [PDF]
The use of advanced information and communication technologies to change the structure of organizations and better information and services presentation in recent years has attracted the attention of many organizations and governments and legislators ...
Mahdi Madadi, Ghasem shafiei
doaj +1 more source

