Results 11 to 20 of about 3,059,535 (353)

UTILITY NFT

open access: yesInternational Journal of Law in Changing World, 2023
With the popularity of metaverse, the number of questions about the legal framework of utility tokens has also grown. In this area, the application of blockchain allows us to generalize the experience of tokenization of services.
Yuliya Kharitonova
doaj   +1 more source

SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems

open access: yesWireless Network Security, 2023
Instant-messaging (IM) and voice over IP (VoIP) applications like WhatsApp, Zoom, and Skype have made people extremely reliant on online communications for their audio, video, and text conversations. Since more people are using these platforms to talk to
Mashari Alatawi, Nitesh Saxena
semanticscholar   +1 more source

Single Sign On Using Keycloak Integrated Public Key Infrastructure for User Authentication In Indonesia’s Electronic Based Government System

open access: yesAdvance Sustainable Science, Engineering and Technology, 2023
The government in carrying out its function as a public administration servant is regulated in law of the Republic of Indonesia number 25/2009 on public services.
W. Hermawan
semanticscholar   +1 more source

Comparison of DNA extraction methods on CITES-listed timber species and application in species authentication of commercial products using DNA barcoding

open access: yesScientific Reports, 2023
Quality and quantity of DNA extracted from wood is important for molecular identification of wood species, which can serve for conservation of wood species and law enforcement to combat illegal wood trading.
Grace Wing-Chiu But   +6 more
semanticscholar   +1 more source

Legal Development of the Validity of Electronic Mortgage Certificates in the Land Registration System in Indonesia

open access: yesYustisia, 2022
Electronic encumbrance Right is one of the breakthroughs made by the Minister of Agrarian Affairs to improve services in the land sector and support the Government in realizing a digital bureaucracy in Indonesia.
Dhaniswara K Harjono
doaj   +1 more source

DNA-Based Platform for Halal Authentication and Combat Food Threat

open access: yesJOURNAL OF HALAL INDUSTRY & SERVICES, 2023
The molecular recognition of a particular DNA target is essential not only for the development of new drugs, forensic research, and medical diagnostics but also for Halal authentication.
Md Mahfujur Rahman   +2 more
semanticscholar   +1 more source

AUTENTIKASI PERJANJIAN PENGIKATAN JUAL BELI TANAH YANG ANTIDATIR

open access: yesArena Hukum, 2021
This research aims to analyze the problem of the authentication of the antidatir sale and purchase land binding agreement where the deed is in violation of Law on the Notary Position.
Riky Rustam
doaj   +1 more source

Evaluation of Decentralized Verifiable Credentials to Authenticate Authorized Trading Partners and Verify Drug Provenance

open access: yesBlockchain in Healthcare Today, 2021
Summary: In 2013, the Drug Supply Chain Security Act (DSCSA) was signed into law to address the growing threat of counterfeit drugs and to ensure prescription drugs remain safe and effective for patients.
Ghada L. Ashkar   +7 more
doaj   +1 more source

The Question of Public Participation in the Procedure for Authentic Interpretation of Laws [PDF]

open access: yesReview of European and Comparative Law, 2021
Authentic interpretation of laws is an interpretation of legal provisions that, due to their lack of clarity or misinterpretation in their application, is provided by the parliament. Unlike the legislative procedure, which is conducted, as a rule, in two (exceptionally three) readings, a proposal for giving an authentic interpretation is discussed in ...
openaire   +5 more sources

Biometric multi‐factor authentication: On the usability of the FingerPIN scheme

open access: yesSecurity and Privacy, 2022
Fingerprint‐based authentication has been successfully adopted in a wide range of applications, including law enforcement and immigration, due to its numerous advantages over traditional password‐based authentication.
Emanuela Marasco   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy