Results 261 to 270 of about 3,062,704 (315)
Some of the next articles are maybe not open access.

The Authentication of Digital Evidence in Criminal Justice: The Latin and Anglo-Saxon Criminal Law Perspective

Law & Digital Technologies
The emergence of the internet and the widespread use of information systems have led to new challenges for criminal law, both in terms of substance and procedure.
Abdulkareem Fahil
semanticscholar   +1 more source

A novel authentication and key‐agreement scheme for satellite communication network

Transactions on Emerging Telecommunications Technologies, 2020
In these days, satellite communication networks are playing a significant role in facilitating the crucial infrastructural services that include environmental monitoring, electronic surveillance, public safety, intelligence operations for law enforcement,
Izwa Altaf   +5 more
semanticscholar   +1 more source

3D finger vein biometric authentication with photoacoustic tomography.

Applied Optics, 2020
Biometric authentication is the recognition of human identity via unique anatomical features. The development of novel methods parallels widespread application by consumer devices, law enforcement, and access control.
Y. Zhan   +6 more
semanticscholar   +1 more source

PQC-HI: PQC-enabled Chiplet Authentication and Key Exchange in Heterogeneous Integration

Electronic Components and Technology Conference
Integrating heterogeneous components in multi-chiplet packaging, known as system-in-package (SiP), is a significant step forward in overcoming limitations by Moore’s Law and Dennard scaling.
Md Sami Ul Islam Sami   +4 more
semanticscholar   +1 more source

Ed-PUF: Event-Driven Physical Unclonable Function for Camera Authentication in Reactive Monitoring System

IEEE Transactions on Information Forensics and Security, 2020
As surveillance footage plays an increasingly significant role in law enforcement, it is imperative to ensure the integrity of recorded video data and the authenticity of its originator, and instill situation awareness into these monitoring systems with ...
Yue Zheng   +4 more
semanticscholar   +1 more source

Increasing transparency around facial recognition technologies in law enforcement: towards a model framework

Social Science Research Network, 2023
Law enforcement authorities around the world are increasingly trialing or using facial recognition technologies (FRT). Their use has raised many legal and ethical challenges, one of which is a lack of transparency: Community members do not have ...
Rita Matulionyte
semanticscholar   +1 more source

Smart Parking for Disabled Parking Improvement Using RFID and Database Authentication

World Forum on Internet of Things, 2020
In many populous cities across the world, parking tends to be at the forefront of traffic concerns. Many cities have seen rises in urban population as people move to the cities for job opportunities. The increase in population also means more cars in the
Zainab Al Taweel   +3 more
semanticscholar   +1 more source

Dynamic anonymous identity authentication (DAIA) scheme for VANET

International Journal of Communication Systems, 2018
With the development of the vehicular ad hoc network, the security and privacy are now becoming vital concerns, especially when the attacker owns more and more resources.
Yining Liu   +4 more
semanticscholar   +1 more source

How Biometric Authentication Poses New Challenges to Our Security and Privacy [In the Spotlight]

IEEE Signal Processing Magazine, 2017
Discusses the challenges that face biometric authentication in the areas of privacy and network security. The use of biometric data — an individual’s measurable physical and behavioral characteristics — isn’t new.
N. Memon
semanticscholar   +1 more source

Integer wavelet transform based an effective fragile watermarking scheme for exact authentication and restoration

Journal of Ambient Intelligence and Humanized Computing, 2022
Durgesh Singh   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy