Results 21 to 30 of about 76,752 (276)
Verification of considered cause ( ta'lil al-ahkiim) together with the objectives of Shariah (maqiisid al-Shari'ah) is among the most important issues discussed by the experts of Jurisprudence.
Zuhrotul Ain Mansur
doaj +1 more source
Biometric Identification by Fingerprint Image Based Minutiae Detection [PDF]
In an increasingly digital world, reliable personal authentication has become an important human computer interface application, some examples where establishing a person’s identity.
Israa Mohamed Khidher
doaj +1 more source
Penerapan Sistem Pembuktian Terbalik Untuk Kasus Korupsi: Kajian Antara Hukum Positif Dan Hukum Islam [PDF]
Korupsi merupakan salah satu kejahatan yang terorganisir dan bersifat lintas batas teritorial (transnasional). Salah satu sebabnya karena pemberantasan korupsi sangat sulit diperangi dalam sistem birokrasi yang koruptif sehingga memerlukan instrumen ...
Yusuf, Y. (Y)
core +2 more sources
PEMBUKTIAN DALAM PERKARA PERCERAIAN DENGAN ALASAN PERSELISIHAN
Civil Law was public law which was imperative so it tied everyone, especially in investigating witness incourt. It was determined that judge forbade to get witness from blood relative as the base to take decision.However it was not an absolute regulation.
I Gusti Ngurah Adnyana
doaj +1 more source
The Concept of Rights: Views of Bentham and Khoei [PDF]
The main focus of this research is on the nature and origin of rights. Jeremy Bentham totally rejects the notion of extra-legal rights. For him, it is only legal rights that are valid and imply a benefit for its holders.
Mohammad Rasekh, Mohsen Ghasemi
doaj +1 more source
Wood identification services in support of legal supply chains: A market study
Major wood-importing markets, such as the European Union, the United States of America, and China, have set regulations in place requiring operators to only sell wood-based goods that are sourced and processed in accordance with local laws.
Jo Van Brusselen +2 more
doaj +1 more source
Probability on groups and an application to cryptography [PDF]
In her thesis, Mosina introduced the concept of {\it mean-set of random (graph-) group-variables} and generalized Strong Law of Large Numbers (SLLN) to (graphs) groups, which she used for cryptanalysis of authentication schemes.
Sidoine Djimnaibeye +2 more
doaj
AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems [PDF]
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services.
Ahamed, Sheikh Iqbal +2 more
core +2 more sources
Detection of replay attacks in cyber-physical systems using a frequency-based signature [PDF]
This paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-physical systems (CPS). In particular, the method employs a sinusoidal signal with a time-varying frequency (authentication signal) into the closed-loop ...
Escobet Canal, Teresa +5 more
core +2 more sources
Qualified Electronic Signature – eIDAS Striking Czech Public Sector Bodies
Electronic IDentification, Authentication and trust Services (“eIDAS”) is a standardized system for trustworthiness, effectiveness and efficiency. Since 2018, Czech public sector bodies have to use qualified electronic signatures when officially acting ...
Radka MacGregor Pelikánová +2 more
doaj +1 more source

