Results 21 to 30 of about 76,752 (276)

Ibnu Qayyim Al-Jauziyyah's Ways to Verification of Considered Cause | طرق تعليل الأحكام عند الإمام ابن قيم الجوزية

open access: yesAl-Zahra: Journal for Islamic and Arabic Studies, 2009
Verification of considered cause ( ta'lil al-ahkiim) together with the objectives of Shariah (maqiisid al-Shari'ah) is among the most important issues discussed by the experts of Jurisprudence.
Zuhrotul Ain Mansur
doaj   +1 more source

Biometric Identification by Fingerprint Image Based Minutiae Detection [PDF]

open access: yesمجلة التربية والعلم, 2009
In an increasingly digital world, reliable personal authentication has become an important human computer interface application, some examples where establishing a person’s identity.
Israa Mohamed Khidher
doaj   +1 more source

Penerapan Sistem Pembuktian Terbalik Untuk Kasus Korupsi: Kajian Antara Hukum Positif Dan Hukum Islam [PDF]

open access: yes, 2013
Korupsi merupakan salah satu kejahatan yang terorganisir dan bersifat lintas batas teritorial (transnasional). Salah satu sebabnya karena pemberantasan korupsi sangat sulit diperangi dalam sistem birokrasi yang koruptif sehingga memerlukan instrumen ...
Yusuf, Y. (Y)
core   +2 more sources

PEMBUKTIAN DALAM PERKARA PERCERAIAN DENGAN ALASAN PERSELISIHAN

open access: yesJurnal Cakrawala Hukum, 2013
Civil Law was public law which was imperative so it tied everyone, especially in investigating witness incourt. It was determined that judge forbade to get witness from blood relative as the base to take decision.However it was not an absolute regulation.
I Gusti Ngurah Adnyana
doaj   +1 more source

The Concept of Rights: Views of Bentham and Khoei [PDF]

open access: yesFaṣlnāmah-i Pizhūhish-i Huqūq-i ̒Umūmī, 2020
The main focus of this research is on the nature and origin of rights. Jeremy Bentham totally rejects the notion of extra-legal rights. For him, it is only legal rights that are valid and imply a benefit for its holders.
Mohammad Rasekh, Mohsen Ghasemi
doaj   +1 more source

Wood identification services in support of legal supply chains: A market study

open access: yesSustainable Futures, 2023
Major wood-importing markets, such as the European Union, the United States of America, and China, have set regulations in place requiring operators to only sell wood-based goods that are sourced and processed in accordance with local laws.
Jo Van Brusselen   +2 more
doaj   +1 more source

Probability on groups and an application to cryptography [PDF]

open access: yesComputer Science Journal of Moldova, 2015
In her thesis, Mosina introduced the concept of {\it mean-set of random (graph-) group-variables} and generalized Strong Law of Large Numbers (SLLN) to (graphs) groups, which she used for cryptanalysis of authentication schemes.
Sidoine Djimnaibeye   +2 more
doaj  

AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems [PDF]

open access: yes, 2017
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services.
Ahamed, Sheikh Iqbal   +2 more
core   +2 more sources

Detection of replay attacks in cyber-physical systems using a frequency-based signature [PDF]

open access: yes, 2019
This paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-physical systems (CPS). In particular, the method employs a sinusoidal signal with a time-varying frequency (authentication signal) into the closed-loop ...
Escobet Canal, Teresa   +5 more
core   +2 more sources

Qualified Electronic Signature – eIDAS Striking Czech Public Sector Bodies

open access: yesActa Universitatis Agriculturae et Silviculturae Mendelianae Brunensis, 2019
Electronic IDentification, Authentication and trust Services (“eIDAS”) is a standardized system for trustworthiness, effectiveness and efficiency. Since 2018, Czech public sector bodies have to use qualified electronic signatures when officially acting ...
Radka MacGregor Pelikánová   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy