Results 21 to 30 of about 80,103 (295)

Probability on groups and an application to cryptography [PDF]

open access: yesComputer Science Journal of Moldova, 2015
In her thesis, Mosina introduced the concept of {\it mean-set of random (graph-) group-variables} and generalized Strong Law of Large Numbers (SLLN) to (graphs) groups, which she used for cryptanalysis of authentication schemes.
Sidoine Djimnaibeye   +2 more
doaj  

PEMBUKTIAN DALAM PERKARA PERCERAIAN DENGAN ALASAN PERSELISIHAN

open access: yesJurnal Cakrawala Hukum, 2013
Civil Law was public law which was imperative so it tied everyone, especially in investigating witness incourt. It was determined that judge forbade to get witness from blood relative as the base to take decision.However it was not an absolute regulation.
I Gusti Ngurah Adnyana
doaj   +1 more source

Protection of personal data under martial law in Ukraine

open access: yesLaw and Safety, 2023
The article is devoted to the issue of personal data protection under martial law in Ukraine. A detailed study of this issue has been carried out, aspects of the regulatory environment and levels of personal data protection in such difficult conditions ...
V. A. Svitlychnyi
doaj   +1 more source

Nudging folks towards stronger password choices:providing certainty is the key [PDF]

open access: yes, 2018
Persuading people to choose strong passwords is challenging. One way to influence password strength, as and when people are making the choice, is to tweak the choice architecture to encourage stronger choice.
Renaud, Karen, Zimmerman, Vera
core   +4 more sources

Roadmap on optical security [PDF]

open access: yes, 2016
Postprint (author's final ...
Javidi, Bahram   +2 more
core   +2 more sources

Mean-Set Attack: Cryptanalysis of Sibert et al. Authentication Protocol

open access: yes, 2010
We analyze the Sibert et al. group-based (Feige-Fiat-Shamir type) authentication protocol and show that the protocol is not computationally zero-knowledge.
Mosina, Natalia, Ushakov, Alexander
core   +1 more source

KALwEN: a new practical and interoperable key management scheme for body sensor networks [PDF]

open access: yes, 2010
Key management is the pillar of a security architecture. Body sensor networks (BSNs) pose several challenges–some inherited from wireless sensor networks (WSNs), some unique to themselves–that require a new key management scheme to be tailor-made.
Gong, Zheng   +4 more
core   +3 more sources

The Criminal Law Behind Digital Fingerprints: Biometric Data Protection in Modern Security Systems [PDF]

open access: yesE3S Web of Conferences
Biometric data, such as fingerprints, facial recognition, retina scans, and voice scans, constitute unique and irreplaceable forms of personal identification.
Yuliartini Ni Putu Rai   +2 more
doaj   +1 more source

Biometric Identification by Fingerprint Image Based Minutiae Detection [PDF]

open access: yesمجلة التربية والعلم, 2009
In an increasingly digital world, reliable personal authentication has become an important human computer interface application, some examples where establishing a person’s identity.
Israa Mohamed Khidher
doaj   +1 more source

Secure SIP authentication scheme supporting lawful interception

open access: yesSecurity and Communication Networks, 2012
ABSTRACTThe session initiation protocol (SIP) is the most widely used signaling protocol for creating, modifying, and terminating multimedia sessions in an Internet Protocol‐based telephony environment. Recently, Arshad et al. proposed an authentication scheme based on elliptic curve cryptosystems for SIP. In this paper, we first show that their scheme
Qiong Pu, Jian Wang, Shuhua Wu
openaire   +1 more source

Home - About - Disclaimer - Privacy