Results 31 to 40 of about 4,209 (267)
Probability on groups and an application to cryptography [PDF]
In her thesis, Mosina introduced the concept of {\it mean-set of random (graph-) group-variables} and generalized Strong Law of Large Numbers (SLLN) to (graphs) groups, which she used for cryptanalysis of authentication schemes.
Sidoine Djimnaibeye +2 more
doaj
Wood identification services in support of legal supply chains: A market study
Major wood-importing markets, such as the European Union, the United States of America, and China, have set regulations in place requiring operators to only sell wood-based goods that are sourced and processed in accordance with local laws.
Jo Van Brusselen +2 more
doaj +1 more source
The Concept of Rights: Views of Bentham and Khoei [PDF]
The main focus of this research is on the nature and origin of rights. Jeremy Bentham totally rejects the notion of extra-legal rights. For him, it is only legal rights that are valid and imply a benefit for its holders.
Mohammad Rasekh, Mohsen Ghasemi
doaj +1 more source
Secure SIP authentication scheme supporting lawful interception
ABSTRACTThe session initiation protocol (SIP) is the most widely used signaling protocol for creating, modifying, and terminating multimedia sessions in an Internet Protocol‐based telephony environment. Recently, Arshad et al. proposed an authentication scheme based on elliptic curve cryptosystems for SIP. In this paper, we first show that their scheme
Qiong Pu, Jian Wang, Shuhua Wu
openaire +1 more source
Qualified Electronic Signature – eIDAS Striking Czech Public Sector Bodies
Electronic IDentification, Authentication and trust Services (“eIDAS”) is a standardized system for trustworthiness, effectiveness and efficiency. Since 2018, Czech public sector bodies have to use qualified electronic signatures when officially acting ...
Radka MacGregor Pelikánová +2 more
doaj +1 more source
Authenticity as Best-Self: The Experiences of Women in Law Enforcement
Law enforcement poses a difficult work environment. Employees’ wellbeing is uniquely taxed in coping with daily violent, aggressive and hostile encounters. These challenges are compounded for women, because law enforcement remains to be a male-dominated occupational context.
Rochelle Jacobs, Antoni Barnard
openaire +3 more sources
A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data
Despite significant advancements in fingerprint-based authentication, existing models still suffer from challenges such as high false acceptance and rejection rates, computational inefficiency, and vulnerability to spoofing attacks.
Abdulrahman Hussian +3 more
doaj +1 more source
Fragile and blind watermarking technique based on Weber's law for medical image authentication
In developing countries such as India, transmission of medical images over the network is essential for providing health services to rural/remote population. During this transmission, a small distortion in the medical image may lead to wrong conclusions.
Ekta Walia, Anu Suneja
doaj +1 more source
LDAcoop: Integrating non‐linear population dynamics into the analysis of clonogenic growth in vitro
Limiting dilution assays (LDAs) quantify clonogenic growth by seeding serial dilutions of cells and scoring wells for colony formation. The fraction of negative wells is plotted against cells seeded and analyzed using the non‐linear modeling of LDAcoop.
Nikko Brix +13 more
wiley +1 more source
The complexity of law enforcement in online trading fraud cases poses significant challenges. Sellers can carry out fraudulent activities through product counterfeiting or making transactions outside of e-commerce platforms, while buyers can commit fraud
Anton Satila +4 more
doaj +1 more source

