Results 31 to 40 of about 4,209 (267)

Probability on groups and an application to cryptography [PDF]

open access: yesComputer Science Journal of Moldova, 2015
In her thesis, Mosina introduced the concept of {\it mean-set of random (graph-) group-variables} and generalized Strong Law of Large Numbers (SLLN) to (graphs) groups, which she used for cryptanalysis of authentication schemes.
Sidoine Djimnaibeye   +2 more
doaj  

Wood identification services in support of legal supply chains: A market study

open access: yesSustainable Futures, 2023
Major wood-importing markets, such as the European Union, the United States of America, and China, have set regulations in place requiring operators to only sell wood-based goods that are sourced and processed in accordance with local laws.
Jo Van Brusselen   +2 more
doaj   +1 more source

The Concept of Rights: Views of Bentham and Khoei [PDF]

open access: yesFaṣlnāmah-i Pizhūhish-i Huqūq-i ̒Umūmī, 2020
The main focus of this research is on the nature and origin of rights. Jeremy Bentham totally rejects the notion of extra-legal rights. For him, it is only legal rights that are valid and imply a benefit for its holders.
Mohammad Rasekh, Mohsen Ghasemi
doaj   +1 more source

Secure SIP authentication scheme supporting lawful interception

open access: yesSecurity and Communication Networks, 2012
ABSTRACTThe session initiation protocol (SIP) is the most widely used signaling protocol for creating, modifying, and terminating multimedia sessions in an Internet Protocol‐based telephony environment. Recently, Arshad et al. proposed an authentication scheme based on elliptic curve cryptosystems for SIP. In this paper, we first show that their scheme
Qiong Pu, Jian Wang, Shuhua Wu
openaire   +1 more source

Qualified Electronic Signature – eIDAS Striking Czech Public Sector Bodies

open access: yesActa Universitatis Agriculturae et Silviculturae Mendelianae Brunensis, 2019
Electronic IDentification, Authentication and trust Services (“eIDAS”) is a standardized system for trustworthiness, effectiveness and efficiency. Since 2018, Czech public sector bodies have to use qualified electronic signatures when officially acting ...
Radka MacGregor Pelikánová   +2 more
doaj   +1 more source

Authenticity as Best-Self: The Experiences of Women in Law Enforcement

open access: yesFrontiers in Psychology, 2022
Law enforcement poses a difficult work environment. Employees’ wellbeing is uniquely taxed in coping with daily violent, aggressive and hostile encounters. These challenges are compounded for women, because law enforcement remains to be a male-dominated occupational context.
Rochelle Jacobs, Antoni Barnard
openaire   +3 more sources

A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data

open access: yesComputers
Despite significant advancements in fingerprint-based authentication, existing models still suffer from challenges such as high false acceptance and rejection rates, computational inefficiency, and vulnerability to spoofing attacks.
Abdulrahman Hussian   +3 more
doaj   +1 more source

Fragile and blind watermarking technique based on Weber's law for medical image authentication

open access: yesIET Computer Vision, 2013
In developing countries such as India, transmission of medical images over the network is essential for providing health services to rural/remote population. During this transmission, a small distortion in the medical image may lead to wrong conclusions.
Ekta Walia, Anu Suneja
doaj   +1 more source

LDAcoop: Integrating non‐linear population dynamics into the analysis of clonogenic growth in vitro

open access: yesMolecular Oncology, EarlyView.
Limiting dilution assays (LDAs) quantify clonogenic growth by seeding serial dilutions of cells and scoring wells for colony formation. The fraction of negative wells is plotted against cells seeded and analyzed using the non‐linear modeling of LDAcoop.
Nikko Brix   +13 more
wiley   +1 more source

The Urgency of identity verification and safeguarding personal information during online transactions

open access: yesLaw and Justice
The complexity of law enforcement in online trading fraud cases poses significant challenges. Sellers can carry out fraudulent activities through product counterfeiting or making transactions outside of e-commerce platforms, while buyers can commit fraud
Anton Satila   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy