Results 51 to 60 of about 3,158,126 (357)
Roadmap on optical security [PDF]
Postprint (author's final ...
Javidi, Bahram +2 more
core +2 more sources
Penerapan Sistem Pembuktian Terbalik Untuk Kasus Korupsi: Kajian Antara Hukum Positif Dan Hukum Islam [PDF]
Korupsi merupakan salah satu kejahatan yang terorganisir dan bersifat lintas batas teritorial (transnasional). Salah satu sebabnya karena pemberantasan korupsi sangat sulit diperangi dalam sistem birokrasi yang koruptif sehingga memerlukan instrumen ...
Yusuf, Y. (Y)
core +2 more sources
AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems [PDF]
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services.
Ahamed, Sheikh Iqbal +2 more
core +3 more sources
PKI Interoperability: Still an Issue? A Solution in the X. 509 Realm [PDF]
There exist many obstacles that slow the global adoption of public key infrastructure (PKI) technology. The PKI interoperability problem, being poorly understood, is one of the most confusing.
A. Martínez-Nadal +7 more
core +2 more sources
Secure SIP authentication scheme supporting lawful interception
ABSTRACTThe session initiation protocol (SIP) is the most widely used signaling protocol for creating, modifying, and terminating multimedia sessions in an Internet Protocol‐based telephony environment. Recently, Arshad et al. proposed an authentication scheme based on elliptic curve cryptosystems for SIP. In this paper, we first show that their scheme
Qiong Pu, Jian Wang, Shuhua Wu
openaire +1 more source
Mean-Set Attack: Cryptanalysis of Sibert et al. Authentication Protocol
We analyze the Sibert et al. group-based (Feige-Fiat-Shamir type) authentication protocol and show that the protocol is not computationally zero-knowledge.
Mosina, Natalia, Ushakov, Alexander
core +1 more source
Authenticity as Best-Self: The Experiences of Women in Law Enforcement
Law enforcement poses a difficult work environment. Employees’ wellbeing is uniquely taxed in coping with daily violent, aggressive and hostile encounters. These challenges are compounded for women, because law enforcement remains to be a male-dominated occupational context.
Rochelle Jacobs, Antoni Barnard
openaire +3 more sources
Qualified Electronic Signature – eIDAS Striking Czech Public Sector Bodies
Electronic IDentification, Authentication and trust Services (“eIDAS”) is a standardized system for trustworthiness, effectiveness and efficiency. Since 2018, Czech public sector bodies have to use qualified electronic signatures when officially acting ...
Radka MacGregor Pelikánová +2 more
doaj +1 more source
Halal is an Arabic term used to describe any components allowed to be used in any products by Muslim communities. Halal food and halal pharmaceuticals are any food and pharmaceuticals which are safe and allowed to be consumed according to Islamic law ...
A. Rohman, A. Windarsih
semanticscholar +1 more source
The COVID-19-crisis has exposed the shortcomings of formal requirements for legal acts which involve the physical presence of others. This is in particular true with regard to last wills which require the physical presence of a notary and/or witnesses ...
J. W. A. Biemans
doaj +1 more source

