Results 51 to 60 of about 3,158,126 (357)

Roadmap on optical security [PDF]

open access: yes, 2016
Postprint (author's final ...
Javidi, Bahram   +2 more
core   +2 more sources

Penerapan Sistem Pembuktian Terbalik Untuk Kasus Korupsi: Kajian Antara Hukum Positif Dan Hukum Islam [PDF]

open access: yes, 2013
Korupsi merupakan salah satu kejahatan yang terorganisir dan bersifat lintas batas teritorial (transnasional). Salah satu sebabnya karena pemberantasan korupsi sangat sulit diperangi dalam sistem birokrasi yang koruptif sehingga memerlukan instrumen ...
Yusuf, Y. (Y)
core   +2 more sources

AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems [PDF]

open access: yes, 2017
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services.
Ahamed, Sheikh Iqbal   +2 more
core   +3 more sources

PKI Interoperability: Still an Issue? A Solution in the X. 509 Realm [PDF]

open access: yes, 2013
There exist many obstacles that slow the global adoption of public key infrastructure (PKI) technology. The PKI interoperability problem, being poorly understood, is one of the most confusing.
A. Martínez-Nadal   +7 more
core   +2 more sources

Secure SIP authentication scheme supporting lawful interception

open access: yesSecurity and Communication Networks, 2012
ABSTRACTThe session initiation protocol (SIP) is the most widely used signaling protocol for creating, modifying, and terminating multimedia sessions in an Internet Protocol‐based telephony environment. Recently, Arshad et al. proposed an authentication scheme based on elliptic curve cryptosystems for SIP. In this paper, we first show that their scheme
Qiong Pu, Jian Wang, Shuhua Wu
openaire   +1 more source

Mean-Set Attack: Cryptanalysis of Sibert et al. Authentication Protocol

open access: yes, 2010
We analyze the Sibert et al. group-based (Feige-Fiat-Shamir type) authentication protocol and show that the protocol is not computationally zero-knowledge.
Mosina, Natalia, Ushakov, Alexander
core   +1 more source

Authenticity as Best-Self: The Experiences of Women in Law Enforcement

open access: yesFrontiers in Psychology, 2022
Law enforcement poses a difficult work environment. Employees’ wellbeing is uniquely taxed in coping with daily violent, aggressive and hostile encounters. These challenges are compounded for women, because law enforcement remains to be a male-dominated occupational context.
Rochelle Jacobs, Antoni Barnard
openaire   +3 more sources

Qualified Electronic Signature – eIDAS Striking Czech Public Sector Bodies

open access: yesActa Universitatis Agriculturae et Silviculturae Mendelianae Brunensis, 2019
Electronic IDentification, Authentication and trust Services (“eIDAS”) is a standardized system for trustworthiness, effectiveness and efficiency. Since 2018, Czech public sector bodies have to use qualified electronic signatures when officially acting ...
Radka MacGregor Pelikánová   +2 more
doaj   +1 more source

The Application of Molecular Spectroscopy in Combination with Chemometrics for Halal Authentication Analysis: A Review

open access: yesInternational Journal of Molecular Sciences, 2020
Halal is an Arabic term used to describe any components allowed to be used in any products by Muslim communities. Halal food and halal pharmaceuticals are any food and pharmaceuticals which are safe and allowed to be consumed according to Islamic law ...
A. Rohman, A. Windarsih
semanticscholar   +1 more source

Will Requirements for Last Wills Remain as They Are? The ‘Physical Presence Requirement’ of Witnesses and Notaries in the Light of the COVID-19 Interim Measures and the EU Freedom of (Notarial) Services

open access: yesUtrecht Law Review, 2021
The COVID-19-crisis has exposed the shortcomings of formal requirements for legal acts which involve the physical presence of others. This is in particular true with regard to last wills which require the physical presence of a notary and/or witnesses ...
J. W. A. Biemans
doaj   +1 more source

Home - About - Disclaimer - Privacy