Results 31 to 40 of about 23,175 (170)

AUTHENTICATION, TAMPER LOCALIZATION AND RECTIFICATION ALGORITHM WITH PRIVACY PRESERVATION OF IMAGE FOR THE CLOUD USING HMAC

open access: yesICTACT Journal on Image and Video Processing, 2017
Digital images like military, medical and quality control images are increasingly stored over cloud server. These images need protection against attempts to manipulate them since manipulations could tamper the decisions based on these images, many ...
Sayyada Fahmeeda Sultana, D C Shubhangi
doaj   +1 more source

A security architecture for personal networks [PDF]

open access: yes, 2006
Personal Network (PN) is a new concept utilizing pervasive computing to meet the needs of the user. As PNs edge closer towards reality, security becomes an important concern since any vulnerability in the system will limit its practical use.
Heemstra de Groot, Sonia M.   +1 more
core   +2 more sources

Attacks on quantum key distribution protocols that employ non-ITS authentication

open access: yes, 2015
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin   +25 more
core   +1 more source

Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

open access: yesEmitter: International Journal of Engineering Technology, 2016
MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile,
Samsul Huda   +2 more
doaj   +3 more sources

Quantum authentication with unitary coding sets [PDF]

open access: yes, 2002
A general class of authentication schemes for arbitrary quantum messages is proposed. The class is based on the use of sets of unitary quantum operations in both transmission and reception, and on appending a quantum tag to the quantum message used in ...
David J. Santos   +8 more
core   +2 more sources

Watermarking for Relational Database by using Threshold Generator [PDF]

open access: yesEngineering and Technology Journal, 2011
Providing ownership on relational database is a crucial issue in today internet-based application environments and in many content distribution applications.This paper provides the effective watermarking technique to protect valuable numeric relational ...
Bashar Saadoon Mahdi, Yossra H. Ali
doaj   +1 more source

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

open access: yesSensors, 2017
A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area.
Alexandra Rivero-García   +4 more
doaj   +1 more source

Cloud Data Auditing Using Proofs of Retrievability

open access: yes, 2017
Cloud servers offer data outsourcing facility to their clients. A client outsources her data without having any copy at her end. Therefore, she needs a guarantee that her data are not modified by the server which may be malicious.
Ruj, Sushmita, Sengupta, Binanda
core   +1 more source

CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition

open access: yes, 2016
Architectures relying on continuous authentication require a secure way to challenge the user's identity without trusting that the Continuous Authentication Subsystem (CAS) has not been compromised, i.e., that the response to the layer which manages ...
Boult, Terrance E., Rudd, Ethan M.
core   +1 more source

Home - About - Disclaimer - Privacy