Results 31 to 40 of about 386,205 (300)

Guarantee of Protection of Electronic Land Certificates as Proof of Ownership of Land Rights

open access: yesIndonesia Law Reform Journal, 2023
Changes in information technology have an impact on the public service system, especially in the land sector which is experiencing a transition from Analog Certificates to Electronic Certificates which raises several challenges, one of which is in the ...
Akbar Ramadhan Nugroho   +2 more
doaj   +1 more source

A Cloud Authentication Protocol using One-Time Pad [PDF]

open access: yes, 2016
There is a significant increase in the amount of data breaches in corporate servers in the cloud environments. This includes username and password compromise in the cloud and account hijacking, thus leading to severe vulnerabilities of the cloud ...
Aung, Khin Mi Mi   +3 more
core   +1 more source

SIGNED: Smart cIty diGital twiN vErifiable Data Framework

open access: yesIEEE Access, 2023
Smart city digital twins can provide useful insights by making effective use of multidisciplinary urban data from diverse sources. Whilst these insights provide new information that helps cities in decision making, verifying the authenticity, integrity ...
Zeeshan Pervez   +3 more
doaj   +1 more source

Kekuatan Hukum GRONDKAART dan Problematikanya di Indonesia

open access: yesAl-Manhaj, 2022
Land tenure and use according to land law in Indonesia must be based on Land Rights. Land rights will give authority to the right holder to control and use the land. Grondkaart is proof of land ownership owned by PT.
Farida Sekti Pahlevi
doaj   +1 more source

Ambiguity attacks on robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition

open access: yesJournal of Electrical Systems and Information Technology, 2017
Among emergent applications of digital watermarking are copyright protection and proof of ownership. Recently, Makbol and Khoo (2013) have proposed for these applications a new robust blind image watermarking scheme based on the redundant discrete ...
Khaled Loukhaoukha   +2 more
doaj   +1 more source

A perspective on specifying and verifying concurrent modules [PDF]

open access: yes, 2018
The specification of a concurrent program module, and the verification of implementations and clients with respect to such a specification, are difficult problems.
Da Rocha Pinto, P   +2 more
core   +1 more source

Dispute Resistance Multilayered RFID Partial Ownership Transfer With Blockchain

open access: yesIEEE Access, 2022
Frontend supply chains involve the transfer of large quantities of products. Therefore, incomplete transfer and product loss are inevitable. This paper presents a high-efficiency group ownership transfer protocol that incorporates blockchains to enable ...
Ming-Hour Yang, Yu-Shan Hsu, Hung-Yu Ko
doaj   +1 more source

Provenance Threat Modeling

open access: yes, 2017
Provenance systems are used to capture history metadata, applications include ownership attribution and determining the quality of a particular data set.
Brooks, Richard R.   +5 more
core   +1 more source

Multilateral Transparency for Security Markets Through DLT [PDF]

open access: yes, 2020
For decades, changing technology and policy choices have worked to fragment securities markets, rendering them so dark that neither ownership nor real-time price of securities are generally visible to all parties multilaterally.
Donald, David C., Miraz, Mahdi H.
core   +1 more source

PROBLEM OF LAND OWNERSHIP CERTIFICATES AS LEGAL PROOF OF OWNERSHIP

open access: yesProblematika Hukum
<p>Agrarian is the natural resource that humans need most, as a place to live and develop land resources. This development aims to achieve shared prosperity. maintain collective order and guarantee every community's rights in every region. So it is necessary to regulate in law a policy that determines land ownership according to the rights of ...
Frina Debora   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy