Showing Results for
- Academic Journals (162)
Search Results
- 162
Academic Journals
- 162
-
From:Qualitative Inquiry (Vol. 3, Issue 1) Peer-ReviewedA number of variables can be monitored to ensure that the complex process of constructive inquiry by social scientists will produce authentic data. Variables include assumptions of the researcher, knowledge of...
-
From:International Journal of Distributed Sensor Networks (Vol. 2016) Peer-ReviewedDevice-to-Device (D2D) communication enables devices in proximity to establish a wireless direct link. However, these devices may be severely constrained in terms of memory, CPU, and processing resources. Hence, a D2D...
-
From:Mathematical Problems in EngineeringPeer-ReviewedA novel biometric authentication information hiding method based on the sparse representation is proposed for enhancing the security of biometric information transmitted in the network. In order to make good use of...
-
From:Information Technology and Libraries (Vol. 34, Issue 2) Peer-ReviewedThe clash of principles between protecting privacy and protecting security can create an impasse between libraries, campus IT departments, and academic administration over authentication issues with the public area PCs...
-
From:Informatica (Vol. 37, Issue 2) Peer-ReviewedCloud computing is a recently developed technology for complex systems with services sharing among various registered users. Therefore, proper mutual authentication is needed between users and cloud server prior to...
-
From:Government Computer News (Vol. 25, Issue 15)FOR CLAUDIO CASUCCIO, director of General Dynamics Corp.'s business development unit in Rome, posing for an identification card photograph is not worrisome. But ask him to offer his finger or palm for a biometric vein...
-
From:Financial Executive (Vol. 17, Issue 4) Peer-ReviewediShopSecure Inc. has released a new real-time payer authentication solution, Transact-SecureOE. This product will assure e-commerce merchants that persons making purchases are who they say they are, and that they are...
-
From:Government Computer News (Vol. 26, Issue 5)Face it: authentication is a bear. Any scheme simple enough to implement easily is probably too weak. More secure schemes and additional factors inevitably lead to problems with scalability and management. So, are we...
-
From:Journal of Accountancy (Vol. 230, Issue 3)Q With all the cybersecurity threats in the world, I am concerned my company isn't doing everything we can to protect ourselves. What should we be doing? A. I hear it on a weekly basis, "We take cybersecurity very...
-
From:International Journal of Distributed Sensor Networks (Vol. 2014) Peer-ReviewedWireless sensor Networks (WSNs) deployed in distributed Internet of Things (IoT) applications should be integrated into the Internet. According to the distributed architecture, sensor nodes measure data, process,...
-
From:Information Management Journal (Vol. 41, Issue 5) Peer-ReviewedProving the authenticity of records is of great concern to information and records managers. While this concern initially involved the integrity of paper-based records, today it extends to include records in digital...
-
From:International Journal of Distributed Sensor Networks (Vol. 2015) Peer-ReviewedRFID is one of the most protuberant systems in the field of ubiquitous computing. Since RFID tags have limited computation capabilities, numerous ultralightweight authentication protocols have been proposed to provide...
-
From:Government Computer News (Vol. 23, Issue 19)Five agencies will receive funds to attempt nailing down a security architecture for e-government transactions. The departments of Health and Human Services, Treasury and Veterans Affairs, and the Environmental...
-
From:Journal of Accountancy (Vol. 223, Issue 6)The JofA's sixth annual technology roundtable hit on some familiar topics this year: cybersecurity, cloud computing, the importance of proper technology training for staff. It also dived into a few topics that have...
-
From:symploke (Vol. 17, Issue 1-2) Peer-ReviewedLet me cite: in a posthumous fragment, Sigmund Freud writes, "Psyche is extended; knows nothing about it" (1964, 300). Let me state: I write away, as in wear away, one drifting piece of our inconceivable inhabitation...
-
From:International Journal of Distributed Sensor Networks (Vol. 2014) Peer-ReviewedAs smart phones are becoming widely used, a variety of services to store and use important information such as photos and financial information are now provided. User authentication to protect this information is...
-
From:Mathematical Problems in Engineering (Vol. 2021) Peer-ReviewedUbiquitous Internet of Things includes criteria, applications, and technologies for providing standard data. The system can be used to establish a comprehensive data database to facilitate people to better analyze,...
-
From:Advances in Natural and Applied Sciences (Vol. 10, Issue 2) Peer-ReviewedBiometric multiserver authentication system is a system which uses fingerprint data to authenticate the user. The fingerprint is one of the most widely used biometric authentication for server based architecture. To...
-
From:Issues in Informing Science & Information Technology (Vol. 7) Peer-ReviewedThe proliferation of user credentials for system access coupled with the resulting rising security threats have led to the development of single sign-on (SSO) access control and multi-factor authentication (MFA)...
-
From:Indian Journal of Scientific ResearchPeer-ReviewedMulticast is an efficient method to deliver data to a large group of users. To prevent disclosure of distributed data to unauthorized users, multicast-based applications require confidential group communication, which...