نتایج جستجو برای: authentication data structure
تعداد نتایج: 3694940 فیلتر نتایج به سال:
Named Data Networking (NDN) is an implementation of Information-Centric (ICN) that has emerged as a promising candidate for the Future Internet Architecture (FIA). In contrast to traditional networking protocols, NDN’s focus on content, rather than source content. NDN enables name-based routing and location-independent data retrieval, which gives ability support highly dynamic nature mobile net...
Patients go to multiple healthcare providers for treatment, and their health data is generally distributed among providers. The the decentralized care system structure make it ideal blockchain-based information systems. authors consider referral use case; instance, a patient goes his primary Centre (PHC) treatment referred hospital. Authentication usually done using certificates or key cryptogr...
The Cell Line Data Base (CLDB) is a well-known reference information source on human and animal cell lines including information on more than 6000 cell lines. Main biological features are coded according to controlled vocabularies derived from international lists and taxonomies. HyperCLDB (http://bioinformatics.istge.it/hypercldb/) is a hypertext version of CLDB that improves data accessibility...
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for monitoring of these authentication in a distribute...
According to the number of Internet in widely use and the development of the related application, the need of security system which can protect individual information has increased. Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. However, security of biometric data is particularly important as the co...
We present a gesture-based authentication method for mobile devices using acceleration and angular rate data. Using data gathered from 17 test subjects we analyzed how the choice of gesture, classifier, extracted features and dimensionality reduction affects the authentication accuracy. The results enabled us to determine an optimal configuration of these variables for authentication with an ac...
Internet of Things (IoT) is a pervasive environment to interconnect the things like: smart objects, devices etc. in a structure like internet. Things can be interconnected in IoT if these are uniquely addressable and identifiable. Radio Frequency Identification (RFID) is one the important radio frequency based addressing scheme in IoT. Major security challenge in resource constraint RFID networ...
In Named Data Networking (NDN), data is bound with its name through its producer’s public key signature. Secure communication in NDN requires every piece of data to be authenticated. Leaving the data authentication to application developers is error-prone. It is more reasonable to ask application developer to select a pre-defined trust model, and have a security library to automatically set up ...
The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the focus of this paper. In such a biometrics-based cardholder authentication system, sensitive data will typically need to be transferred between the smartcard and the card reader. We propose strategies to ensure integrity of the se...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید