نتایج جستجو برای: authentication data structure

تعداد نتایج: 3694940  

H. Nasiraee M. Ashouri-Talouki,

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی عمران 1391

today, scouring is one of the important topics in the river and coastal engineering so that the most destruction in the bridges is occurred due to this phenomenon. whereas the bridges are assumed as the most important connecting structures in the communications roads in the country and their importance is doubled while floodwater, thus exact design and maintenance thereof is very crucial. f...

2012
T. Prasath

Broadened service based computing in the cloud environment makes nowadays rapid computations easier. The cloud forms the structure for security and authentication mechanism which provides the privacy equipped cloud and storage that concentrates more on biometric authentication services which enhances the provable security in the persistence environment. In this paper the major focussing area is...

Journal: :CoRR 2010
K. Lakshmi Madhuri T. R. Gopalakrishnan Nair

Authentication and authorization are two tightly coupled and interrelated concepts which are used to keep transactions secure and help in protecting confidential information. This paper proposes to evaluate the current techniques used for authentication and authorization also compares them with the best practices and universally accepted authentication and authorization methods. Authentication ...

Journal: :J. UCS 2009
Basel Alomair Radha Poovendran

In cryptology, secure channels enable the exchange of messages in a confidential and authenticated manner. The literature of cryptology is rich with proposals and analysis that address the secure communication over public (insecure) channels. In this work, we propose an information theoretically secure direction for the construction of secure channels. First, we propose a method of achieving un...

Journal: :International Journal for Information Security Research 2017

Journal: :International Journal of Computer Applications 2015

Journal: :AL-Rafidain Journal of Computer Sciences and Mathematics 2012

Journal: :SHS web of conferences 2021

Research background: In today’s globalised world, there is an increasing need for reliable verification of users’ identity accessing various types information systems. This realised through authentication, which traditionally divided according to the kind identification mark that used: knowledge authentication (e.g., passwords, control questions), object magnetic cards, smart cards) and biometr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید