نتایج جستجو برای: authentication data structure
تعداد نتایج: 3694940 فیلتر نتایج به سال:
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
today, scouring is one of the important topics in the river and coastal engineering so that the most destruction in the bridges is occurred due to this phenomenon. whereas the bridges are assumed as the most important connecting structures in the communications roads in the country and their importance is doubled while floodwater, thus exact design and maintenance thereof is very crucial. f...
Broadened service based computing in the cloud environment makes nowadays rapid computations easier. The cloud forms the structure for security and authentication mechanism which provides the privacy equipped cloud and storage that concentrates more on biometric authentication services which enhances the provable security in the persistence environment. In this paper the major focussing area is...
Authentication and authorization are two tightly coupled and interrelated concepts which are used to keep transactions secure and help in protecting confidential information. This paper proposes to evaluate the current techniques used for authentication and authorization also compares them with the best practices and universally accepted authentication and authorization methods. Authentication ...
In cryptology, secure channels enable the exchange of messages in a confidential and authenticated manner. The literature of cryptology is rich with proposals and analysis that address the secure communication over public (insecure) channels. In this work, we propose an information theoretically secure direction for the construction of secure channels. First, we propose a method of achieving un...
Research background: In today’s globalised world, there is an increasing need for reliable verification of users’ identity accessing various types information systems. This realised through authentication, which traditionally divided according to the kind identification mark that used: knowledge authentication (e.g., passwords, control questions), object magnetic cards, smart cards) and biometr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید