• No results found

Secure Digital (SD).

Secure Digital Profile ID Management System

Secure Digital Profile ID Management System

... Abstract: Secure Digital Profile ID Management System(SDPIDMS) is a System for Effective Distribution and Utilization of ...a digital identification system that is comprehensively used by a ...

5

COMBINE VISIBLE AND INVISIBLE SECURE DIGITAL MESSAGE

COMBINE VISIBLE AND INVISIBLE SECURE DIGITAL MESSAGE

... The digital watermarking is used to protect the intellectual property rights in the multimedia ...in digital multimedia data such as video, image or audio, invisible information related to its ...the ...

5

Secure digital voting system based on blockchain technology

Secure digital voting system based on blockchain technology

... In order to protect the anonymity and integrity of a vote, the system generates strong cryptographic hash for each vote transaction based on information specific to a voter.. This hash[r] ...

12

A SECURE DIGITAL STEGANOGRAPHY BASED ON DISCRETE WAVALET TRANSFORM

A SECURE DIGITAL STEGANOGRAPHY BASED ON DISCRETE WAVALET TRANSFORM

... of digital image, where (x, y) is the location coordinates of the original image pixels and (x‟, y‟) is the location coordinates of image pixels that after ...

10

On Secure Digital Image Watermarking Techniques

On Secure Digital Image Watermarking Techniques

... The DCT Transform: The discrete cosine transform is a transformation technique based on digital water- marking algorithm and spatial domain technique. The discrete cosine transform is derived from discrete Fourier ...

16

Electronic Certificates in E-Learning System

Electronic Certificates in E-Learning System

... Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the ...issues. Digital Signature Algorithm (DSA) is based on discrete ...

6

BIOMETRIC ENCRYPTION

BIOMETRIC ENCRYPTION

... For some other biometric types, different considerations may modify the algorithm. For example, images of the iris or retina can easily be aligned using the center of the eye’s pupil as a reference point. Thus, for these ...

8

Spimes Not Things:A Design Manifesto For A Sustainable Internet Of Things

Spimes Not Things:A Design Manifesto For A Sustainable Internet Of Things

... highly secure yet publicly distributed ledger of transactions which have been verified across a peer-to-peer (P2P) network which typically consists of many ...

24

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

... Elliptic curve cryptography is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields [55]. ECC is a method based on the discrete logarithm problem over the points ...

18

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

... In low-power digital design, especially in shift registers, flip-flops (FF) plays a significant role. In shift registers, the power consumption of system clock is estimated to be half of the overall system power. ...

12

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

... ABSTRACT This paper taught the performance of the proposed sensing models, namely, constant false alarm ratedynamic waveform detector CFAR-DWD are categorized as dynamic threshold DT, tw[r] ...

19

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

... However, the multidisciplinary aspect of the product as well as UML AD gaps in term of business process modeling, described in the paragraph comparing UML and BPMN modeling, favors, when[r] ...

12

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

... The final overall result analyzed using correlation method in order to evaluate the association between identified attributes in the house breaking crime reports shows that data in 2011 [r] ...

7

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

... Major innovations of the proposed architecture includes taking advantage of ontology for retrieving explicit knowledge, quality enhancement of KF by dynamic KF network generation, suppor[r] ...

11

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

... Different data mining techniques such as Naive Bayes, Decision Tree, Linear Regression and Association Rule are used to predict the heart disease.. Data mining techniques in all disease [r] ...

7

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

... For protecting data in databases, one has to distinguish two security goals: general attributes, confident attributes, for example., personal data, sensitive authentication data. For protecting data in databases, we can ...

6

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

... There are many things or parameters that should be putted in consideration before starting the design of microstrip patch antenna, like the length L, width W and the thickness h of the p[r] ...

5

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

... This paper presents a new framework for a semantic-enhanced Web Page Recommendation WPR, and a suite of enabling techniques which include semantic network models of domain knowledge and [r] ...

6

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

... Architecture Loose Tight Coupling Coupling Medium level of High level of difficulty difficulty Higher Low compared of tight coupling Permits Generally requires both networks to be indepe[r] ...

10

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE

... the digital signature verification must be introduced to implement the requirements of the mandatory digital signature of all the applications installed in the system, as well as requirements to limit ...

12

Show all 10000 documents...

Related subjects