Search

Your search keyword '"Data_MISCELLANEOUS"' showing total 15,954 results

Search Constraints

Start Over You searched for: Descriptor "Data_MISCELLANEOUS" Remove constraint Descriptor: "Data_MISCELLANEOUS" Topic business Remove constraint Topic: business
15,954 results on '"Data_MISCELLANEOUS"'

Search Results

1. Noiseless Privacy: Definition, Guarantees, and Applications

2. A comprehensive survey on the biometric systems based on physiological and behavioural characteristics

3. An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using Index-level Boundary Pattern Convergent Encryption algorithm

4. Theoretical analysis on applications aspects of smart materials preserving the security and privacy in medical big data and cloud

5. Robust image watermarking using the social group optimization algorithm

6. Application of Algorithmic Cognitive Decision Trust Modeling for Cyber Security Within Organisations

7. iMag+: An Accurate and Rapidly Deployable Inertial Magneto-Inductive SLAM System

8. A Survey on Integrity Auditing for Data Storage in the Cloud: From Single Copy to Multiple Replicas

9. Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems

10. (In)secure Acoustic Mobile Authentication

11. A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition

12. Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing

13. Seam Carving based visible watermarking robust to removal attacks

14. Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grids

15. Biometric-based Remote Mutual Authentication Scheme for Mobile Device

16. Joint Pricing and Security Investment in Cloud Security Service Market With User Interdependency

17. Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud

18. Improved l-diversity: Scalable anonymization approach for Privacy Preserving Big Data Publishing

19. A feature adaptive image watermarking framework based on Phase Congruency and Symmetric Key Cryptography

20. BPAF: Blockchain-Enabled Reliable and Privacy-Preserving Authentication for Fog-Based IoT Devices

21. Efficient privacy-preserving data replication in fog-enabled IoT

22. BioSec: A Biometric Authentication Framework for Secure and Private Communication Among Edge Devices in IoT and Industry 4.0

23. Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment

24. U.S. Adult Perspectives on Facial Images, DNA, and Other Biometrics

25. A Comprehensive Trustworthy Data Collection Approach in Sensor-Cloud Systems

26. Multifactor Pattern Implicit Authentication

27. Robust Reversible Watermarking in Encrypted Image With Secure Multi-Party Based on Lightweight Cryptography

28. Fundamentals of Physical Layer Anonymous Communications: Sender Detection and Anonymous Precoding

29. Forbearance: Strategic Nonresponse to Competitive Attacks

30. Trust Based Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks

31. Improving Data Security, Privacy, and Interoperability for the IEEE Biometric Open Protocol Standard

32. A generic framework for deep incremental cancelable template generation

33. The PLUS Multi-Sensor and Longitudinal Fingerprint Dataset: An Initial Quality and Performance Evaluation

34. Secure Cloud Data Deduplication with Efficient Re-Encryption

35. Histograms of oriented mosaic gradients for snapshot spectral image description

36. Trust in financial institutions: A survey

37. Design of a fingerprint template protection scheme using elliptical structures

38. SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment

39. Building a trust model system to avoid cloud services reputation attacks

40. Advanced Watermarking o f Digital Images Showing Robust, Semi Fragile a nd Fragile Behaviour

41. Files Storage & Sharing Platform Using Cloud

42. Privacy-Preserving Fingerprint Authentication Using D-H Key Exchange and Secret Sharing

43. Improving last-mile delivery for e-commerce: the case of Sweden

44. Opportunities and challenges of crowd logistics on the last mile for courier, express and parcel service providers – a literature review

45. POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing

46. Enhanced and secured random number generation for eUASBP

47. Enhancing Packet-Level Wi-Fi Device Authentication Protocol Leveraging Channel State Information

48. Data Privacy Preservation and Trade-off Balance Between Privacy and Utility Using Deep Adaptive Clustering and Elliptic Curve Digital Signature Algorithm

49. Conceptual engineering: when do we need it? How can we do it?

50. Understanding the interrelationship of barriers towards business model re-engineering under the evolving privacy laws: an interpretive Structure Modelling approach

Catalog

Books, media, physical & digital resources