Search

Your search keyword '"Data_MISCELLANEOUS"' showing total 16,181 results

Search Constraints

Start Over You searched for: Descriptor "Data_MISCELLANEOUS" Remove constraint Descriptor: "Data_MISCELLANEOUS" Topic computer science Remove constraint Topic: computer science
16,181 results on '"Data_MISCELLANEOUS"'

Search Results

1. Noiseless Privacy: Definition, Guarantees, and Applications

2. A comprehensive survey on the biometric systems based on physiological and behavioural characteristics

3. An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using Index-level Boundary Pattern Convergent Encryption algorithm

4. Theoretical analysis on applications aspects of smart materials preserving the security and privacy in medical big data and cloud

5. Robust image watermarking using the social group optimization algorithm

6. Application of Algorithmic Cognitive Decision Trust Modeling for Cyber Security Within Organisations

7. iMag+: An Accurate and Rapidly Deployable Inertial Magneto-Inductive SLAM System

8. A Survey on Integrity Auditing for Data Storage in the Cloud: From Single Copy to Multiple Replicas

9. Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems

10. (In)secure Acoustic Mobile Authentication

11. PrivFace: Fast Privacy-Preserving Face Authentication With Revocable and Reusable Biometric Credentials

12. A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition

13. Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing

14. Seam Carving based visible watermarking robust to removal attacks

15. Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grids

16. Real-Time Performance-Focused Localization Techniques for Autonomous Vehicle: A Review

17. Biometric-based Remote Mutual Authentication Scheme for Mobile Device

18. Joint Pricing and Security Investment in Cloud Security Service Market With User Interdependency

19. Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud

20. Improved l-diversity: Scalable anonymization approach for Privacy Preserving Big Data Publishing

21. A feature adaptive image watermarking framework based on Phase Congruency and Symmetric Key Cryptography

22. BPAF: Blockchain-Enabled Reliable and Privacy-Preserving Authentication for Fog-Based IoT Devices

23. Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking

24. Efficient privacy-preserving data replication in fog-enabled IoT

25. BioSec: A Biometric Authentication Framework for Secure and Private Communication Among Edge Devices in IoT and Industry 4.0

26. Functional Brain Networks Underlying Auditory Saliency During Naturalistic Listening Experience

27. Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment

28. A Comprehensive Trustworthy Data Collection Approach in Sensor-Cloud Systems

29. Multifactor Pattern Implicit Authentication

30. Robust Reversible Watermarking in Encrypted Image With Secure Multi-Party Based on Lightweight Cryptography

31. Fundamentals of Physical Layer Anonymous Communications: Sender Detection and Anonymous Precoding

32. Trust Based Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks

33. Improving Data Security, Privacy, and Interoperability for the IEEE Biometric Open Protocol Standard

34. A generic framework for deep incremental cancelable template generation

35. The PLUS Multi-Sensor and Longitudinal Fingerprint Dataset: An Initial Quality and Performance Evaluation

36. Secure Cloud Data Deduplication with Efficient Re-Encryption

37. Histograms of oriented mosaic gradients for snapshot spectral image description

38. Understanding the effects of conceptual and analytical choices on ‘finding’ the privacy paradox:A specification curve analysis of large-scale survey data

39. Design of a fingerprint template protection scheme using elliptical structures

40. FinPAD: State-of-the-art of fingerprint presentation attack detection mechanisms, taxonomy and future perspectives

41. Fingerprint pre-processing and feature engineering to enhance agricultural products categorization

42. A DCT Fractional Bit Replacement Based Dual Watermarking Algorithm for Image Authentication

43. SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment

44. Building a trust model system to avoid cloud services reputation attacks

45. Replica Selection Algorithm in Data Grids: the Best-Fit Approach

46. Files Storage & Sharing Platform Using Cloud

47. Privacy-Preserving Fingerprint Authentication Using D-H Key Exchange and Secret Sharing

48. POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing

49. Enhanced and secured random number generation for eUASBP

50. Enhancing Packet-Level Wi-Fi Device Authentication Protocol Leveraging Channel State Information

Catalog

Books, media, physical & digital resources