Sökt på: Sökresultat
totalt 17 träffar
Data Security in Cloud Computing
Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guaranteed quality of service among …
Artificial Intelligence for Biometrics and Cybersecurity
The integration of new technologies is resulting in an increased demand for security and authentication in all types of data communications. Cybersecurity is the protection of …
Authentication Technologies for Cloud Computing, IoT and Big Data
Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from …
Hand-Based Biometrics
Hand-based biometrics identifies users by unique features in their hands, such as fingerprints, palmprints, hand geometry, and finger and palm vein patterns. This book explores the …
Blockchain Technology for Secure Social Media Computing
Blockchain is a digital ledger of transactions duplicated and distributed across an entire network of computer systems on the blockchain which makes it more difficult to hack or …
Physical Layer Security for Wireless Sensing and Communication
Wireless physical layer (PHY) security has attracted much attention due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping, jamming, and …
User-Centric Privacy and Security in Biometrics
The interplay of privacy, security and user-determination is an important consideration in the roll-out of biometric technologies. It brings into play requirements such as privacy …
Privacy by Design for the Internet of Things
Privacy by design is a proactive approach that promotes privacy and data protection compliance throughout project lifecycles when storing or accessing personal data. Privacy by …
Proof-of-Stake for Blockchain Networks
A consensus mechanism is the core component of a blockchain network, which ensures that every participant agrees on the state of the network in trustless environments. Until now, …
Iris and Periocular Biometric Recognition
Iris recognition technologies for identity management are already deployed globally in several large-scale nationwide biometric projects and are currently entering the mobile …
Security and Privacy Schemes for Dense 6G Wireless Communication Networks
Fifth generation (5G) wireless networks are now commercialized, and the research focus has shifted towards sixth generation (6G) wireless systems. The integration of sensor nodes …
Mobile Biometrics
Mobile biometrics - the use of physical and/or behavioral characteristics of humans to allow their recognition by mobile/smart phones - aims to achieve conventional functionality …