A Novel Approach to Strengthening Web-Based Cloud Services: Two-Factor Access Control
PK Kumar, C Raghavendra, R Dodda… - E3S Web of …, 2024 - e3s-conferences.org
In this paper we introduce a recent and evolved two-factor authentication (2FA) access
govern system specially designed for webbased cloud computing services. Our innovative …
govern system specially designed for webbased cloud computing services. Our innovative …
[HTML][HTML] The Impact of an Automation System Built with Jenkins on the Efficiency of Container-Based System Deployment
G Hyun, J Oak, D Kim, K Kim - Sensors (Basel, Switzerland), 2024 - pmc.ncbi.nlm.nih.gov
This paper evaluated deployment efficiency by comparing manual deployment with
automated deployment through a CI/CD pipeline using Jenkins. This study involved moving …
automated deployment through a CI/CD pipeline using Jenkins. This study involved moving …
Evaluation of the Sequence Stratigraphy and Sedimentary Environment of the Asmari Formation in the Southwest of Iran:(Case Study of Gurpi and Asmari Anticlines …
N Varnasseri, D Jahani, NK Ghadimvand… - Doklady Earth …, 2024 - Springer
The aim of this study is to examine the Asmari Formation from the Oligo-Miocene epoch, an
important reservoir formation in Iran. To facilitate a comprehensive comparison of lithological …
important reservoir formation in Iran. To facilitate a comprehensive comparison of lithological …
Privacy preserving security using multi‐key homomorphic encryption for face recognition
J Wang, R Xin, O Alfarraj, A Tolba, Q Tang - Expert Systems - Wiley Online Library
Recently, face recognition based on homomorphic encryption for privacy preservation has
garnered significant attention. However, there are two major challenges with homomorphic …
garnered significant attention. However, there are two major challenges with homomorphic …
[HTML][HTML] ArticlesA Privacy-Preserving Local Differential Privacy-Based Federated Learning Model to Secure LLM from Adversarial Attacks
Chatbot applications using large language models (LLMs) offer human-like responses to
user queries, but their widespread use raises significant concerns about data privacy and …
user queries, but their widespread use raises significant concerns about data privacy and …
[HTML][HTML] ArticlesFusion of Digital Twin and Blockchain for Secure and Efficient IoV Networks
NB Ha, YS Jeong - hcisj.com
The emergence of digital twin technology has spurred numerous endeavors to construct
smart cities while simultaneously driving the development of smart cars that boast enhanced …
smart cities while simultaneously driving the development of smart cars that boast enhanced …
[PDF][PDF] Automation Techniques for Efficient Container Image Management in CI/CD Pipelines
V Marella - researchgate.net
With the advent of cloud computing, things became easier and the infrastructure was moved
from on premises to the cloud, making on-demand access to resources just a few clicks …
from on premises to the cloud, making on-demand access to resources just a few clicks …