A new one time password mechanism for client-server applications
Abstract OTP (One Time Passwords) are very important in today's scenario in various
applications like in financial transactions, e-commerce etc. They are used for enhancing the …
applications like in financial transactions, e-commerce etc. They are used for enhancing the …
Security and privacy issues of electronic healthcare system: a survey
A Singh, K Chatterjee - Journal of Information and Optimization …, 2019 - Taylor & Francis
In today's digital environment, the paper-based healthcare system shifts towards the
Electronic Healthcare System (EHS). The EHS features will allow its user to access the …
Electronic Healthcare System (EHS). The EHS features will allow its user to access the …
Machine learning based MAC protocol design for pipeline leakage detection in smart city project
The integration of WSN with IoT is growing exponentially for implementing real time
applications in today's world. Also an Intelligent WSN design is required for implementing …
applications in today's world. Also an Intelligent WSN design is required for implementing …
MultiStage Authentication to Enhance Security of Virtual Machines in Cloud Environment
HM Anitha, P Jayarekha - International Journal of Advanced …, 2021 - search.proquest.com
The adoption of cloud computing in different areas has shown benefits and given solutions
to applications. The cloud provider offers virtualized platforms through virtual machines for …
to applications. The cloud provider offers virtualized platforms through virtual machines for …
Multi-Factor Biometrics for Enhanced User Authentication in an E-Health System, Ghana
For most existing computer systems, once the user's identity is verified at login, the system
resources are available to that user until he/she exits the system. In high-risk environments …
resources are available to that user until he/she exits the system. In high-risk environments …
An improved (T-DelPHI) for efficient and secure routing in MANETs
N Singh, A Singh - International Journal of Information Systems & …, 2019 - papers.ssrn.com
In this paper a novel protocol T-DelPHI has been designed with reference to paper. A
wormhole attack is one of the harmful attacks in ad hoc network within routing of packets …
wormhole attack is one of the harmful attacks in ad hoc network within routing of packets …
[PDF][PDF] Comprehensive analysis of continuous authentication for mobile devices
Continuous mobile authentication is an imperative aspect of ensuring the security and
privacy of data in the contemporary mobile computing landscape. With the proliferation of …
privacy of data in the contemporary mobile computing landscape. With the proliferation of …