Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Abhijit Kumar Nag"'
Autor:
Md Manjurul Ahsan, Kishor Datta Gupta, Abhijit Kumar Nag, Subash Poudyal, Abbas Z. Kouzani, M. A. Parvez Mahmud
Publikováno v:
IEEE Access, Vol 8, Pp 180799-180814 (2020)
Cloud computing gained much popularity in the recent past due to its many internet-based services related to data, application, operating system, and eliminating the need for central hardware access. Many of the challenges associated with cloud compu
Externí odkaz:
https://doaj.org/article/074c22192b0c4c81b5e25a872d1b2239
Autor:
Abhijit Kumar Nag
Publikováno v:
Journal of Systemics, Cybernetics and Informatics, Vol 17, Iss 4, Pp 37-42 (2019)
User identity is a critical part to secure the legitimate access of authentication to protect his personal sensitive information. In recent years, computational intelligence (CI) plays a significant role to innovate various authentication approaches
Externí odkaz:
https://doaj.org/article/b5bc2dbcfde347f7a60045421ea00444
Publikováno v:
International Journal of Smart Education and Urban Society. 13:1-14
To address cybersecurity threats that organizations are facing today, there is an urgent need for an interdisciplinary approach in educational programming to prepare the next generation of indispensable workers who are often dispersed, such as law en
Publikováno v:
IT Professional. 23:50-55
Digital currency is primarily designed on problems that are computationally hard to solve using traditional computing techniques. However, these problems are now vulnerable due to the computational power of quantum computing. For the postquantum comp
Autor:
Abbas Z. Kouzani, Abhijit Kumar Nag, Manjurul Ahsan, Subash Poudyal, M. A. Parvez Mahmud, Kishor Datta Gupta
Publikováno v:
IEEE Access, Vol 8, Pp 180799-180814 (2020)
Cloud computing gained much popularity in the recent past due to its many internet-based services related to data, application, operating system, and eliminating the need for central hardware access. Many of the challenges associated with cloud compu
Publikováno v:
2021 Resilience Week (RWS).
Publikováno v:
Computers & Security. 63:85-116
Define authentication factors.Evaluate trustworthy values of different authentication factors.Evaluate trustworthy values of different sets of authentication factors.Design multi-objective optimization strategies for adaptive multi-factor authenticat
Publikováno v:
IT Professional. 17:42-48
CAPTCHAs play a significant role in differentiating humans and machines in any Web-based authentication process. With technological advances in text recognition and image extraction, it's now possible to extract the characters shown in a CAPTCHA with
Autor:
Arunava Roy, Kul Prasad Subedi, Denise Ferebee, Sanjib Kumar Saha, Dipankar Dasgupta, Abel Sanchez, Alvaro Madero, Abhijit Kumar Nag, John R. Williams
Publikováno v:
Springer Berlin Heidelberg
Modern society is mostly dependent on online activities like official or social communications, fund transfers and so on. Unauthorized system access is one of the utmost concerns than ever before in cyber systems. For any cyber system, robust authent
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::790da37ba866ca8dd120ac3bf7318b73
http://hdl.handle.net/1721.1/121000
http://hdl.handle.net/1721.1/121000
Publikováno v:
Infosys Science Foundation Series ISBN: 9783319588063
This chapter describes various complementary approaches of passwords, namely, Honeywords, Cracking-Resistant Password Vaults using Natural Encoders, Bloom Filter, and non-textual and graphical passwords to protect user identities against any type of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fdde9ba5e78a6b5bf4442a80e86259d4
https://doi.org/10.1007/978-3-319-58808-7_4
https://doi.org/10.1007/978-3-319-58808-7_4