Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Afolayan A. Obiniyi"'
Publikováno v:
International Journal of Systems and Software Security and Protection. 14:1-21
This research proposes a lightweight tamper resistant client file in an external memory as an alternative to smart card for remote user authentication and access control. The benefit of using this special client file is portability and ease of acquir
Publikováno v:
International Journal of Security and Privacy in Pervasive Computing. 14:1-10
This research performs a literature survey of remote user authentication researches based on smart card and external memory. The main security confidence of smart card based schemes is temper-resistance property. Other reasons are small physical size
A review of Secure Constrained Node Networks and a performamce evaluation using traffic analysis in a Cooja based RPL: IPv6 Routing Protocol for Low-Power and Lossy Network.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::076e689a2ebb19061baa46b5b1bf8052
https://doi.org/10.36227/techrxiv.22015949
https://doi.org/10.36227/techrxiv.22015949
Publikováno v:
Lecture Notes on Data Engineering and Communications Technologies ISBN: 9783031244742
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fc83785b8161a7bffc12d238616a399f
https://doi.org/10.1007/978-3-031-24475-9_14
https://doi.org/10.1007/978-3-031-24475-9_14
Publikováno v:
2022 5th Information Technology for Education and Development (ITED).
Publikováno v:
2022 5th Information Technology for Education and Development (ITED).
Publikováno v:
International Journal of Information Technology. 14:421-435
One of the security issues affecting Federated Cloud Environment users is privacy. It is the ability to secure and control the Personal Identifiable Information (PII) of a user during and after being communicated to the Cloud. Existing studies addres
Autor:
Afolayan A. Obiniyi, N. Sulaiman, S. Fatima, A. M. Usman, Mustapha Aminu Bagiwa, Kasim Shafii, C. M. Fatima
Publikováno v:
FUDMA JOURNAL OF SCIENCES. 5:133-144
The availability of easy to use video editing software has made it easy for cyber criminals to combine different videos from different sources using blue screen composition technology. This, makes the authenticity of such digital videos questionable
Publikováno v:
Saudi Journal of Engineering and Technology. :407-414
Publikováno v:
2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf).
Once an individual employs the use of the Internet for accessing information; carrying out transactions and sharing of data on the Cloud, they are connected to diverse computers on the network. As such, security of such transmitted data is most threa