Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Aqsa Rashid"'
Autor:
Aqsa Rashid, Atta Ur Rehman Khan
Publikováno v:
IEEE Access, Vol 10, Pp 91572-91587 (2022)
In the Internet of Battlefield Things (IoBT), users and sensor-equipped entities send multiple messages to the Command Control Center (CCC) over the network. The authentication and integrity of these messages are crucial because if an adversary or ma
Externí odkaz:
https://doaj.org/article/133b1cee5b804ae09c812fadfc0a9909
Publikováno v:
Technologies, Vol 6, Iss 1, p 7 (2018)
Telemedicine is the use of Information and Communication Technology (ICT) for clinical health care from a distance. The exchange of radiographic images and electronic patient health information/records (ePHI/R) for diagnostic purposes has the risk of
Externí odkaz:
https://doaj.org/article/1f6ddae7a9ed4a1591e313ce05112836
Publikováno v:
European Journal of Chemistry. 14:155-164
The synthesis of many transition metal complexes containing 3,5-diamino-1,2,4-triazole (Hdatrz) as a ligand with different counter anions Br⎺, Cl⎺, ClO4⎺ and SO42- has been studied extensively, but the chemistry of transition metal nitrate and
Publikováno v:
Cluster Computing. 26:237-254
Publikováno v:
IEEE Network. 35:220-225
Public Key Infrastructure (PKI) has been considered to be an enabler of secure communication, while, due to its complex and centralized design, there have been instances in the past for Certification Authority's (CA) misbehaving and publishing rogue
Publikováno v:
Cluster Computing. 24:3551-3571
In large organizations, we achieve security by limiting unnecessary access to shared resources based on the users' roles. It reduces administrative work and enhances security. Due to the security requirements of role-centric authentication and access
Publikováno v:
Future Generation Computer Systems. 117:245-258
Role Engineering creates a model for enforcing security among organizations and reduces the risk of entities having unauthorized access privileges. In this paper, we realize the role engineering for the organizations where services are associated wit
Publikováno v:
Traitement du Signal. 37:671-678
Information security using image steganography is the process of concealing secret information within an image. The conventional methods are static approaches having fixed capacity in term of embedding rate. To solve the problem of static behavior an
Autor:
Muhammad Khurrum Rahim, Aqsa Rashid
Publikováno v:
Journal of Advances in Mathematics and Computer Science. :1-18
Steganography is the skill of hiding data inside other information in such a way that it is hard or even impossible to tell that it is there. There are many different carriers for steganography but the most popular is digital images. In recent times,
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030430191
Blockchain technology is taking the world by storm. With its transparent, secure and decentralized nature, it has emerged as a disruptive technology for numerous industrial applications. One of them is Role Engineering: the Role-based Security (RBS),
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::26346670a36f8086ee30f7256d231120
https://doi.org/10.1007/978-3-030-43020-7_25
https://doi.org/10.1007/978-3-030-43020-7_25