Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Doyel Pal"'
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 11, Iss 1, Pp 1-14 (2022)
Abstract In a distributed cloud, unlike centralized resource management, users provide and share resources. However, this allows for the existence of free riders who do not provide resources to others, but at the same time use resources that others p
Externí odkaz:
https://doaj.org/article/462e9298ba604f1e9df9af6ef1201f93
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030730994
User authentication is the process of verifying identity of a user. A user’s identity can be verified by using different types of authentication mechanisms such as text-based password, graphical password, and biometrics. Password-based authenticati
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2cf6c26428af2ba4d61c0e55a42fbda7
https://doi.org/10.1007/978-3-030-73100-7_47
https://doi.org/10.1007/978-3-030-73100-7_47
Autor:
Doyel Pal, Alaa Darabseh
Publikováno v:
ICICT
Authentication is the process of verifying the identity of a user. Biometric authentication assures user identity by identifying users physiological or behavioral traits. Keystroke dynamics is a behavioral biometric based on users typing pattern. It
Publikováno v:
ICACCI
Cloud computing provides on-demand services to deliver computing and network resources from a data center over Internet to the users. Distributed cloud computing aims at providing on-demand services provided by individual resource providers to the us
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811027376
SSCC
SSCC
Healthcare using Mobile devices and Cloud Computing is an emergent topic of interest in both industry and research. Though ubiquity of mobile devices and availability of e-Health record plays an important role to enhance health care quality and servi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::26bf0d474d504c8b41034509858a0f23
https://doi.org/10.1007/978-981-10-2738-3_18
https://doi.org/10.1007/978-981-10-2738-3_18
Publikováno v:
Communications in Computer and Information Science ISBN: 9783319229140
SSCC
SSCC
Biometric authentication ensures user identity by means of users’ biometric traits. Though biometrics is unique and secure, it can be still stolen or misused by any adversary. In this paper we propose a secure and privacy preserving biometric authe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4529ee9af54ce350137dd012fdb99df4
https://doi.org/10.1007/978-3-319-22915-7_14
https://doi.org/10.1007/978-3-319-22915-7_14
Publikováno v:
International Journal of Communication Systems. 30:e3293
Publikováno v:
JMIR Medical Informatics
JMIR Medical Informatics, Vol 2, Iss 1, p e2 (2014)
JMIR Medical Informatics, Vol 2, Iss 1, p e2 (2014)
BackgroundLinking medical records across different medical service providers is important to the enhancement of health care quality and public health surveillance. In records linkage, protecting the patients’ privacy is a primary requirement. In re