Zobrazeno 1 - 10
of 573
pro vyhledávání: '"Email authentication"'
Publikováno v:
RAID
Email is still one of the most common ways of communication in our digital world, the underlying Simple Mail Transport Protocol (SMTP) is crucial for our information society. Back when SMTP was developed, security goals for the exchanged messages did
Publikováno v:
2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE).
Business Email Compromise (BEC) is a method through which the attacker defrauds the organization and all its stake holders by the use of the business email that the employees carelessly use in public domain. This paper discusses about Business Email
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9789811573446
Cloud computing is a developing IT framework model that composes a tremendous asset of figuring, stockpiling, applications controlling and arranging, and getting to online applications with high productivity and insignificant overhead. Cloud informat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7dd9888c52c8f8ad92bdee092bd1a730
https://doi.org/10.1007/978-981-15-7345-3_57
https://doi.org/10.1007/978-981-15-7345-3_57
Publikováno v:
Journal of Parallel and Distributed Computing. 118:107-117
Vehicle-to-Grid (V2G) systems promoted by the federated Internet of Things (IoT) technology will be ubiquitous in the future; therefore, it is crucial to provide trusted, flexible and efficient operations for V2G services using high-quality measures
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of Physics: Conference Series. 1917:012016
The main aim is to secure the medical records by ensuring safe communication between the sender and the receiver by adding multiple layers of security. This project is a combined approach of both encryption and steganography to give security the utmo
Publikováno v:
Oriental journal of computer science and technology. 10:513-519
Confidentiality and Authentication were once treated different but now-a-days, improvement in technology is demanding both of them to be used together. Though technology is increasing tremendously, smart hackers on the environment always challenges t
Publikováno v:
Computers & Security. 67:107-121
Knowledge-based authentication methods have become increasingly popular, where they started as simple passwords, before evolving into static questions for fallback authentication and graphical password-based systems. Question-based authentication met
Publikováno v:
Communications and Network. :172-178
Most network service providers like MTN Nigeria, currently use two-factor authentication for their 4G wireless networks. This exposes the network subscribers to identify theft and users data to security threats like snooping, sniffing, spoofing and p
Autor:
Tian-Yi Song, Chunqiang Hu, Dechang Chen, Xiuzhen Cheng, Abdulrahman Alhothaily, Arwa Alrawais
Publikováno v:
IEEE Access, Vol 5, Pp 11677-11687 (2017)
Authentication plays a critical role in securing any online banking system, and many banks and various services have long relied on username/password combos to verify users. Memorizing usernames and passwords for a lot of accounts becomes a cumbersom