Zobrazeno 1 - 10
of 224
pro vyhledávání: '"Lidia Ogiela"'
Autor:
Nghia Dinh, Lidia Ogiela
Publikováno v:
EURASIP Journal on Information Security, Vol 2022, Iss 1, Pp 1-20 (2022)
Abstract CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) has long been used to keep automated bots from misusing web services by leveraging human-artificial intelligence (HAI) interactions to distinguish whether t
Externí odkaz:
https://doaj.org/article/2a2e0cb1b68e4364887278ab1afe1a66
Autor:
Lidia Ogiela, Marek R. Ogiela
Publikováno v:
Applied Sciences, Vol 13, Iss 8, p 4847 (2023)
This paper defines new classes of algorithms for securing and sharing visual information. Algorithms offering data protection against unauthorised access are cryptographic protocols for data sharing and splitting. These protocols ensure the division
Externí odkaz:
https://doaj.org/article/34a89ea50c094a2da05491315d48ba48
Publikováno v:
Sensors, Vol 23, Iss 6, p 3170 (2023)
In recent years, the number of personal accounts assigned to one business user has been constantly growing. There could be as many as 191 individual login credentials used by an average employee, according to a 2017 study. The most recurrent problems
Externí odkaz:
https://doaj.org/article/9b65e3344cfb4bc58fb7715a2135bce1
Publikováno v:
Journal of Electronic Science and Technology, Vol 17, Iss 3, Pp 231-241 (2019)
A mobile medical information system (MMIS) is an integrated application (app) of traditional hospital information systems (HIS) which comprise a picture archiving and communications system (PACS), laboratory information system (LIS), pharmaceutical m
Externí odkaz:
https://doaj.org/article/d76f903ee2a04c4c93144cb8976385bb
Publikováno v:
IEEE Access, Vol 7, Pp 40078-40084 (2019)
Although many security systems with biometric information have appeared, they only have been used the static bio-information, e.g., a fingerprint, ris, and so on. However, because these values are permanent, the attackers can modify and abuse that. T
Externí odkaz:
https://doaj.org/article/c1ab2f71aaf04c2a999ad99d6840bab6
Publikováno v:
Sensors, Vol 21, Iss 21, p 7265 (2021)
The objective of the verification process, besides guaranteeing security, is also to be effective and robust. This means that the login should take as little time as possible, and each time allow for a successful authentication of the authorised acco
Externí odkaz:
https://doaj.org/article/5adc7bbc18864ed3a155f4e08a7efbe8
Publikováno v:
Sensors, Vol 20, Iss 12, p 3458 (2020)
This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated
Externí odkaz:
https://doaj.org/article/c37a2993f731493d905a268c4671b4c0
Autor:
Lidia Ogiela
Publikováno v:
Computer Science, Vol 7, p 105 (2005)
This paper demonstrates that AI methods, in particular linguistic mechanisms of semanticmeaning reasoning can be applied to the development of intelligent IT systems. They enablealso conducting an in-depth meaning analysis in the presented DDS inform
Externí odkaz:
https://doaj.org/article/601e31c4a42a4389b25ac27d80838c14
Publikováno v:
Advanced Information Networking and Applications ISBN: 9783031284502
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4187c8569a4ebf389543bb2b1a9bc0b8
https://doi.org/10.1007/978-3-031-28451-9_38
https://doi.org/10.1007/978-3-031-28451-9_38
Publikováno v:
Neural Computing and Applications. 35:13709-13710