Zobrazeno 1 - 10
of 306
pro vyhledávání: '"Reihaneh Safavi-Naini"'
Publikováno v:
PLoS ONE, Vol 19, Iss 3 (2024)
Externí odkaz:
https://doaj.org/article/d0b70a66535b4ec4ac0f933c17679098
Publikováno v:
IEEE Access, Vol 11, Pp 50884-50898 (2023)
A proof-of-location ( $pol$ ) is a digital credential issued to a user after proving their location to an issuer. The user can use the $pol$ at a later time to prove to a verifier that they have been present at a claimed location. A secure Proof-of-L
Externí odkaz:
https://doaj.org/article/901d7512a04b4bf1ad5dfb2f423cbe93
Publikováno v:
IEEE Access, Vol 9, Pp 43458-43473 (2021)
A Behavioral Authentication (BA) system constructs a behavioral profile for a user and uses it to verify their identity claims. It is primarily used as a second factor in user authentication. A BA system starts with an initial database of user profil
Externí odkaz:
https://doaj.org/article/c2e251eb28b44c289d43a153afa67847
Publikováno v:
Journal of Telecommunications and Information Technology, Iss 2 (2002)
Recently, digital streams have become widely used to make audio, video, and other media available in real-time over the Internet. As with other transmission methods, the recipient needs to have a possibility to verify the source and authenticity of t
Externí odkaz:
https://doaj.org/article/ce92e9cb384d40babdce62a97b3cad73
Autor:
Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini, Matthieu Giraud, Mark Kneppers, Pascal Lafourcade
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 20:131-146
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2022, Iss 1, Pp 417-439 (2022)
Fair exchange protocols are among the most important cryptographic primitives in electronic commerce. A basic fair exchange protocol requires that two parties who want to exchange their digital items either receive what they have been promised, or lo
Publikováno v:
Proceedings of the 9th ACM Workshop on Moving Target Defense.
Autor:
Leila Rashidi, Sogand Sadrhaghighi, Majid Ghaderi, Cristina Nita-Rotaru, Reihaneh Safavi-Naini
Publikováno v:
2022 IEEE Conference on Communications and Network Security (CNS).
Publikováno v:
IEEE Access, Vol 9, Pp 43458-43473 (2021)
A Behavioral Authentication (BA) system constructs a behavioral profile for a user and uses it to verify their identity claims. It is primarily used as a second factor in user authentication. A BA system starts with an initial database of user profil
Publikováno v:
Industrial and Engineering Applications of Artificial Intelligence and Expert Systems ISBN: 9780429332111
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7a0be0e15056733727a7dae9c5a72147
https://doi.org/10.1201/9780429332111-136
https://doi.org/10.1201/9780429332111-136