Zobrazeno 1 - 10
of 339
pro vyhledávání: '"User identifier"'
Autor:
L. G. Akhmaeva
Publikováno v:
Вестник университета, Vol 0, Iss 6, Pp 65-73 (2022)
This article examines the creation and development of ecosystems in business in the Russian market. The author analyses the concept of “ecosystem” as it applies to business and describes the main ways in which the first ecosystems to emerge in th
Externí odkaz:
https://doaj.org/article/44db24c6528649a2a540ef32ec3c06e9
Publikováno v:
IEEE Access, Vol 8, Pp 8101-8113 (2020)
The emergence of the 5G network has brought broad prospects for the massive terminal access and ubiquitous Internet of Things (IoTs). Potential attacking opportunities triggered by this progress are severely impacting the security fortress of current
Externí odkaz:
https://doaj.org/article/f611c034e6ab49c89150a81cea819919
Publikováno v:
Dianxin kexue, Vol 35, Pp 15-23 (2019)
Embedding extensible user identities into IPv6 addresses not only provides the possibility of tracing the user identity and finely controlling the user behavior,but also helps to improve the security,auditability and credibility of the Internet.Curre
Externí odkaz:
https://doaj.org/article/56e194451fa748d9a8327074bde03e1a
Autor:
Sami Alshmrany
Publikováno v:
Cluster Computing. 25:523-536
A learning style that focuses on individual learning is one of the most important aspects of any learning environment. Each learner has a unique manner of understanding, retaining, processing, and interpreting new information based on their learning
Publikováno v:
Trends in Computer Science and Information Technology. :053-059
‘Phishing sites’ are some type of the internet security issues that mainly targets the human vulnerabilities compared to software vulnerabilities. Phishing sites are malicious websites that imitate as legitimate websites or web pages and aim to s
Publikováno v:
Реєстрація, зберігання і обробка даних. 23:72-80
A device to provide protection against unauthorized access to information based on the use of three-factor identification and user authentication with the ability to differentiate access to the information environment containing confidential informat
Publikováno v:
Information Sciences. 539:157-176
A Bloom filter is a probabilistic data structure for approximate membership filtering. It is applied in diverse Network systems to enhance a system’s performance and reduce the memory consumption, for instance, Named-Data Networking, Software-Defin
Publikováno v:
IEEE Access, Vol 8, Pp 8101-8113 (2020)
The emergence of the 5G network has brought broad prospects for the massive terminal access and ubiquitous Internet of Things (IoTs). Potential attacking opportunities triggered by this progress are severely impacting the security fortress of current
Publikováno v:
IEEE Access, Vol 8, Pp 76700-76707 (2020)
This research is about new advances in the application of remote bio-signal monitoring technology. An unobtrusive IoT bio-signal measurement system is attached to a bed using a very thin strip sensor, then the user’s sleep efficiency and respiratio
Publikováno v:
Cyber Intelligence and Information Retrieval ISBN: 9789811642838
Distribution of Internet banking credentials like user ID, login password, and transactional password is the most critical step and prone to forgery and hacking. We proposed a methodology by which banks can distribute the same in a much safer way. Th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::92fa32425bc951a6c7963bff07969cd5
https://doi.org/10.1007/978-981-16-4284-5_6
https://doi.org/10.1007/978-981-16-4284-5_6