Zobrazeno 1 - 10
of 2 028
pro vyhledávání: '"trusted path"'
Autor:
Srividya, Putty, Devi, Lavadya Nirmala
Publikováno v:
In Global Transitions Proceedings June 2022 3(1):317-325
Publikováno v:
Ingénierie des Systèmes d'Information. Oct2022, Vol. 27 Issue 5, p685-693. 9p.
Autor:
Langweg, Hanno, Kristiansen, Tommy
We present a method to secure the complete path between a server and the local human user at a network node. This is useful for scenarios like internet banking, electronic signatures, or online voting. Protection of input authenticity and output inte
Externí odkaz:
http://arxiv.org/abs/cs/0611102
Publikováno v:
Ingénierie des systèmes d information. 27:685-693
Autor:
Putty Srividya, Lavadya Nirmala Devi
Publikováno v:
Global Transitions Proceedings. 3:317-325
Publikováno v:
Journal of Information and Telecommunication, Vol 8, Iss 4, Pp 417-451 (2024)
This paper introduces iTEVAC, an advanced model of the Trusted Evacuation System (TEVAC), designed to optimize emergency evacuation procedures within commercial centers. Building upon the principles of TEVAC, iTEVAC incorporates additional features s
Externí odkaz:
https://doaj.org/article/ce026313a601482e9520ce9e4e8b9489
Publikováno v:
Web and Wireless Geographical Information Systems ISBN: 9783030609511
W2GIS
W2GIS
Social networks provide rich data sources for analyzing people journeys in urban environments. This paper introduces a trusted path system that helps users to find their routes based in low crime rate and theft reports. These data are obtained geo-ta
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d4afe3e65a0aeed96e929c0b1af75b43
https://doi.org/10.1007/978-3-030-60952-8_17
https://doi.org/10.1007/978-3-030-60952-8_17
Publikováno v:
2019 International Conference on Information Science and Communications Technologies (ICISCT).
Models based on the concept of trust and reputation are widely used for securing routing protocols in self-organizing networks. The paper considers existing approaches to secure the OLSR routing protocol and identifies their drawbacks. Based on the e
Publikováno v:
CLOUD
Authentication as a Service (AaaS) provides on-demand delivery of multi-factor authentication (MFA). However, current AaaS has left out of consideration the trustworthiness of user inputs at client evices and the risk of privacy exposure at the AaaS
Publikováno v:
IC2E Workshops
The flexibility and dynamicty of the Cloud and SDN-based network infrastructures raise strong issues for sensitive data which can easily be transferred between different locations and then violate some constraints such as country-based regulations. T