Location based authentication scheme using BLE for high performance digital content management system

M Choi, J Lee, S Kim, YS Jeong, JH Park - Neurocomputing, 2016 - Elsevier
Certain Internet services are designed to be accessible to a limited location/an institutions/or
a specified area affiliated computer services only, depending on their nature. Thus, in …

Mobile user authentication system in cloud environment

HT Yeh, BC Chen, YC Wu - Security and Communication …, 2013 - Wiley Online Library
In order to reach a safe environment that can be automatically used on the Internet and to
take precautions against the Internet fishing attack, the system integrates some features …

Implementing location-based cryptography on mobile application design to secure data in cloud storage

NSM Shamsuddin, SA Pitchay - Journal of Physics: Conference …, 2020 - iopscience.iop.org
This paper aims to identify security issues and existing solutions for cloud storage protection
and to propose a mobile application design for securing data in cloud storage using the …

Implementation of Wireless User Authentication using WLC-Forti Framework

IA Supriyono, I Sembiring, A Setiawan… - Aptisi Transactions on …, 2023 - att.aptisi.or.id
Internet access at this time is a daily necessity that cannot be denied. It is certain that most
institutions and business entities require internet access in carrying out their activities …

A new secure authentication scheme for web login using BLE smart devices

G Varshney, M Misra, P Atrey - 2017 11th IEEE International …, 2017 - ieeexplore.ieee.org
Existing user authentication schemes used for login to a website are incapable of handling
recent phishing attacks such as real time (RT)/control relay (CR) man in the middle (MITM) …

User-authentication approach for data security between smartphone and cloud

M Al-Hasan, K Deb, MO Rahman - Ifost, 2013 - ieeexplore.ieee.org
Cloud computing architecture provides a proper management to share distributed resources
and services throughout the world via computer network. This architecture offers three main …

[PDF][PDF] Web services based authentication system for e-learning

A Alkouz, SA El-Seoud - International Journal of Computing & …, 2007 - academia.edu
In Distance Learning end users need to access different e-learning platforms daily to gain
the knowledge. E-learning platforms implement authentication system to handle the …

An indoor positioning-based mobile payment system using Bluetooth low energy technology

A Yohan, NW Lo, D Winata - Sensors, 2018 - mdpi.com
The development of information technology has paved the way for faster and more
convenient payment process flows and new methodology for the design and implementation …

[PDF][PDF] Application of Biometric security in agent based hotel booking system-android environment

W Lawrence, S Sankaranarayanan - International Journal of …, 2012 - mecs-press.net
The process of finding the finest hotel in central location is time consuming, information
overload and overwhelming and in some cases poses a security risk to the client. Some of …

Cybersecurity attack-resilience authentication mechanism for intelligent healthcare system

P Soni, J Pradhan, AK Pal… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
People focus on the intelligent healthcare system expecting sufficient medical facilities even
from a remote location. However, to make the healthcare system more trustworthy, secure …