[HTML][HTML] Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication

AM Mostafa, M Ezz, MK Elbashir, M Alruily… - Applied Sciences, 2023 - mdpi.com
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud
security from unauthorized access and data breaches. Multi-factor authentication verifies …

[HTML][HTML] IAM identity Access Management—importance in maintaining security systems within organizations

C Singh, R Thakkar, J Warraich - European Journal of Engineering and …, 2023 - ej-eng.org
ABSTRACT Identity and Access Management proposes a web service that assists in
controlling the entire work through secured ways. This research study has been started to …

[PDF][PDF] Research on medical data security sharing scheme based on homomorphic encryption

L Guo, W Gao, Y Cao, X Lai - Mathematical Bioscience and …, 2023 - aimspress.com
With the deep integration of “AI+ medicine”, AI-assisted technology has been of great help to
human beings in the medical field, especially in the area of predicting and diagnosing …

[PDF][PDF] Research on Federated Learning Data Sharing Scheme Based on Differential Privacy.

L Guo - Computers, Materials & Continua, 2023 - cdn.techscience.cn
To realize data sharing, and to fully use the data value, breaking the data island between
institutions to realize data collaboration has become a new sharing mode. This paper …

Maturity Model for Information Access Management of Peruvian IT Service Providers based on ISO/IEC 27001 and CMMI Security Controls

S Huamán, L Ponce, L Wong - 2024 35th Conference of Open …, 2024 - ieeexplore.ieee.org
In the current context of increasing cyber threats to Latin American IT service providers, the
cost of data breaches is expected to increase 31% by 2023, which highlights the urgency of …

[PDF][PDF] Improved Siamese Palmprint Authentication Using Pre-Trained VGG16-Palmprint and Element-Wise Absolute Difference.

M Ezz, W Alanazi, AM Mostafa, E Hamouda… - … Systems Science & …, 2023 - academia.edu
Palmprint identification has been conducted over the last two decades in many biometric
systems. High-dimensional data with many uncorrelated and duplicated features remains …

A Miniaturized Multi-Beam Wideband High Gain-5G Antenna Based on a Novel Design of Compact 4x4 Butler Matrix.

M Sadiq, NB Sulaiman, MBT Mohd Isa, MN Hamidon… - TEM Journal, 2024 - ceeol.com
This research focuses on developing a uniquely miniaturized 4× 4 Butler Matrix Network
integrated with a 1× 4 linear array antenna, generating four beams with exceptional isolation …

Machine Learning for Detecting Blood Transfusion Needs Using Biosignals

H Ko, C Park, WS Kang, Y Nam, D Yoon, J Lee - 2023 - ir.ymlib.yonsei.ac.kr
Adequate oxygen in red blood cells carrying through the body to the heart and brain is
important to maintain life. For those patients requiring blood, blood transfusion is a common …

Meta Heuristics Based Cybersecurity Solution in Cloud Environment

S Tomar, H Krishna, N Krishnaraj - 2024 2nd International …, 2024 - ieeexplore.ieee.org
Cloud plays a pivotal role in the ever-growing world of technology. A significant amount of
data and computing equipment is hosted on the cloud. This helps in achieving the highest …

Secured Identity and Access Management for Cloud Computing Using Zero Trust Architecture

V Yadav, MK Soni, A Pratap - … on Cryptology & Network Security with …, 2023 - Springer
Cloud computing environment combines a variety of networked devices to facilitate the
provision of requested services. 8–9% challenges related to cloud are due to identity and …