Enhancing home security through visual cryptography

J Mohan, R Rajesh - Microprocessors and Microsystems, 2021 - Elsevier
Home security systems in the recent times have gained greater importance due to
increasing threat in the society. Biometrics deals with automated approaches of recognizing …

Security and cryptographic challenges for authentication based on biometrics data

SL Nita, MI Mihailescu, VC Pau - Cryptography, 2018 - mdpi.com
Authentication systems based on biometrics characteristics and data represents one of the
most important trend in the evolution of the society, eg, Smart City, Internet-of-Things (IoT) …

Material Erosion and Dust Formation during Tungsten Exposure to Hollow-Cathode and Microjet Discharges

V Marascu, C Stancu, V Satulu, A Bonciu, C Grisolia… - Applied Sciences, 2020 - mdpi.com
Tungsten erosion and dust occurrence are phenomena of great interest for fusion
technology. Herein, we report results concerning the material damage and dust formation in …

[PDF][PDF] A novel multi-stage authentication system for mobile applications

M Aldwairi, R Masri, H Hassan… - International Journal of …, 2016 - academia.edu
Mobile devices and applications are quickly becoming the main platform to access the
Internet and web applications. Successful repetitive attacks on conventional authentication …

Three-Factor Authentication Scheme Based on Searchable Encryption and Biometric Fingerprint

MI Mihailescu, SL Nita - 2020 13th International Conference on …, 2020 - ieeexplore.ieee.org
The current paper is proposing a three-factor authentication (3FA) scheme based on three
components. In the first component a token and a password will be generated (this module …

Enhance multi-factor authentication model for intelligence community access to critical surveillance data

WN Wan Muhamad, NA Mat Razali, KK Ishak… - Advances in Visual …, 2019 - Springer
Protection of critical data is one of the greatest challenges in any organization around the
globe, especially for the intelligence community. Managing data, assets and resources …

NEW BIG DATA MODEL BASED ON SOCIAL LEARNING ENVIRONMENT USING ARTIFICIAL INTELLIGENCE.

MI MIHĂILESCU, ŞL NIŢĂ… - eLearning & Software for …, 2016 - search.ebscohost.com
Because of the advance of the new social computing technologies, known also as Web 5.0,
we now face with new challenges for eLearning. We have the opportunity to leverage …

Prevent Cyberattacks in Commercial Aircrafts Using a Biometric Provenance Access Control Framework

W Pabon - 2021 - search.proquest.com
Security threats have become one of the top five most concerning sources of risk in the
world. Even in the skies, the lack of cyber protections could prove to have adverse …

The 12th International Scientific Conference eLearning and Software for Education Bucharest, April 21-22, 2016

UA INTELLIGENCE - ceeol.com
Because of the advance of the new social computing technologies, known also as Web 5.0,
we now face with new challenges for eLearning. We have the opportunity to leverage …