Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication

AM Mostafa, M Ezz, MK Elbashir, M Alruily… - Applied Sciences, 2023 - mdpi.com
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud
security from unauthorized access and data breaches. Multi-factor authentication verifies …

IAM identity Access Management—importance in maintaining security systems within organizations

C Singh, R Thakkar, J Warraich - European Journal of Engineering and …, 2023 - ej-eng.org
ABSTRACT Identity and Access Management proposes a web service that assists in
controlling the entire work through secured ways. This research study has been started to …

[PDF][PDF] Research on medical data security sharing scheme based on homomorphic encryption

L Guo, W Gao, Y Cao, X Lai - Math. Biosci. Eng., 2023 - aimspress.com
With the deep integration of “AI+ medicine”, AI-assisted technology has been of great help to
human beings in the medical field, especially in the area of predicting and diagnosing …

A Miniaturized Multi-Beam Wideband High Gain-5G Antenna Based on a Novel Design of Compact 4x4 Butler Matrix

M Sadiq, NB Sulaiman, MBTM Isa, MN Hamidon… - TEM Journal, 2024 - ceeol.com
This research focuses on developing a uniquely miniaturized 4× 4 Butler Matrix Network
integrated with a 1× 4 linear array antenna, generating four beams with exceptional isolation …

[PDF][PDF] Improved Siamese Palmprint Authentication Using Pre-Trained VGG16-Palmprint and Element-Wise Absolute Difference.

M Ezz, W Alanazi, AM Mostafa… - … Systems Science & …, 2023 - cdn.techscience.cn
Palmprint identification has been conducted over the last two decades in many biometric
systems. High-dimensional data with many uncorrelated and duplicated features remains …

[PDF][PDF] Research on Federated Learning Data Sharing Scheme Based on Differential Privacy.

L Guo - Computers, Materials & Continua, 2023 - cdn.techscience.cn
To realize data sharing, and to fully use the data value, breaking the data island between
institutions to realize data collaboration has become a new sharing mode. This paper …

Maturity Model for Information Access Management of Peruvian IT Service Providers based on ISO/IEC 27001 and CMMI Security Controls

S Huamán, L Ponce, L Wong - 2024 35th Conference of Open …, 2024 - ieeexplore.ieee.org
In the current context of increasing cyber threats to Latin American IT service providers, the
cost of data breaches is expected to increase 31% by 2023, which highlights the urgency of …

Data-Level Cyber Deception in Cloud of Things: Prospects, Issues, and Challenges

N Prabhaker, GS Bopche, M Arock - Cloud of Things, 2024 - taylorfrancis.com
Internet of Things (IoT) and cloud-based technologies offer a new way of delivering
traditional information and communications technology (ICT) services to organizations and …

An IoT Based Self-diagnosis System to Identify Chronic Obstructive Pulmonary Disease with Built-in Sterilization

M Pradeep, V Jyothi, GV Nirmala… - 2024 Third …, 2024 - ieeexplore.ieee.org
Chronic Obstructive Pulmonary Disease (COPD) is characterized by chronic inflammation of
the lungs, which eventually obstructs the bronchi, making it impossible to exhale. This …

Meta Heuristics Based Cybersecurity Solution in Cloud Environment

S Tomar, H Krishna, N Krishnaraj - 2024 2nd International …, 2024 - ieeexplore.ieee.org
Cloud plays a pivotal role in the ever-growing world of technology. A significant amount of
data and computing equipment is hosted on the cloud. This helps in achieving the highest …