Achieving data privacy and security in fintech cloud computing environments

OO Mokuolu - World Journal of Advanced Research and Reviews, 2024 - wjarr.co.in
The rapid adoption of Financial Technology (FinTech) has transformed the financial services
industry, with cloud computing playing a crucial role in enabling scalable and efficient …

A hybrid ranking algorithm for secure and efficient iris template protection

AHY Mohammed, RA Dziyauddin, N Kamaruddin… - Computers & …, 2025 - Elsevier
Indexing methods are mostly used to protect sensitive biometric data stored in templates. As
such, iris template protection has been used as a way of securing the efficiency of biometric …

Auth4App: Streamlining authentication for integrated cyber–physical environments

VE Quincozes, RB Mansilha, D Kreutz, CC Miers… - Journal of Information …, 2024 - Elsevier
The growing integration of mobile applications for user authentication has revolutionized
user interactions with digital platforms, offering novel possibilities in user experience (UX) …

[PDF][PDF] Comparative Analysis of eKYC and 2FA in Implementing PADU Database System to Strengthen Digital Identity Security

NI Subri, AG Hanafi, MAA Pozin - Journal of Cyber Security …, 2024 - researchgate.net
As digital transactions and online interactions become integral components of modern
society, ensuring robust digital identity security is paramount. This study addresses this …

RoseCliff Algorithm: Making Passwords Dynamic

AP Umejiaku, VS Sheng - Applied Sciences, 2024 - mdpi.com
Authentication in the digital landscape faces persistent challenges due to evolving cyber
threats. Traditional text-based passwords, which are vulnerable to various attacks …

[PDF][PDF] Development and Research of a Method for Multi-Level Protection of Transmitted Information in IP Networks Based on Asterisk IP PBX Using Various Codecs.

M Yakubova, T Serikov… - International Journal of …, 2024 - saiconferences.com
Research indicates that the utilization of existing symmetric and asymmetric cryptosystems,
as well as steganography, fails to ensure the requisite security and reliability in IP networks …

Enhancing Network Security: Leveraging Machine Learning for Integrated Protection and Intrusion Detection.

NM Murad, AY Dawod, SR Ahmed… - … Automation & Soft …, 2025 - search.ebscohost.com
This study introduces an innovative hybrid approach that integrates deep learning with
blockchain technology to improve cybersecurity, focusing on network intrusion detection …

BEST SECURITY PRACTICES IN AZURE CLOUD: DISCUSSION ON HOW TO BUILD AND MAINTAIN A SECURE ENVIRONMENT WITHIN AZURE, INCLUDING …

M Karyonov - Journal of the Balkan Tribological Association, 2023 - search.ebscohost.com
The relevance of this study is determined by the constant increase in the use of cloud
environments, in particular Azure Cloud, by organizations for data storage and processing …

[PDF][PDF] Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study.

K Moldamurat, Y Seitkulov, S Atanov, M Bakyt… - International Journal of …, 2024 - core.ac.uk
This research article provides an extensive analysis of novel methods of cryptographic
protection as well as advancements in authentication and authorization techniques within …

A Browser Fingerprint Authentication Scheme Based on the Browser Cache Side-Channel Technology.

Y Yan, H Zhao, H Qu - Electronics (2079-9292), 2024 - search.ebscohost.com
Users encounter various threats, such as cross-site scripting attacks and session hijacking,
when they perform login operations in the browser. These attacks pose significant risks to …