In any registration process, it is a hassle to always bring physical documents. Not only that, the process is elongated if they are lost, and will contribute to identity theft if unauthorized …
RAA Helmi, SS bin Eddy Yusuf, A Jamal… - … on Automatic Control …, 2019 - ieeexplore.ieee.org
The concept of attendance applies in various daily life activities and functions, it is an unavoidable part of many scenarios, this part often involve a process that is both necessary …
Phishing is one of many computer security attacks, in which the attacker tries to trick people into fake website that is masqueraded to look and feel like the authentic website, thus …
The age of depending on processing devices has passed, the current life style is more dependent on continuous connectivity to the cyber space. This requires exceeding …
RAA Helmi, CS Ren - 2022 IEEE 10th Conference on Systems …, 2022 - ieeexplore.ieee.org
The aim of the research study for securing digital payment by using blockchain technology, is to understand the rapid growth of technology which affects digital payment's security …
R Ramli, N Duriraju, N Rozzani - 2019 IEEE 9th International …, 2019 - ieeexplore.ieee.org
Education with augmented reality (AR) is bringing a significant impact to the next generation education method, where differences between the education system before and after the …
The ease of alterations, distributions and duplications of a digital data makes the multimedia security to be crucial. Digital image watermarking is used in the multimedia security field in …
R Isa, S Othman, MZF Ismail… - European … - europeanproceedings.com
Nowadays, data protection is an essential issue for all computer users. Users continuously need to ensure that the data stored in their computers are secured. It became a significant …