G Kambourakis - Journal of information security and applications, 2014 - Elsevier
Anonymity is generally conceived to be an integral part of user's right to privacy. Without anonymity, many online activities would become prone to eavesdropping, making them …
H Li, Y Niu, J Yi, H Li - Ieee Access, 2018 - ieeexplore.ieee.org
With the rise of crowdsourcing economies, the home delivery business is now undergoing rapid development. The authentication schemes that are currently used in the home delivery …
The inclusion of cloud services within existing identity federations has gained interest in the last years, as a way to simplify the access to them, reducing the user management costs …
OpenID is an open standard providing a decentralized authentication mechanism to end users. It is based on a unique URL (Uniform Resource Locator) or XRI (Extensible Resource …
G Karopoulos, A Fakis… - 2014 Ninth International …, 2014 - ieeexplore.ieee.org
Anonymity on SIP signaling can be achieved either by the construction of a lower level tunnel (via the use of SSL or IPSec protocols) or by employing a custom-tailored solution …
MA Nia, A Ruiz-Martínez - International Journal of …, 2022 - search.proquest.com
Privacy is an important research topic due to its implications in society. Among the topics covered by privacy, we can highlight how to establish anonymous communications. Dur-ing …
Με την εξάπλωση του Διαδικτύου υψηλών ταχυτήτων σε συνδυασμό με τις σύγχρονες γενιές κυψελωτών δικτύων επικοινωνιών, το πρωτόκολλο SIP αποτελεί βασική συνιστώσα για την …
AF Díaz García, I Blokhin, M Anguita López… - 2020 - digibug.ugr.es
Multifactor authentication is a relevant tool in securing IT infrastructures combining two or more credentials. We can find smartcards and hardware tokens to leverage the …