Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Authentication"

ADD TO MY LIST
 
Hashing of Message Hashing of Message

Author(s): Ladislav Schwartz | Dusan Trstensky
Robustness of Multi Biometric Authentication Systems against Spoofing

Author(s): Mahdi Hariri | Shahriar B. Shokouhi
An Access Control Framework for Grid Environment

Author(s): Seema | Sarbjeet Singh | Dolly Sharma
DEVELOPING A SECURITY PROTOCOL FOR A WIRELESS COMPUTER VIRTUAL LABORATORY (WCVLAB)

Author(s): EDWARD N. UDO | IMO J. EYO | INI J. UMOEKA
Security issues in e-learning platforms

Author(s): Defta (Ciobanu) Costinela – Luminita
PHARMACOGNOSTIC STUDIES ON TRACHYSPERMUM AMMI LINN. A POWDER ANALYSIS

Author(s): Hardel Danendra kumar | Sahoo Laxmidhar | Patel Jitendra
"Iris recognition using Partial Coefficients by applying Discrete Cosine Transform, Haar Wavelet and DCT Wavelet Transform"

Author(s): Dr. H. B. Kekre | Dr. Tanuja K. | Pratik Bhatia | Sandhya N. Nayak | Dheeraj Nagpal
Securing Bandwidth Request Messages in Wimax

Author(s): Kaushik Adhikary | Rajinder Kumar | Amit Kumar
Mechanisms for Security and Authentication of WiFi devices

Author(s): Gajraj Singh | Dr. P.K. Yadav
A Block Cipher Using Graph Structures and Logical XOR Operation

Author(s): CH. Suneetha | D. Sravan Kumar | A.Chandra sekhar
Personal Authentication through Retinal Blood Vessels Intersection Points Matching

Author(s): Md. Amran Siddiqui | S. M. Hasan Sazzad Iqbal | Md. Rounok Salehin
A Framework for Constructing a New Model of Web Database Security

Author(s): Eslam MohsinHassib | Amany Mahmoud Sarhan | Ahmed Ibrahim Saleh
A Framework for the Integration of Biometric Into Nigerian Banking ATM System

Author(s): Emuoyibofarhe O.J | Fajuyigbe O. | Emuoyibofarhe O.N | Alamu F.O.
The Effective and Efficient Security Services For Cloud Computing

Author(s): Sambhaji Sarode | Deepali Giri | Khushbu Chopde
Intrusion Detection System for Ad hoc Mobile Networks

Author(s): Muhammad Nawaz Khan | Muhammad Ilyas Khatak | Muhammad Faisal
The Application of R Software in the Calculation of Volatility

Author(s): Yujie CUI | Zheng WEN | Luyun CUI | Tian TIAN
Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fields

Author(s): Ch. Suneetha | D. Sravana Kumar | A. Chandrasekhar | K. Vanitha
Fragmented Iris Recognition System using BPNN

Author(s): A. Murugan | G. Savithiri
A Unique Approach for Watermarking Nonnumeric Relational Database

Author(s): Rajneesh Kaur Bedi | Purva Gujarathi | Poonam Gundecha | Ashish Kulkarni
ANALGESIC ACTIVITY OF ROOT EXTRACT OF SOLANUM MELONGENA LINN ROOT

Author(s): Srivastava Ashish | Sanjay Yadav
IMAGE HIDING IN DNA SEQUENCE USING ARITHMETIC ENCODING

Author(s): Prof. Samir Kumar Bandyopadhyay
SECURITY ISSUES IN COMPUTER NETWORK ARCHITECTURE

Author(s): Dr. M. Lilly Florence
PATH IDENTIFICATION IN MULTIPATH ROUTING

Author(s): Dr. Shuchita Upadhyaya
BIOMETRIC: CASE STUDY

Author(s): Sushma Jaiswal | Dr. Sarita Singh Bhadauria | Dr.Rakesh Singh Jadon
BIOMETRICS BASED IDENTIFICATION TECHNIQUES (BIT)

Author(s): Akash Srivastva | Vedpal Singh
Smart Card Security; Technology and Adoption

Author(s): Hamed Taherdoost | Shamsul Sahibuddin | Neda Jalaliyoon
PHARMACOGNOSTIC EVALUATION OF LEAVES OF ALANGIUM SALVIIFOLIUM LINN

Author(s): D. Saravanan | J. Padmavathy | M.J. Parimala | I. Aparna Lakshmi | Ch. Praveen
CRYPTOGRAPHIC PROTOCOLS USING ELLIPTIC CURVE OVER FINITE FIELDS

Author(s): D. SRAVANA KUMAR | CH. SUNEETHA | A.CHANDRASEKHAR
A Comprehensive Study of Palmprint based Authentication

Author(s): Madasu Hanmandlu | Neha Mittal | Ankit Gureja | Ritu Vijay
MAC based Approaches for Multicast Source Authentication

Author(s): Ramanpreet Kaur | Amrit Lal Sangal | Krishan Kumar
Design of Digital Signature Algorithm by Fractals and Chaos Theory

Author(s): Dr. G. Geetha | K. Thamizhchelvy
An enhanced Scheme for Reducing Vertical handover latency

Author(s): Mohammad Faisal | Muhammad Nawaz Khan
Aplicaciones y seguridad en la implementación de competencias prácticas en entornos de gestión del aprendizaje

Author(s): Gil, R. | San Cristóbal, E. | Tawfik, M. | Martín, S. | Pesquera, A. | Díaz, G. | Colmenar, A. | Carpio, J. | Peire, J. | Castro, M.
Personal Authentication System using Hand Vein Biometric

Author(s): G. Sathish | Dr. S.V. Saravanan | Dr. S. Narmadha | Dr. S. Uma Maheswari
Diameter-based Protocol in the IP Multimedia Subsystem

Author(s): Vinay Kumar.S.B | Manjula N Harihar
Hashing of Message Hashing of Message

Author(s): Ladislav Schwartz | Dusan Trstensky
Rank-Level Fusion of Multispectral Palmprints

Author(s): Neha Mittal | Madasu Hanmandlu | Jyotsana Grover | Ritu Vijay
Piracy Detection and Prevention using SIFT based on Earth Mover's Distance (EMD).

Author(s): B. Srinivas | Dr.Koduganti Venkata Rao | Dr. P.Suresh Varma
Encryption Of Data Using Elliptic Curve Over Finite Fields

Author(s): D. Sravana Kumar | CH. Suneetha | A. ChandrasekhAR
Performance Evaluation of Wi-Fi comparison with WiMAX Networks

Author(s): M.Sreerama Murty | D.Veeraiah | A.Srinivas Rao
FORMULATION AND EVALUATION OF COMPOUND AYURVEDIC FORMULATION KRISHNADI CHURNA

Author(s): Saurabh Sharma | Satish Nayak | Sushil Mhaske
ATTACK VECTORS USED IN FRAUDULENCE CONNECTION DURING ONLINE TRANSACTIONS

Author(s): PRADEEP PUNDIR AND VIRENDRA GOMANSE
PRINCIPLE OF VIRTUAL USE METHOD IN COMMON GATEWAY INTERFACE PROGRAM ON THE DACS SCHEME

Author(s): Kazuya Odagiri | Shogo Shimizu | Naohiro Ishii | MakotoTakizawa
PRINCIPLE OF VIRTUAL USE METHOD IN COMMON GATEWAY INTERFACE PROGRAM ON THE DACS SCHEME

Author(s): Kazuya Odagiri | Shogo Shimizu | Naohiro Ishii | MakotoTakizawa
Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model

Author(s): Gary Cantrell | David Dampier | Yoginder S. Dandass | Nan Niu | Chris Bogen
Model-Based Security Testing

Author(s): Ina Schieferdecker | Juergen Grossmann | Martin Schneider
A Micro-Mobility Management Scheme for Handover and Roaming

Author(s): Debabala Swain | Siba Prasada Panigrahi | Prasanta Kumar Patra
Quality and Distortion Evaluation of Audio Signal by Spectrum

Author(s): Er. Niranjan Singh | Dr. Bhupendra Verma
A Distributed Secure Mechanism for Resource Protection in a Digital Ecosystem Environment

Author(s): Rukshan Athauda | Geoff Skinner | Ilung Pranata
Evaluation of Electrocardiogram for Biometric Authentication

Author(s): S K Singh | Yogendra Narain Singh
SPCS: Secure and Privacy-Preserving Charging-Station Searching using VANET

Author(s): Lucas Chi Kwong Hui | Victor On Kwok Li | Siu Ming Yiu | Tat Wing Chim | Jeanno Chin Long Cheung
Digital Signatura Schemes for Secure Video

Author(s): R. N. Mandavgane | N.G.Bawane
A Survey on Cross Layer Security

Author(s): Sandeep Sharma | Rajesh Mishra | Karan Singh
Estimation of Resource Usage in Peer to Peer Network

Author(s): Amol P. Bhagat | Pravin Malve | Jayant Mehare
Face Recognition by Classification in Eigenspace

Author(s): Swati Choudhary | Mansi Shirwadkar | Hemlata Patil
Score Level Fusion of Face and Finger Traits in Multimodal Biometric Authentication System

Author(s): Utkarsh Gupta | Jasraj Fukane | Varshini Ramanan | Rohit Thakur
A Novel Approach for Iris Encryption

Author(s): Shrinivasrao B. Kulkarni | Ravindra S. Hegadi | Umakant P. Kulkarni
Desing and Implementation of Distributed Security using Onion Routing

Author(s): Ashish T. Bhole | Savita H. Lambole
Secured and Authenticated Sharing of Software Program

Author(s): Madhavi Gangurde | Umashankar prasad | Ranvir Kumar | Prashant Prajapati
An Adult Site Access Verification System for Non-Adults

Author(s): Shalini Puri | Sona Kaushik
Desain dan Implementasi Web Proxy dan VPN Akses (Studi Kasus di Undip)

Author(s): Adian Fatchur Rochim | Andrian Satria Martiyanto
An Approach for SMS Security using Authentication Functions

Author(s): Neetesh Saxena | Narendra S. Chaudhari
A New Security Protocol for Mobile Ad Hoc Networks

Author(s): K. Sahadevaiah | Prasad Reddy P.V.G.D. | G. Narsimha
Development of quality standard parameters of Ichnocarpus frutescens

Author(s): *Deepak Sharma1,Mohd. Mujeeb1,Aftab ahmad1,Abul Kalam1,Rati Tripathi Kailash Prasad2,Manisha Gupta3,Ram Chand Dhakar4
Development of quality standards of Caesalpinia crista leaves

Author(s): H. P. Suryawanshi1*, M. R. Patel2, J. K. Patil1, H. Sayyed1, R. A. Ahirrao1, D. M. Pokal2.
Achieving Identity-Based Cryptography in a Personal Digital Assistant Device

Author(s): L. Martínez-Ramos | L. López-García | F. Rodríguez-Henríquez
ISOLATION AND HPTLC ESTIMATION OF AESCULIN FROM OXYSTELMA ESCULENTUM

Author(s): Pandya Devang J. | Anand Indermeet S.
A Survey on Digital Video Watermarking

Author(s): Swati Patel | Anilkumar Katharotiya | Mahesh Goyani
ISOLATION AND HPTLC ESTIMATION OF KAEMPFEROL FROM OXYSTELMA ESCULENTUM

Author(s): Devang J. Pandya | Indermeet S. Anand
Secure Authentication using Anti-Screenshot Virtual Keyboard

Author(s): Ankit Parekh | Ajinkya Pawar | Pratik Munot | Piyush Mantri
A Graphical Password Based System for Small Mobile Devices

Author(s): Wazir Zada Khan | Mohammed Y Aalsalem | Yang Xiang
Establishing Security for Group Communication in Multicast Environment

Author(s): B.V.S.S.R.S.Sastry | K.Akshitha | M.V.Vijaya Saradhi
A Novel Approach For Pass Word Authentication Using Bidirectional Associative Memory

Author(s): A S N Chakravarthy | Penmetsa V Krishna Raja | P S Avadhani
Video Authentication- An Overview

Author(s): Saurabh Upadhyay | Sanjay Kumar Singh
A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis

Author(s): Morampudi Naresh kumar | Datrika Srinivas Rao | D.Sravanthi
User Authentication using Native Language Passwords

Author(s): Sreelatha Malempati | Shashi Mogalla
Securing Mobile Agents in MANET against Attacks using Trust

Author(s): Chandreyee Chowdhury | Sarmistha Neogy
ECAKP: Encrypt Collect Authenticate Kill Play

Author(s): Mahmoud Mohamed El-Khouly
Implimentation of Cryptographic Algorithm for GSM and UMTS Systems.

Author(s): Alpesh R. Sankaliya | V.Mishra | Abhilash Mandloi
Role of Multiple Encryption in Secure Electronic Transaction

Author(s): Himanshu Gupta | Vinod Kumar Sharma
A Secured Chat System With Authentication Technique As RSA Digital Signature

Author(s): Oyinloye O.Elohor | Ogemuno Emamuzo | Akinbohun Folake | Ayodeji .I. Fasiku
A Method for Fingerprint Authentication for ATM Based Banking Application

Author(s): S. Koteswari | P. John Paul | V. Pradeep kumar | A.B.S.R. Manohar
Analysis of a Novel Hash Function Based upon Chaotic Nonlinear Map with Variable Parameter

Author(s): M. Nouri | S. Abazari Aghdam | P. Pourmahdi | M. Safarinia
Vulnerabilities of LDAP As An Authentication Service

Author(s): Charlie Obimbo | Benjamin Ferriman
Why do you need a reservation system?      Save time & money - Smart Internet Solutions