• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6521
  • 1925
  • 919
  • 814
  • 686
  • 370
  • 179
  • 160
  • 154
  • 105
  • 93
  • 81
  • 79
  • 76
  • 76
  • Tagged with
  • 14759
  • 2960
  • 2019
  • 1869
  • 1439
  • 1373
  • 1340
  • 1298
  • 1255
  • 1156
  • 1151
  • 1142
  • 1073
  • 1029
  • 944
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
221

An economic analysis of pension systems and reforms

Casarico, Alessandra January 2000 (has links)
No description available.
222

Non-interference properties for nondeterministic processes

Forster, Richard January 1999 (has links)
No description available.
223

Cryptanalysis algortihms for public key cryptosystems

Tabatabaian, Seyed Jalil January 1994 (has links)
No description available.
224

The development of a European security architecture in the post-Cold War era

Aybet, Gulner January 1997 (has links)
No description available.
225

Fast algorithms for implementation of public-key cryptosystems : VLSI simulation of modified algorithm to increase the speed of public-key cryptosystem (RSA) implementation

Al-Tuwaijry, Fahd A. A. January 1992 (has links)
No description available.
226

Social security, social control and the tribunal process

Dean, H. January 1988 (has links)
No description available.
227

Water politics in the Middle East : a context for conflict or cooperation?

Dolatyar, Mostafa January 1998 (has links)
No description available.
228

SPACE : SPatial Access Control for collaborative virtual Environments

Bullock, Adrian January 1999 (has links)
No description available.
229

Kuwait, 1979-1991 : problems and policies for internal security

Plotkin, Lori A. January 2003 (has links)
No description available.
230

Multi-factor Authentication Techniques for Video Applications over the Untrusted Internet

Abbadi, Laith 18 October 2012 (has links)
Designing a completely secure and trusted system is a challenge that still needs to be addressed. Currently, there is no online system that is: (i) easy to use, (ii) easy to deploy, (iii) inexpensive, and (iv) completely secure and trusted. The proposed authentication techniques aim to enhance security and trust for video applications in the untrustworthy online environments. We propose a transparent multimodal biometric authentication (TMBA) for video conferencing applications. The user is identified based on his/her physiological and behavioral biometrics. The technique is based on a ‘Steps-Free’ method, where the user does not have to perform any specific steps during authentication. The system will authenticate the user in a transparent way. We propose authentication techniques as an additional security layer for various ‘user-to-user’ and ‘user-to-service’ systems. For ‘user-to-user’ video conferencing systems, we propose an authentication and trust establishment procedure to identify users during a video conference. This technique enables users that have never met before to verify the identity of each other, and aims at enhancing the user’s trust in each other. For ‘user-to-service’ video conferencing systems, we propose a transparent multimodal biometric authentication technique for video banking. The technique can be added to online transaction systems as an additional security layer to enhance the security of online transactions, and to resist against web attacks, malware, and Man-In-The-Browser (MITB) attacks. In order to have a video banking conference between a user and a bank employee, the user has to be logged in to an online banking session. This requires a knowledge-based authentication. Knowledge-based authentication includes a text-based password, the ‘Challenge Questions’ method, and graphical passwords. We analyzed several graphical password schemes in terms of usability and security factors. A graphical password scheme can be an additional security layer add-on to the proposed multimodal biometric video banking system. The combined techniques provide a multimodal biometric multi-factor continuous authentication system.

Page generated in 0.0257 seconds