We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 10,000 results
  1. Identity-based signcryption scheme for medical cyber physical system in standard model

    The medical cyber-physical system (MCPS) has recently received massive consideration with the growth of healthcare 4.0. However, maintaining...

    Rachana Yogesh Patil, Yogesh H. Patil in International Journal of Information Technology
    Article 04 June 2022
  2. A comprehensive survey on techniques to handle face identity threats: challenges and opportunities

    The human face is considered the prime entity in recognizing a person’s identity in our society. Henceforth, the importance of face recognition...

    Mayank Kumar Rusia, Dushyant Kumar Singh in Multimedia Tools and Applications
    Article 10 June 2022
  3. Decentralized Identity Management and Blockchains: Design Patterns and Architectures

    Securely and efficiently managing digital identities is a pre-requisite to enabling prosperous digital service economy underpinned by trust. The...
    Hye-young Paik, Yue Liu, ... Salil S. Kanhere in Blockchains
    Chapter 2024
  4. The age of the algorithmic society a Girardian analysis of mimesis, rivalry, and identity in the age of artificial intelligence

    This paper explores the intersection of René Girard's mimetic theory and the algorithmic society, particularly in the context of the potential advent...

    Lucas Freund in AI & SOCIETY
    Article 11 May 2024
  5. A Public Key Identity-Based Revocation Scheme:

    Multi-Recipient Encryption allows users to send secure messages to any chosen set of registered users. In ACISP’21, Blazy et al. proposed a...
    Olivier Blazy, Sayantan Mukherjee in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
  6. Using Modern Identity to Build Applications

    The past chapters covered how certain identity protocols provide a solution for authentication, API authorization, and application authorization. It...
    Yvonne Wilson, Abhishek Hingnikar in Solving Identity Management in Modern Applications
    Chapter 2023
  7. A dual watermarking scheme for identity protection

    A novel dual watermarking scheme with potential applications in identity protection, media integrity maintenance and copyright protection in both...

    Sunpreet Sharma, Ju Jia Zou, Gu Fang in Multimedia Tools and Applications
    Article Open access 21 June 2022
  8. An identity-based public auditing protocol in cloud-assisted IoT

    Cloud-assisted Internet of things (IoT) is an important technological trend since employing the cloud to manage massive IoT data enhances performance...

    Asal Ramezani, Maryam Rajabzadeh Asaar in Cluster Computing
    Article 22 July 2022
  9. Identity and Access Management (IAM)

    Identity and Access Management (IAM) stands as a cornerstone in cybersecurity, orchestrating the intricate dance of user identities, permissions, and...
    Mohamed Aly Bouke in CISSP Exam Certification Companion
    Chapter 2023
  10. Ethical Reflection on Identity of AI Digital Avatars

    This article explores the impact of artificial intelligence (AI) on human identity and raises ethical concerns regarding using biometric data for...
    Conference paper 2024
  11. Blockchain-based biometric identity management

    In recent years, face biometrics recognition systems are a wide space of a computer usage which is mostly employed for security purpose. The main...

    Sherif Hamdy Gomaa Salem, Ashraf Yehia Hassan, ... Mohamed Nabil Hassan in Cluster Computing
    Article Open access 07 November 2023
  12. I-MSV 2022: Indic-Multilingual and Multi-sensor Speaker Verification Challenge

    Speaker Verification (SV) is a task to verify the claimed identity of the claimant using his/her voice sample. Though there exists an ample amount of...
    Jagabandhu Mishra, Mrinmoy Bhattacharjee, S. R. Mahadeva Prasanna in Speech and Computer
    Conference paper 2023
  13. Cross-modal identity correlation mining for visible-thermal person re-identification

    Visible-thermal person recognition is a sub problem of image retrieval, which aims to find out the images belonging to the same pedestrian as the...

    Sen Zhang, Zhaowei Shang, ... Guoliang Sun in Multimedia Tools and Applications
    Article 05 May 2022
  14. Digital Identity Strategy

    In today’s interconnected digital world, the delineation between our real and virtual selves is fading. As individuals, businesses, and machines...
    Shivakumar R. Goniwada in Introduction to One Digital Identity
    Chapter 2024
  15. Identity-Based Key Verifiable Inner Product Functional Encryption Scheme

    Functional encryption is a novel form of public key encryption that has captured significant attention since its inception, with researchers...
    Mingwu Zhang, Chao He, Gang Shen in Blockchain Technology and Emerging Applications
    Conference paper 2024
  16. Brain Intervention Therapy Dilemma: Functional Recovery versus Identity

    Neuroethics addresses the issue of transformations in personal identity induced by brain intervention therapy. The advent of Brain-Machine Interfaces...
    Kenta Kitamura, Mhd Irvan, Rie Shigetomi Yamaguchi in Brain Informatics
    Conference paper 2023
  17. To Learn or Not to Learn: Perceptions Towards Continuing Professional Development (CPD) and Self-identity Among English Language Teachers During the COVID-19 Pandemic

    Purpose

    The COVID-19 pandemic necessitated a pivot towards digital teaching and learning. This study aims to assess the perceptions of self-identity...

    Noble Po-kan Lo, Bryan Ka-ho To in SN Computer Science
    Article 08 April 2023
  18. Uncovering cell identity through differential stability with Cepo

    The use of single-cell RNA-sequencing (scRNA-seq) allows observation of different cells at multi-tiered complexity in the same microenvironment. To...

    Hani Jieun Kim, Kevin Wang, ... Pengyi Yang in Nature Computational Science
    Article 20 December 2021
  19. Cross-Chain-Based Distributed Digital Identity: A Survey

    Due to the high degree of privacy and sensitivity, it is difficult to share distributed digital identity with multiple parties. Blockchain-based...
    Tianxiu **e, Hong Zhang, ... Keke Gai in Smart Computing and Communication
    Conference paper 2023
  20. An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking

    Named data networking (NDN) has been viewed as a promising future Internet architecture due to its data-centric design. It requires a new security...

    Article Open access 17 November 2022
Did you find what you were looking for? Share feedback.