Search
Search Results
-
Identity-based signcryption scheme for medical cyber physical system in standard model
The medical cyber-physical system (MCPS) has recently received massive consideration with the growth of healthcare 4.0. However, maintaining...
-
A comprehensive survey on techniques to handle face identity threats: challenges and opportunities
The human face is considered the prime entity in recognizing a person’s identity in our society. Henceforth, the importance of face recognition...
-
Decentralized Identity Management and Blockchains: Design Patterns and Architectures
Securely and efficiently managing digital identities is a pre-requisite to enabling prosperous digital service economy underpinned by trust. The... -
The age of the algorithmic society a Girardian analysis of mimesis, rivalry, and identity in the age of artificial intelligence
This paper explores the intersection of René Girard's mimetic theory and the algorithmic society, particularly in the context of the potential advent...
-
A Public Key Identity-Based Revocation Scheme:
Multi-Recipient Encryption allows users to send secure messages to any chosen set of registered users. In ACISP’21, Blazy et al. proposed a... -
Using Modern Identity to Build Applications
The past chapters covered how certain identity protocols provide a solution for authentication, API authorization, and application authorization. It... -
A dual watermarking scheme for identity protection
A novel dual watermarking scheme with potential applications in identity protection, media integrity maintenance and copyright protection in both...
-
An identity-based public auditing protocol in cloud-assisted IoT
Cloud-assisted Internet of things (IoT) is an important technological trend since employing the cloud to manage massive IoT data enhances performance...
-
Identity and Access Management (IAM)
Identity and Access Management (IAM) stands as a cornerstone in cybersecurity, orchestrating the intricate dance of user identities, permissions, and... -
Ethical Reflection on Identity of AI Digital Avatars
This article explores the impact of artificial intelligence (AI) on human identity and raises ethical concerns regarding using biometric data for... -
Blockchain-based biometric identity management
In recent years, face biometrics recognition systems are a wide space of a computer usage which is mostly employed for security purpose. The main...
-
I-MSV 2022: Indic-Multilingual and Multi-sensor Speaker Verification Challenge
Speaker Verification (SV) is a task to verify the claimed identity of the claimant using his/her voice sample. Though there exists an ample amount of... -
Cross-modal identity correlation mining for visible-thermal person re-identification
Visible-thermal person recognition is a sub problem of image retrieval, which aims to find out the images belonging to the same pedestrian as the...
-
Digital Identity Strategy
In today’s interconnected digital world, the delineation between our real and virtual selves is fading. As individuals, businesses, and machines... -
Identity-Based Key Verifiable Inner Product Functional Encryption Scheme
Functional encryption is a novel form of public key encryption that has captured significant attention since its inception, with researchers... -
Brain Intervention Therapy Dilemma: Functional Recovery versus Identity
Neuroethics addresses the issue of transformations in personal identity induced by brain intervention therapy. The advent of Brain-Machine Interfaces... -
To Learn or Not to Learn: Perceptions Towards Continuing Professional Development (CPD) and Self-identity Among English Language Teachers During the COVID-19 Pandemic
PurposeThe COVID-19 pandemic necessitated a pivot towards digital teaching and learning. This study aims to assess the perceptions of self-identity...
-
Uncovering cell identity through differential stability with Cepo
The use of single-cell RNA-sequencing (scRNA-seq) allows observation of different cells at multi-tiered complexity in the same microenvironment. To...
-
Cross-Chain-Based Distributed Digital Identity: A Survey
Due to the high degree of privacy and sensitivity, it is difficult to share distributed digital identity with multiple parties. Blockchain-based... -
An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking
Named data networking (NDN) has been viewed as a promising future Internet architecture due to its data-centric design. It requires a new security...