ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Social Sciences
Languages
Literature
Research
Technology
Religion
Architecture and Urbanism
Computing
History
all records (71)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
USA
Brazil
South Africa
Germany
Ukraine
Canada
Australia
Spain
Austria
all records (73)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
192.324  Articles
1 of 19.233 pages  |  10  records  |  more records»
Cryptosystems relying on chaotic maps have been presented lately. As a result of inferred and convenient connections amongst the attributes of conventional cryptosystems and chaotic frameworks, the concept of chaotic systems with applications to cryptogra... see more

Generalized signcryption (GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. It is more suitable for the storage constrained setting. In this paper, motivated by Paterson–Schuldt’s scheme... see more

Phishing and identity theft are common threats of online shopping. Phishing is an attempt to steal personal data from legitimate user. In this paper we propose a secure e-payment method using a credit card based on visual cryptography. This method adopts ... see more

As the information age matures, a biometric identification technology will be at the heart of computer interaction with humans and the biosphere in which they reside. Hence, the reliable information security mechanisms are needed to combat the rising magn... see more

AbstractFaith-based Organisations (FBOs) have been at the forefront of a growing interest of the intersection between religion and development. Their value has been recognised as both pragmatic (such as reaching the poorest at the grassroots level and enc... see more

We propose a new dynamic ID-based remote user authentication scheme using smart cards, which it is based on one-way hash function, ElGamal’s public key cryptosystem and nonce. The scheme achieves the following security requirements: 1) users can choose an... see more

This is an exploratory case study implemented in a public school of Ibagué Colombia, that reports findings of a qualitative research. In this study tenth graders EFL students, explored into their local contexts, salient aspects of youth identity, that eme... see more

Rapid development of Internet of Things (IoT) and its whole ecosystems are opening a lot of opportunities that can improve humans’ quality of life in many aspects. One of the promising area where IoT can enhance our life is in the health care sector. Howe... see more

1 of 19.233 pages  |  10  records  |  more records»