ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Technology
Computing
Pure sciences
Biology
Industrial engineer
Architecture and Urbanism
Agronomy and forestry
Mechanical Engineering
Communication
all records (61)

Languages
English
German
Spanish

Countries
Indonesia
USA
Ukraine
India
Canada
Austria
Romania
Croatia
Malaysia
South Africa
all records (49)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (23)

Filter  
 
661  Articles
1 of 67 pages  |  10  records  |  more records»
Web Application Security is considered crucial in the era of rapid technology development, following with recent rapid development of artificial intelligence architecture, virtual reality and the internet of things, one of important node which is a web ap... see more

This paper proposes an authentication mechanism on the MQ Telemetry Transport (MQTT) protocol. The exchange of data in the IoT system became an important activity. The MQTT protocol is a fast and lightweight communication protocol for IoT. One o... see more

Smartphones are the world's most widely used personal computing devices. PINs and passcodes have long been the most popular authentication methods in smartphones and even in the pre-smartphone era. Due to the inconvenient nature of PINs and passcodes, a n... see more

With the fast development in services related to localisation, location-based service (LBS) gains more importance amongst all the mobile wireless services. To avail the service in the LBS system, information about the location and identity of the user has... see more

Communication via sockets is used to transmit information between applications or between processes over network or locally. ZeroMQ is a library for sending messages using sockets that are quite well known. Talking about sending data, message security is ... see more

Fraud and counterfeiting have caused various inconveniences to manufacturers and the product consumer market. To avoid counterfeiting and, therefore, bring a higher level of trust and security in commercial transactions, several authentication techniques ... see more

Many automated attendance systems have been proposed in academia. However, all of them require the attendees to consciously record their attendance. This is prone to human error as some attendees may forget to do that. It is also distractive as the record... see more

Mobile learning is an extended version of e-learning. The revolution of handheld devices had encouraged design courses to be compatible with different mobiles versions, brands and platforms. Mobile exams need more attention to strengthen mobile learning c... see more

Public key cryptosystems are secure only when the authenticity of the public key is assured. Shao proposeda new scheme to overcome the problems of the existing schemes, which suffers from two major drawbacks. Thefirst drawback is the availability of users... see more

1 of 67 pages  |  10  records  |  more records»