ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Social Sciences
Research
Biology
Languages
Literature
Technology
Public health
Mathematics
Economy
all records (74)

Languages
English
Spanish
Portuguese
German
French
Finnish

Countries
Indonesia
USA
Brazil
Ukraine
South Africa
Germany
Cuba
Pakistan
Italy
Canada
all records (79)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
93.303  Articles
1 of 9.331 pages  |  10  records  |  more records»
Authentication has been adopted in many areas, but most of these authentication schemes are built using traditional cryptographic primitives. It is widely believed that such primitives are not resistant to quantum algorithms. To deal with those quantum at... see more

Internet of Things (IoT) is a pervasive environment to interconnect the things like: smart objects, devices etc. in a structure like internet. Things can be interconnected in IoT if these are uniquely addressable and identifiable. Radio Frequency Identifi... see more

Chili is widely used in many food products, especially in Indonesia food. Sometimes a synthetic dye, i.e., rhodamine B or red textile dye were found in commercial chili powder. A fast, precise and accurate analytical method is necessary to authenticate ch... see more

Personal mobile devices currently have access to a significant portion of their user’s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securing acc... see more

The purpose of writing is to analyze the legal certainty of inheritance certificate made according to the classification of the population as a requirement to collect credit guarantees. The method used in writing is a qualitative method with a normative a... see more

In Vehicular Ad Hoc Networks (VANET), vehicles communicate with another vehicle and also communicate with infrastructure (RSU) points by broadcasting safety and non-safety messages in the network by using the DSRC. In wireless communication, security and ... see more

Authentication data, such as password, key word, passport number, etc., authentication material, such as biometric fingerprint, faces, etc., authentication objects, such as phone, passport, token, etc., can be spotted, forged and transferred to the malefa... see more

Protection of medical image content is more significant in telemedicine. Digitallossless watermarking becomes the auspicious technique to secure the medicalcontent in medical images. To enhance the security, this paper suggests securehash algorithm , rive... see more

Hairtail fishery is an important fishery commodity with high economic value as export commodity. Authentication based on DNA mini-barcodes can be applied to overcome seafood fraud and to support Indonesian traceability system. This study was aimed to desi... see more

1 of 9.331 pages  |  10  records  |  more records»