Journal articles on the topic 'Authentication integrity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Authentication integrity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.
Full textHendry Leo Kanickam, S., and L. Jayasimman. "Comparative Analysis of Hash Authentication Algorithms and ECC Based Security Algorithms in Cloud Data." Asian Journal of Computer Science and Technology 8, no. 1 (2019): 53–61. http://dx.doi.org/10.51983/ajcst-2019.8.1.2118.
Full textMr., P.Venkateshwar Rao* Mr. G.Vamshi Krishna Mr. Y. Rokesh Kumar. "A NOVEL TECHNIQUE FOR SECURE ENCRYPTED MESSAGES IN MOBILE AND PERVASIVE APPLICATIONS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 7 (2016): 1142–46. https://doi.org/10.5281/zenodo.58633.
Full textMykletun, Einar, Maithili Narasimha, and Gene Tsudik. "Authentication and integrity in outsourced databases." ACM Transactions on Storage 2, no. 2 (2006): 107–38. http://dx.doi.org/10.1145/1149976.1149977.
Full textCapkun, S., M. Cagalj, R. Rengaswamy, I. Tsigkogiannis, J. P. Hubaux, and M. Srivastava. "Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels." IEEE Transactions on Dependable and Secure Computing 5, no. 4 (2008): 208–23. http://dx.doi.org/10.1109/tdsc.2008.11.
Full textChandra, Aravinda Thejas, Rajashekara Murthy Shivarudraiah, Nagaraja Gadde, and Ravi Kumar Begur Nagarajappa. "A novel scheme for enhanced content integrity, authentication, and privacy in information centric network using lightweight blockchain-based homomorphic integrity and authentication." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 1 (2025): 654. http://dx.doi.org/10.11591/ijece.v15i1.pp654-668.
Full textGrandhi, Suresh, and Dr P. S. Avadhani*. "Variable Me mber Group Authentication Protocol using Bivariate Polynomials." International Journal of Innovative Technology and Exploring Engineering 9, no. 5 (2020): 2269–74. http://dx.doi.org/10.35940/ijitee.b7101.039520.
Full textZhang, Xingang, Haowen Yan, Liming Zhang, and Hao Wang. "High-Resolution Remote Sensing Image Integrity Authentication Method Considering Both Global and Local Features." ISPRS International Journal of Geo-Information 9, no. 4 (2020): 254. http://dx.doi.org/10.3390/ijgi9040254.
Full textH.A, Dinesha, and D. H. Rao. "Evaluation of Secure Cloud Transmission Protocol." International Journal of Computer Network and Information Security 9, no. 3 (2017): 45–53. http://dx.doi.org/10.5815/ijcnis.2017.03.06.
Full textAnkush, S., and M. S. Vinayprasad. "Enhance Security for Authentication." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 3 (2020): 311–15. https://doi.org/10.35940/ijrte.C4429.099320.
Full textJain, Avinash, and V. Kapoor. "Novel Hybrid Cryptography for Confidentiality, Integrity, Authentication." International Journal of Computer Applications 171, no. 8 (2017): 35–40. http://dx.doi.org/10.5120/ijca2017915151.
Full textNazar, Rahma, and Shahd Abdulrhman Hasso. "A Review for Video Authentication and Integrity." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 8 (2022): 18–22. http://dx.doi.org/10.47577/technium.v4i8.7210.
Full textHarn, Lein, Hung-Yu Lin, and Shoubao Yang. "A software authentication system for information integrity." Computers & Security 11, no. 8 (1992): 747–52. http://dx.doi.org/10.1016/0167-4048(92)90130-j.
Full textAllyson Eddy, Bram Zoe anak Guillan, Einstein Kent Elias, Eldren Aniell, Shircrayson bin Simon, and Muhammad Faisal. "Blockchain-Enhanced Multi-Factor Authentication for Securing IIoT." International Journal of Electrical Engineering, Mathematics and Computer Science 1, no. 3 (2024): 01–24. http://dx.doi.org/10.62951/ijeemcs.v1i3.16.
Full textALTAF HUSSAIN, SAKIINAH, AZNI HASLIZAN AB HALIM, and NAJWA HAYAATI MOHD ALWI. "SYSTEMATIC LITERATURE REVIEW FOR LIGHTWEIGHT AUTHENTICATION ALGORITHM IN THE IoT." JOURNAL OF SUSTAINABILITY SCIENCE AND MANAGEMENT 17, no. 9 (2022): 162–78. http://dx.doi.org/10.46754/jssm.2022.09.011.
Full textManazipet, Pranitha, Sai Nukesh Matta, Vivek Kumar Ananthula, and Vive Harini. "DATA SECURITY ENHANCEMENT IN CLOUD COMPUTING USING AES ENCRYPTION." International Journal of Advanced Logistics, Transport and Engineering 8, no. 4 (2023): 34–51. http://dx.doi.org/10.52167/2790-5829-2023-8-4-34-51.
Full textGaata, Methaq Talib, and Dr Mustafa Dhiaa Al-Hassani. "Authentication and Integrity of E-documents based on Zero-Watermarking Method." Webology 19, no. 1 (2022): 5058–67. http://dx.doi.org/10.14704/web/v19i1/web19340.
Full textRahayu, Maya, Md Biplob Hossain, Samsul Huda, Yuta Kodera, Md Arshad Ali, and Yasuyuki Nogami. "The Design and Implementation of Kerberos-Blockchain Vehicular Ad-Hoc Networks Authentication Across Diverse Network Scenarios." Sensors 24, no. 23 (2024): 7428. http://dx.doi.org/10.3390/s24237428.
Full textChandra, Aravinda Thejas, Rajashekara Murthy Shivarudraiah, Nagaraja Gadde, and Ravi Kumar Begur Nagarajappa. "A novel scheme for enhanced content integrity, authentication, and privacy in information centric network using lightweight blockchain-based homomorphic integrity and authentication." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 1 (2025): 654–68. https://doi.org/10.11591/ijece.v15i1.pp654-668.
Full textShah, Richa, and Shatendra Kumar Dubey. "Multi User Authentication for Reliable Data Storage in Cloud Computing." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 2 (2024): 82–89. http://dx.doi.org/10.32628/cseit2410138.
Full textLing, Fang Ting, Ng Hui Wen, Tsi Shi Ping, Vivian Bong Chiaw Cin, Yew Wei Yi, and Muhammad Faisal. "Enhancing Aspects of IIoT Networks with Federated Learning Blockchain Integrated Authentication Solution." International Journal of Electrical Engineering, Mathematics and Computer Science 1, no. 3 (2024): 25–42. http://dx.doi.org/10.62951/ijeemcs.v1i3.17.
Full textHung-Yu Chien. "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity." IEEE Transactions on Dependable and Secure Computing 4, no. 4 (2007): 337–40. http://dx.doi.org/10.1109/tdsc.2007.70226.
Full textKanjanapruthipong, Wata, and Sirapat Boonkrong. "Blockchain-Based Decentralised Authentication in Closed Environments." Future Internet 17, no. 3 (2025): 98. https://doi.org/10.3390/fi17030098.
Full textGuan, Ming Shan, and Hai Feng Ma. "Confidentiality and Integrity Protection Method Based on One Time Encryption." Applied Mechanics and Materials 241-244 (December 2012): 2434–38. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2434.
Full textS, Ms Pratyaksha. "SECURE & VERIFIABLE E VOTING USING BLOCKCHAIN." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34546.
Full textGolar, Priti C., and Rika Sharma. "An Advanced Knowledge Based Graphical Authentication Framework with Guaranteed Confidentiality and Integrity." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 720–30. http://dx.doi.org/10.17762/ijritcc.v11i8s.7676.
Full textMohammed, Mazen, Alaa Eldin Rohiem, and Ali El-moghazy. "Enhancement Packet Authentication and integrity in SRTP Protocol." International Conference on Electrical Engineering 7, no. 7 (2010): 1–12. http://dx.doi.org/10.21608/iceeng.2010.33243.
Full textCapkun, Srdjan, Mario Cagalj, Ghassan Karame, and Nils Ole Tippenhauer. "Integrity Regions: Authentication through Presence in Wireless Networks." IEEE Transactions on Mobile Computing 9, no. 11 (2010): 1608–21. http://dx.doi.org/10.1109/tmc.2010.127.
Full textYavuz, Attila Altay. "Immutable Authentication and Integrity Schemes for Outsourced Databases." IEEE Transactions on Dependable and Secure Computing 15, no. 1 (2018): 69–82. http://dx.doi.org/10.1109/tdsc.2016.2530708.
Full textAgrawal, Arpit, and Shubhangi Verma. "A Tpa-Authentication Scheme for Public Cloud Using Kerberos Protocol." Oriental journal of computer science and technology 10, no. 2 (2017): 460–66. http://dx.doi.org/10.13005/ojcst/10.02.29.
Full textPhin, Ch’ng Chen, Nurul Hidayah Ab Rahman, and Noraini Che Pa. "A Digital Image Watermarking System: An Application of Dual Layer Watermarking Technique." JOIV : International Journal on Informatics Visualization 1, no. 4-2 (2017): 199. http://dx.doi.org/10.30630/joiv.1.4-2.78.
Full textXu, Dingjie, Na Ren, and Changqing Zhu. "Integrity Authentication Based on Blockchain and Perceptual Hash for Remote-Sensing Imagery." Remote Sensing 15, no. 19 (2023): 4860. http://dx.doi.org/10.3390/rs15194860.
Full textGurpreet, Kour Sodhi, Singh Gaba Gurjot, Kansal Lavish, et al. "Preserving Authenticity and Integrity of Distributed Networks through Novel Message Authentication Code." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1297–304. https://doi.org/10.11591/ijeecs.v12.i3.pp1297-1304.
Full textZhang, Tiantian, Zhiyong Zhang, Kejing Zhao, Brij B. Gupta, and Varsha Arya. "A Lightweight Cross-Domain Authentication Protocol for Trusted Access to Industrial Internet." International Journal on Semantic Web and Information Systems 19, no. 1 (2023): 1–25. http://dx.doi.org/10.4018/ijswis.333481.
Full textJournal, IJSREM. "TRANSACTORY AUTHENTICATION USING KERBEROS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–13. http://dx.doi.org/10.55041/ijsrem28321.
Full textGao, Xiao, Wenyin Zhang, Bin Zhao, Jiqun Zhang, Jiuru Wang, and Yilong Gao. "Product Authentication Technology Integrating Blockchain and Traceability Structure." Electronics 11, no. 20 (2022): 3314. http://dx.doi.org/10.3390/electronics11203314.
Full textEchandouri, Bouchra, Fouzia Omary, Fatima Ezzahra Ziani, and Anas Sadak. "SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm." International Journal of Information Security and Privacy 12, no. 3 (2018): 16–26. http://dx.doi.org/10.4018/ijisp.2018070102.
Full textS, Er Gowsalya,. "IDsMA: AN INTEGRATED DIGITAL SIGNATURE AND MUTUAL AUTHENTICATION MECHANISM FOR SECURING THE COGNITIVE RADIO NETWORKS." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31071.
Full textK. Sodhi, Gurpreet, Gurjot S. Gaba, Lavish Kansal, et al. "Preserving Authenticity and Integrity of Distributed Networks through Novel Message Authentication Code." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1297. http://dx.doi.org/10.11591/ijeecs.v12.i3.pp1297-1304.
Full textRuba, N., and A. S. A. Khadir. "Session password Blum–Goldwasser cryptography based user three layer authentication for secured financial transaction." Scientific Temper 15, no. 01 (2024): 1826–31. http://dx.doi.org/10.58414/scientifictemper.2024.15.1.34.
Full textTalekar, P. R. "Harmonizing Blockchain-Based Authentication Systems with Yogic Principles: Towards Enhanced Privacy in Digital Identity Management." International Journal of Advance and Applied Research 5, no. 12 (2024): 150–52. https://doi.org/10.5281/zenodo.11655957.
Full textWei, Qiang, Ze Hui Wu, Rong Hua Tao, and Dong Ren. "Authentication Algorithm Based on Hash-Tree for Web Single Sign-On." Applied Mechanics and Materials 490-491 (January 2014): 1368–73. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1368.
Full textRehman, Shafiq Ur, Hafiz Gulfam Ahmad Umar, Muhammad Aoun, et al. "Advanced Authentication and Access Control for Encrypted Images in the 3D Cube Domain." Bulletin of Business and Economics (BBE) 12, no. 3 (2023): 640–49. http://dx.doi.org/10.61506/01.00084.
Full textNwogu, Emeka Reginald, Wilson Chukwuemeka Ahiara, and Peter Mathew Aondohemba. "Enhancing the Robustness of a Three-Layer Security Electronic Voting System Using Kerberos Authentication." ABUAD Journal of Engineering Research and Development (AJERD) 6, no. 2 (2023): 73–84. http://dx.doi.org/10.53982/ajerd.2023.0602.08-j.
Full textHao, Zhuo, Sheng Zhong, and Nenghai Yu. "A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing." International Journal of Computers Communications & Control 6, no. 2 (2011): 227. http://dx.doi.org/10.15837/ijccc.2011.2.2170.
Full textZhang, Xingang, He Li, Xiao Tian, Rui Zhang, and Qinglei Qi. "Certificateless Authentication Scheme Based on Blockchain in Smart Home Network." Mathematical Problems in Engineering 2022 (August 26, 2022): 1–13. http://dx.doi.org/10.1155/2022/6458461.
Full textBojič Burgos, Jay, and Matevž Pustišek. "Decentralized IoT Data Authentication with Signature Aggregation." Sensors 24, no. 3 (2024): 1037. http://dx.doi.org/10.3390/s24031037.
Full textLu, He-Jun, and Dui Liu. "An improved NFC device authentication protocol." PLOS ONE 16, no. 8 (2021): e0256367. http://dx.doi.org/10.1371/journal.pone.0256367.
Full textAlsulaimi, Bader Muteb. "Blockchain integrated data processing model for enabling security in Education 4.0." Fusion: Practice and Applications 14, no. 1 (2024): 190–220. http://dx.doi.org/10.54216/fpa.140116.
Full textAlbahadily, Hassan Kassim, Ismael Abdulsatar Jabbar, Alaa Abdulhussaien Altaay, and Xunhuan Ren. "Issuing Digital Signatures for Integrity and Authentication of Digital Documents." Al-Mustansiriyah Journal of Science 34, no. 3 (2023): 50–55. http://dx.doi.org/10.23851/mjs.v34i3.1278.
Full text