Mobile devices are becoming more pervasive and more advanced with respect to their processing power and memory size. Relying on the personalized and trusted nature of such devices, security features can be deployed on them in order to uniquely identify a user to a service provider. In this paper, the ...Download Now
Cloud security is one of most important issues that have attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually involve early stage actions such ...Download Now
Mobile Ad-hoc NETworks (MANETS) are particularly useful and well-suited for critical scenarios, including military, law enforcement as well as emergency rescue and disaster recovery. An Unobservable Secure On-demand Routing protocol (USOR) scheme achieves content unobservability by employing anonymous key establishment based on group signature for improving the performance of a ...Download Now
In this paper, the authors propose an idea that involves iris, retina signature analysis for identity recognition for prevention of credit card fraud. They employ Canny Edge Detector algorithm for detection of vessel pattern in the retina. This process is performed at the Automatic Teller Machine (ATM) and Self Service ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?