Listar por tema "security"
Mostrando ítems 1-20 de 37
-
A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)Cloud computing is becoming a key factor in computer science and an important technology for many organizations to deliver different types of services. The companies which provide services to customers are called as cloud ... -
A New Mail System for Secure Data Transmission in Cyber Physical Systems
(International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 12/2020)This paper provides a complete study on email requirements, with special emphasis on its security aspects and architecture. It explores how current protocols have evolved, the environment in which they have been developed ... -
A Secure Email Solution Based on Blockchain
(Springer Science and Business Media Deutschland GmbH, 2022)Email is one of the most important online communication services between individuals and businesses. The large amount of information that passes through this medium is the object of desire for many attackers who use a whole ... -
A Security Situation Awareness Approach for IoT Software Chain Based on Markov Game Model
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 09/2022)Since Internet of Things (IoT) has been widely used in our daily life nowadays, it is regarded as a promising and popular application of the Internet, and has attracted more and more attention. However, IoT is also suffered ... -
Analysis of Security Mechanisms Based on Clusters IoT Environments
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)Internet of things is based on sensors, communication networks and intelligence that manages the entire process and the generated data. Sensors are the senses of systems, because of this, they can be used in large quantities. ... -
Analysis of WEB Browsers of HSTS Security Under the MITM Management Environment
(Springer Science and Business Media Deutschland GmbH, 2021)The transactional websites and services on the cloud, have actually become the most used browsers, thanks to their portability and ease of use, with a significant increase in the development of cloud solutions, implementing ... -
Application of Smart Contracts in Online Product Procurement
(Smart Innovation, Systems and Technologies, 2022)In this work, a platform for the acquisition of online products is presented, where companies finally offer merchandise, so that users can buy from the comfort of their homes, taking into account that each of the parties ... -
Biometry, the safe key
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2010)Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key? -
Blockchain-Based Medical Certificate Generation and Verification for IoT-Based Healthcare Systems
(IEEE Consumer Electronics Magazine, 2023)Nowadays, medical certificates are very important for many users as they want to avail health benefits like tax purposes, insurance claims, legal procedures, and many more. Generating, issuing, and maintaining medical ... -
El derecho humano a la seguridad ciudadana de personas especialmente vulnerables en Colombia
(30/06/2022)El presente trabajo de investigación se titula el derecho humano a la seguridad ciudadana de personas especialmente vulnerables en Colombia, cuyo objetivo principal es diseñar una estrategia jurídica para fortalecer la ... -
Diseño de dispositivo de mejora de visibilidad para ciclistas en días de lluvia
(22/09/2021)En los últimos años, nuestro país ha experimentado un aumento considerable de personas que usan la bicicleta ya sea, como medio de transporte del día a día o para realizar deporte de manera amateur y/o profesional. Las ... -
Edge Face Recognition System Based on One-Shot Augmented Learning
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 09/2022)There is growing concern among users of computer systems about how their data is handled. In this sense, IT (Information Technology) professionals are not unaware of this problem and are looking for solutions to meet the ... -
Effective filter for common injection attacks in online web applications
(IEEE Access, 2021)Injection attacks against web applications are still frequent, and organizations like OWASP places them within the Top Ten of security risks to web applications. The main goal of this work is to contribute to the community ... -
Euclidean Distance Distortion Based Robust and Blind Mesh Watermarking
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2016)The three-dimensional (3D) polygonal meshes are recently widely used in several domains, which necessitate the realistic visualization of the objects. Moreover, there is an urgent need to protect the 3D data properties for ... -
Explainable AI for Human-Centric Ethical IoT Systems
(IEEE Transactions on Computational Social Systems, 2024)The current era witnesses the notable transition of society from an information-centric to a human-centric one aiming at striking a balance between economic advancements and upholding the societal and fundamental needs of ... -
Genetic Operators Applied to Symmetric Cryptography
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2019)In this article, a symmetric-key cryptographic algorithm for text is proposed, which applies Genetic Algorithms philosophy, entropy and modular arithmetic. An experimental methodology is used over a deterministic system, ... -
Implementación de la tecnología Blockchain al sistema sanitario europeo (Blocksse)
(22/09/2021)El sector de la sanidad es hoy en día uno de los sectores más importantes y uno de los que requiere estar innovando más constantemente, más aún con la crisis del COVID-19. Tener los datos actualizados y estructurados es ... -
Improvement in Quality of Service Against Doppelganger Attacks for Connected Network
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 09/2022)Because they are in a high-risk location, remote sensors are vulnerable to malicious ambushes. A doppelganger attack, in which a malicious hub impersonates a legitimate network junction and then attempts to take control ... -
Improving security of medical big data by using Blockchain technology
(Elsevier Ltd, 2021)Big data refers to a very large and diverse set of data that grow at exponential rates. In the modern healthcare system, medical big data face many security issues due to the presence of hackers and malicious users. Nowadays, ... -
Knowledge management as a tool for improving business processes: an action research approach
(Journal of Industrial Engineering and Management, 2018)Purpose: The aim of this study is to investigate the importance of Knowledge Management as a tool for improving business processes in a different context from the industrial organizations, as an archaeological museum. ...