Search
Now showing items 1-8 of 8
FUTURE OF JPEG XT: PRIVACY AND SECURITY
(2016-05-10)
JPEG is de facto the most important and popular image format since 1992 which provides compressed images to a great extent. JPEG XT, the latest standardization of the JPEG committee, provides some amazing features like: ...
TaPIN: A Two-Factor User Authentication Scheme for Smartwatches through Secret Finger Tapping
(2020-05-11)
Nowadays, smartwatches have become one of the most common wearable gadgets as they are small and portable. As more and more personal information is managed and processed inside smartwatches, it is important to have a secure ...
User Syndication Using Speech Rhythm
(2019-08-08)
In recent years we have seen a variety of approaches to increase security on computers and mobile devices including fingerprint, and facial recognition. Such techniques while effective are very expensive. Voice biometrics, ...
Improving Performance and Security in Anonymity Systems
(2018-09-06)
Tor is an anonymity network that provides online privacy for the Internet users. Tor hides the user's traffic among the others' traffic. The more users Tor attracts, the stronger anonymity it provides. Unfortunately, users ...
"How Good are They?" - A State of the Effectiveness of Anti-Phishing Tools on Twitter
(2020-07-02)
Phishing websites are one of the most pervasive online attack vectors, with nearly 1.5 million such attacks created every month. Social media is the primary ground for phishing attacks, with 86% of these attacks originating ...
A Survey on DDoS Attacks in Edge Servers
(2020-12-09)
In modern times, the need for latency sensitive applications is growing rapidly. Cloud computing
infrastructure is unable to provide support to such delay sensitive applications. Therefore, a new
paradigm called edge ...
EMAuth: A USABLE CONTINUOUS AUTHENTICATION SCHEME
(2023-05-18)
**Please note that the full text is embargoed until 05/12/2025** ABSTRACT: In recent years, wearables have become an integral part of daily life for most
users. Wearables provide a seamless supplement to their main ...
Hierarchical Representation Learning with Connectionist Models
(2018-03-01)
To unleash the power of big data, efficient algorithms which are scalable to millions of data are desired. Deep learning is one area that benefits from big data enormously. Deep learning uses neural networks to mimic human ...