Authentication (law)
View article: CULTURAL IDENTITY OF CHINESE INTANGIBLE HERITAGE AND THE INTEGRATION OF DIGITAL CREATIVE TECHNOLOGY: WUHU IRON PAINTING
CULTURAL IDENTITY OF CHINESE INTANGIBLE HERITAGE AND THE INTEGRATION OF DIGITAL CREATIVE TECHNOLOGY: WUHU IRON PAINTING Open
Background: Wuhu iron painting, a nationally recognized intangible cultural heritage of China, reflects a unique fusion of artistry and craftsmanship with profound cultural value. Nevertheless, in the face of modernization…
View article: CULTURAL IDENTITY OF CHINESE INTANGIBLE HERITAGE AND THE INTEGRATION OF DIGITAL CREATIVE TECHNOLOGY: WUHU IRON PAINTING
CULTURAL IDENTITY OF CHINESE INTANGIBLE HERITAGE AND THE INTEGRATION OF DIGITAL CREATIVE TECHNOLOGY: WUHU IRON PAINTING Open
Background: Wuhu iron painting, a nationally recognized intangible cultural heritage of China, reflects a unique fusion of artistry and craftsmanship with profound cultural value. Nevertheless, in the face of modernization, this traditiona…
View article: A Privacy-Preserving System for Border Crossing and Inspection
A Privacy-Preserving System for Border Crossing and Inspection Open
This paper presents a privacy-preserving system for border crossing and inspection composed of two Android applications: the Pre-Registration App and the Border GuardApp. The system enables travelers to manage their trips, precapture docum…
View article: GLMVH Foundational Research Paper: Reinventing Global Labour Mobility Verification through AI-Driven Digital Governance
GLMVH Foundational Research Paper: Reinventing Global Labour Mobility Verification through AI-Driven Digital Governance Open
This research paper introduces the foundational digital governance framework of the Global Labour Mobility Verification Hub (GLMVH), a Dubai-born GovTech ecosystem designed to modernize ethical labour recruitment across Africa–Asia–GCC cor…
View article: Secure transmission method of asymmetric encryption of blockchain data under trust degree
Secure transmission method of asymmetric encryption of blockchain data under trust degree Open
In order to solve the problem that blockchain data cannot be tampered with after being uploaded, which will increase the risk of privacy leakage, an asymmetric encryption and secure transmission method of blockchain data under trust is pro…
View article: A Patient Data Portal with Secure Login, Report History and Doctor Access Using Speech-to-Text
A Patient Data Portal with Secure Login, Report History and Doctor Access Using Speech-to-Text Open
Problem: The inadequate security, lack of patient autonomy, and low accessibility of traditional patient portals limit user involvement and jeopardize the protection of protected health information (PHI). Current methods frequently exclude…
View article: Identification, Authentication and Extraction Techniques for Tinospora cordifolia (Giloy): A comprehensive review
Identification, Authentication and Extraction Techniques for Tinospora cordifolia (Giloy): A comprehensive review Open
Accurate identification and authentication of medicinal plants underpin both the safety and efficacy of herbal preparations. The climber Tinospora cordifolia (Willd.) Miers (commonly known as Guduchi or Giloy) is widely used in traditional…
View article: "10 Human Participants Gait Data collected outdoors from two smartwatches placed on each wrist"
"10 Human Participants Gait Data collected outdoors from two smartwatches placed on each wrist" Open
"Assistive robotic systems are crucial in healthcare; however, their safe adoption is hindered by traditional authentication methods that present significant usability challenges. Assistive robots must authenticate users continuously witho…
View article: Protecting employee tax information: Cybersecurity strategy for employers
Protecting employee tax information: Cybersecurity strategy for employers Open
In today’s increasingly digital work environment, protecting employee tax information has become a critical aspect of organizational cybersecurity strategy. Employers store and process vast amounts of sensitive personal and financial data,…
View article: Identification, Authentication and Extraction Techniques for Tinospora cordifolia (Giloy): A comprehensive review
Identification, Authentication and Extraction Techniques for Tinospora cordifolia (Giloy): A comprehensive review Open
Accurate identification and authentication of medicinal plants underpin both the safety and efficacy of herbal preparations. The climber Tinospora cordifolia (Willd.) Miers (commonly known as Guduchi or Giloy) is widely used in traditional…
View article: Protecting employee tax information: Cybersecurity strategy for employers
Protecting employee tax information: Cybersecurity strategy for employers Open
In today’s increasingly digital work environment, protecting employee tax information has become a critical aspect of organizational cybersecurity strategy. Employers store and process vast amounts of sensitive personal and financial data,…
View article: Design and Implementation of an Arduino-Based Password Controlled Door Lock System
Design and Implementation of an Arduino-Based Password Controlled Door Lock System Open
This research paper presents the design and implementation of a password-controlled door lock system using Arduino UNO.Traditional locks are often vulnerable to key loss and duplication. The proposed system enhances security through digita…
View article: A Patient Data Portal with Secure Login, Report History and Doctor Access Using Speech-to-Text
A Patient Data Portal with Secure Login, Report History and Doctor Access Using Speech-to-Text Open
Problem: The inadequate security, lack of patient autonomy, and low accessibility of traditional patient portals limit user involvement and jeopardize the protection of protected health information (PHI). Current methods frequently exclude…
View article: The Future of Point-of-Sale User Experience in Ledger-Native Payments
The Future of Point-of-Sale User Experience in Ledger-Native Payments Open
Ledger-native payment systems introduce a radically new interaction paradigm at the point of sale. Rather than relying on legacy card-based processing networks, these systems enable merchant devices and user devices to collaboratively perf…
View article: Theoretical Framework for Unified Avatar-Token-DNA-NFT System
Theoretical Framework for Unified Avatar-Token-DNA-NFT System Open
Avatar-Token-DNA-NFT System - Brief Overview A Revolutionary Approach to Biological Identity Authentication The Avatar-Token-DNA-NFT system integrates quantum biology, genetic biometrics, and blockchain technology to create the first ident…
View article: Assessment of Security Threats in Academic Institutions from Distance Learning Practices
Assessment of Security Threats in Academic Institutions from Distance Learning Practices Open
The rapid adoption of distance learning in higher education has transformed academic delivery, enabling institutions to maintain continuity of education during global disruptions. However, this reliance on digital platforms has simultaneou…
View article: Cyber Security: Threats, Challenges, and Modern Protection Mechanisms
Cyber Security: Threats, Challenges, and Modern Protection Mechanisms Open
This research paper provides a comprehensive analysis of modern cybersecurity threats and the evolving landscape of digital risks at both global and national levels. It examines how cyberattacks—such as malware, phishing, ransomware, ident…
View article: Theoretical Framework for Unified Avatar-Token-DNA-NFT System
Theoretical Framework for Unified Avatar-Token-DNA-NFT System Open
Avatar-Token-DNA-NFT System - Brief Overview A Revolutionary Approach to Biological Identity Authentication The Avatar-Token-DNA-NFT system integrates quantum biology, genetic biometrics, and blockchain technology to create the first ident…
View article: JIS: JTel Identity Standard - Semantic Security Protocol for Intent-First Computing
JIS: JTel Identity Standard - Semantic Security Protocol for Intent-First Computing Open
View article: "TCHAD-100: A Cross-Cultural Keystroke Dynamics Dataset from 100 Chadian Participants"
"TCHAD-100: A Cross-Cultural Keystroke Dynamics Dataset from 100 Chadian Participants" Open
"TCHAD-100 is a behavioral biometric dataset dedicated to keystroke dynamics analysis, collected from 100 Chadian participants in a real-world academic environment. The dataset includes dwell times, flight times, demographic metadata, and …
View article: Assessment of Security Threats in Academic Institutions from Distance Learning Practices
Assessment of Security Threats in Academic Institutions from Distance Learning Practices Open
The rapid adoption of distance learning in higher education has transformed academic delivery, enabling institutions to maintain continuity of education during global disruptions. However, this reliance on digital platforms has simul…
View article: JIS: JTel Identity Standard - Semantic Security Protocol for Intent-First Computing
JIS: JTel Identity Standard - Semantic Security Protocol for Intent-First Computing Open
View article: Cyber Security: Threats, Challenges, and Modern Protection Mechanisms
Cyber Security: Threats, Challenges, and Modern Protection Mechanisms Open
This research paper provides a comprehensive analysis of modern cybersecurity threats and the evolving landscape of digital risks at both global and national levels. It examines how cyberattacks—such as malware, phishing, ransomware, ident…
View article: The Future of Point-of-Sale User Experience in Ledger-Native Payments
The Future of Point-of-Sale User Experience in Ledger-Native Payments Open
Ledger-native payment systems introduce a radically new interaction paradigm at the point of sale. Rather than relying on legacy card-based processing networks, these systems enable merchant devices and user devices to collaboratively perf…
View article: A Framework for Developing Scalable E-Commerce Systems: Design and Implementation of Mizan Mart Store
A Framework for Developing Scalable E-Commerce Systems: Design and Implementation of Mizan Mart Store Open
This paper presents a comprehensive model and implementation of Mizan Mart Store, a fully functional e-commerce platform developed using the Django web framework. The proposed system is designed to address the essential requirements of mod…
View article: Spring Security Notes: An Analytical Approach to Modern Authentication and Authorization
Spring Security Notes: An Analytical Approach to Modern Authentication and Authorization Open
View article: miosync-masa/meteor-nc: Meteor Web 4.0 - The Quantum-Resistant Decentralized Internet
miosync-masa/meteor-nc: Meteor Web 4.0 - The Quantum-Resistant Decentralized Internet Open
Meteor-NC: The Quantum-Resistant Decentralized Internet Stack Complete infrastructure for Web 4.0: quantum-resistant encryption, 32-byte identity, serverless P2P, passwordless authentication, and distributed storage — all from a single 32-…
View article: Exploring Approaches to Authentication in REST API
Exploring Approaches to Authentication in REST API Open
This research presents an empirical framework for authentication method se-lection in REST API architectures through systematic quantitative analysis ofsecurity-performance tradeoffs. We conduct comprehensive experimental evalua-tion of th…
View article: PRISMA 2020 Checklist and Flow Diagram for "A Systematic Literature Review on Biometric Authentication in Mobile Banking"
PRISMA 2020 Checklist and Flow Diagram for "A Systematic Literature Review on Biometric Authentication in Mobile Banking" Open
View article: Exploring Approaches to Authentication in REST API
Exploring Approaches to Authentication in REST API Open
This research presents an empirical framework for authentication method se-lection in REST API architectures through systematic quantitative analysis ofsecurity-performance tradeoffs. We conduct comprehensive experimental evalua-tion of th…