The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, researchers have developed Password Managers to correct the problems of memorability in authentication systems. However, existing techniques for storing credential information in these Password Managers are still not quite efficient and secured. In this work, a Mobile-Based Password Manager that creates faux passwords using Transformed-Based Algorithm and the Modified Levenshtein Distance...
The extraction of patterns and rules from large distributed databases through existing Distributed Association Rule Mining (DARM) systems is still faced with enormous challenges such as high response times, high communication costs and inability to adapt to the constantly changing databases. In this work, a Partition Enhanced Mining Algorithm (PEMA) is presented to address these problems. In PEMA,...
Many ICT-based systems used in managing antenatal care are still faced with the problems of inaccessibility, lack of effective consultations and low usability. This paper proposes an architecture, a Mobile Phone-Based Antenatal Care Support System (MPACSS) that addresses the solution to these drawbacks. MPACSS consists of a patient's mobile phone, hospital server, an Electronic Medical Record System...
Over the years, XML technology has been a standard for data representation and data exchange in many areas of information technology particularly those with focus on XML-based description standards for data interchange. Most data exchange involves transfer of confidential information, so there is a logical need for a secured means of storing, transmitting and receiving confidential and sensitive information...
The constant development in computer technology now gives rise to an efficient way of using computer or electronic medium of voting. However, it is being faced with the problem of non-anonymity, coercion and bribery. In this paper, elliptic curve is combined with ElGamal cryptosystem to enhance the security of e-voting architecture. Several points from (x, y) coordinates from elliptic curve are used...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.