2023 Vol.6 Dec.N06 |
---|
|
Reference: [1] Viddin I M S , Prihandoko A C , Firmansyah D M .An authentication alternative using histogram shifting steganography method[J].Jurnal Teknologi dan Sistem Komputer, 2021, 9(2):106-112. [2] Singh D , Monga S .Blockchain Based Framework for Secure Data Management in Healthcare Information Systems[J].Annals of the Romanian Society for Cell Biology, 2021, 25(6):16933-16946. [3] Xu Z , Liang W , Li K C ,et al. A blockchain-based Roadside Unit-assisted authentication and key agreement protocol for Internet of Vehicles[J]. Journal of Parallel and Distributed Computing, 2021, 149(6):29-39. [4] Abrar A , Abdul W , Ghouzali S .Secure Image Authentication Using Watermarking and Blockchain[J].Intelligent Automation and Soft Computing, 2021,. 28(2):577-591. [5] Willysandro H , Setiawan J , Sulaiman A .Designing a Blockchain-Based Pemilu E-Voting Information System[J]. Technology, 2021, 8(1):42-49. [6] Vishwakarma L , Das D .SCAB - IoTA: Secure communication and authentication for IoT applications using blockchain[J]. Distributed Computing, 2021, 154(4):94-105. [7] Anitha P , Srimathi C .Blockchain based Lebesgue interpolated Gaussian secured information sharing for pharma supply chain[J].International Journal of Intelligent Networks, 2021, 2:204-213. [8] Dwivedi S K , Amin R , Vollala S .Blockchain-Based Secured IPFS-Enable Event Storage Technique with Authentication Protocol in VANET[J].IEEE/CAA Journal of Automatica Sinica, 2021, 8(12):1913-1922. [9] Chen Y , Mittal V , Sridhar S H .Investigating the Academic Performance and Disciplinary Consequences of School District Internet Access Spending:[J ].Journal of Marketing Research, 2021, 58(1):141-162. [10] Okokpujie K , Alex S , Abayomi-Alli O ,et al.Article ID: IJARET_12_03_038, Implementation of a Bimodal Biometric Access Control System for Data Center[J].International Journal of Research in Engineering and Technology, 2021, 12(3):410-420. [11] Watanabe H , Kakizawa H , Sugimoto M .User Authentication Method Using Active Acoustic Sensing[J].Journal of Information Processing, 2021, 29:370 -379. [12] Sun T , Wang X , Lin D ,et al. Medical image security authentication method based on wavelet reconstruction and fractal dimension:[J].International Journal of Distributed Sensor Networks, 2021, 17(4):1-33. [13] Bastina A A M .Secure Data Access Computing Model on Mobile Cloud Data using Fusion of Finger Print and Face biometric authentication based on Discrete Combinational models[J].Bioscience Biotechnology Research Communications, 2021, 14(7):292-298. [14] Yadav C , Patro B D K , Yadav V .Authentication, Access Control, VM Allocation and Energy efficiency towards Securing Computing Environments in Cloud Computing[J].Annals of the Romanian Society for Cell Biology, 2021, 25(6):17939-17954. [15] Han J . Simulation of Trusted Access Security Authentication Method for Heterogeneous Fusion Communication Network[J]. Computer Simulation,2021(5)103-107.
|
Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16