Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Security

Series

Computer Sciences

Zayed University

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

Role Of Authentication Factors In Fin-Tech Mobile Transaction Security, Habib Ullah Khan, Muhammad Sohail, Shah Nazir, Tariq Hussain, Babar Shah, Farman Ali Dec 2023

Role Of Authentication Factors In Fin-Tech Mobile Transaction Security, Habib Ullah Khan, Muhammad Sohail, Shah Nazir, Tariq Hussain, Babar Shah, Farman Ali

All Works

Fin-Tech is the merging of finance and technology, to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. In the massive field of business, mobile money transaction security is a great challenge for researchers. The user authentication schemes restrict the ability to enforce the authentication before the account can access and operate. Although authentication factors provide greater security than a simple static password, financial transactions have potential drawbacks because cybercrime expands the opportunities for fraudsters. The most common enterprise challenge is mobile-based user authentication during transactions, which addresses the security issues …


Using Blockchain For Enabling Transparent, Traceable, And Trusted University Ranking Systems, Ammar Battah, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, Ashraf Khalil Jan 2023

Using Blockchain For Enabling Transparent, Traceable, And Trusted University Ranking Systems, Ammar Battah, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, Ashraf Khalil

All Works

Ranking systems have proven to improve the quality of education and help build the reputation of academic institutions. Each of the current academic ranking systems is based on different methodologies, criteria, and standards of measurement. Academic and employer reputations are subjective indicators of some rankings determined through surveying that is neither transparent nor traceable. The current academic ranking systems fall short of providing transparency and traceability features for both subjective and objective indicators that are used to calculate the ranking. Also, the ranking systems are managed and controlled in a centralized manner by specific entities. This raises concerns about fairness …


Nft Certificates And Proof Of Delivery For Fine Jewelry And Gemstones, Noura Alnuaimi, Alanoud Almemari, Mohammad Madine, Khaled Salah, Hamda Al Breiki, Raja Jayaraman Sep 2022

Nft Certificates And Proof Of Delivery For Fine Jewelry And Gemstones, Noura Alnuaimi, Alanoud Almemari, Mohammad Madine, Khaled Salah, Hamda Al Breiki, Raja Jayaraman

All Works

Fine jewelry is a unique class of ornaments composed of precious metals and gemstones. Premium-grade metals such as gold, platinum, and sliver, and gemstones such as pearls, diamonds, rubies, and emeralds are used use to make fine jewelry. Paper-based certificates are typically issued by retailers and producers for fine jewelry and gemstones as a proof of origin, sale, ownership, history, and quality. However, paper certificates are subject to counterfeiting, loss, or theft. In this paper, we show how non-fungible tokens (NFTs) and Ethereum blockchain can be used for digital certification, proof of ownership, sale history, and quality, as well as …


A Systematic Review On Machine Learning Models For Online Learning And Examination Systems, Sanaa Kaddoura, Daniela Elena Popescu, Jude D. Hemanth May 2022

A Systematic Review On Machine Learning Models For Online Learning And Examination Systems, Sanaa Kaddoura, Daniela Elena Popescu, Jude D. Hemanth

All Works

Examinations or assessments play a vital role in every student’s life; they determine their future and career paths. The COVID pandemic has left adverse impacts in all areas, including the academic field. The regularized classroom learning and face-to-face real-time examinations were not feasible to avoid widespread infection and ensure safety. During these desperate times, technological advancements stepped in to aid students in continuing their education without any academic breaks. Machine learning is a key to this digital transformation of schools or colleges from real-time to online mode. Online learning and examination during lockdown were made possible by Machine learning methods. …


Secure Storage Model For Digital Forensic Readiness, Avinash Singh, Richard Adeyemi Ikuesan, Hein Venter Jan 2022

Secure Storage Model For Digital Forensic Readiness, Avinash Singh, Richard Adeyemi Ikuesan, Hein Venter

All Works

Securing digital evidence is a key factor that contributes to evidence admissibility during digital forensic investigations, particularly in establishing the chain of custody of digital evidence. However, not enough is done to ensure that the environment and access to the evidence are secure. Attackers can go to extreme lengths to cover up their tracks, which is a serious concern to digital forensics – particularly digital forensic readiness. If an attacker gains access to the location where evidence is stored, they could easily alter the evidence (if not remove it altogether). Even though integrity checks can be performed to ensure that …


Analysis Of Blockchain Solutions For E-Voting: A Systematic Literature Review, Ali Benabdallah, Antoine Audras, Louis Coudert, Nour El Madhoun, Mohamad Badra Jan 2022

Analysis Of Blockchain Solutions For E-Voting: A Systematic Literature Review, Ali Benabdallah, Antoine Audras, Louis Coudert, Nour El Madhoun, Mohamad Badra

All Works

To this day, abstention rates continue to rise, largely due to the need to travel to vote. This is why remote e-voting will increase the turnout by allowing everyone to vote without the need to travel. It will also minimize the risks and obtain results in a faster way compared to a traditional vote with paper ballots. In fact, given the high stakes of an election, a remote e-voting solution must meet the highest standards of security, reliability, and transparency to gain the trust of citizens. In literature, several remote e-voting solutions based on blockchain technology have been proposed. Indeed, …


A Novel Tunicate Swarm Algorithm With Hybrid Deep Learning Enabled Attack Detection For Secure Iot Environment, Fatma Taher, Mohamed Elhoseny, Mohammed K. Hassan, Ibrahim M. El-Hasnony Jan 2022

A Novel Tunicate Swarm Algorithm With Hybrid Deep Learning Enabled Attack Detection For Secure Iot Environment, Fatma Taher, Mohamed Elhoseny, Mohammed K. Hassan, Ibrahim M. El-Hasnony

All Works

No abstract provided.


Framework For Examination Of Software Quality Characteristics In Conflict: A Security And Usability Exemplar, Bilal Naqvi, Ahmed Seffah, Alain Abran Jan 2020

Framework For Examination Of Software Quality Characteristics In Conflict: A Security And Usability Exemplar, Bilal Naqvi, Ahmed Seffah, Alain Abran

All Works

© 2020, © 2020 The Author(s). This open access article is distributed under a Creative Commons Attribution (CC-BY) 4.0 license. Standards and best practices for software quality guide on handling each quality characteristic individually, but not when two or more characteristics come into conflict such as security and usability. The objectives of this paper are twofold: (a) to argue on the importance of handling the conflicts between quality characteristics in general; (b) to formulate a framework for conflict examination of the software quality characteristics, we do so while considering the specific case of security and usability. In line with the …


The Security Of Big Data In Fog-Enabled Iot Applications Including Blockchain: A Survey, Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir Apr 2019

The Security Of Big Data In Fog-Enabled Iot Applications Including Blockchain: A Survey, Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir

All Works

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today’s society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today’s hyper-connected world, the …


Virtual Environments Testing As A Cloud Service: A Methodology For Protecting And Securing Virtual Infrastructures, Elhadj Benkhelifa, Anoud Bani Hani, Thomas Welsh, Siyakha Mthunzi, Chirine Ghedira Guegan Jan 2019

Virtual Environments Testing As A Cloud Service: A Methodology For Protecting And Securing Virtual Infrastructures, Elhadj Benkhelifa, Anoud Bani Hani, Thomas Welsh, Siyakha Mthunzi, Chirine Ghedira Guegan

All Works

© 2013 IEEE. Testing is a vital component of the system development life cycle. As information systems infrastructure move from native computing to cloud-based and virtualized platforms, it becomes necessary to evaluate their effectiveness to ensure completion of organizational goals. However, the complexity and scale of virtualized environments make this process difficult. Additionally, inherited and novel issues further complicate this process, while relatively high costs can be constraining. Enabling service-driven environments to provide this evaluation is therefore beneficial for both providers and users. No such complete service offering currently exists. This paper is therefore aimed to benefit industry and academia …


Secure And Authenticated Data Communication In Wireless Sensor Networks, Omar Alfandi, Arne Bochem, Ansgar Kellner, Christian Göge, Dieter Hogrefe Aug 2015

Secure And Authenticated Data Communication In Wireless Sensor Networks, Omar Alfandi, Arne Bochem, Ansgar Kellner, Christian Göge, Dieter Hogrefe

All Works

© 2015 by the authors; licensee MDPI, Basel, Switzerland. Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory …