2014 International Conference on Communication and Signal Processing 2014
DOI: 10.1109/iccsp.2014.6949992
|View full text |Cite
|
Sign up to set email alerts
|

Biometric verified access control of critical data on a cloud

Abstract: The standalone computer machines are powerful with diverse applications. But the actual performance and utilization of these machines was achieved by interlinking them to form networks which will work in coordination and cooperation. Cloud computing, an application of computer networks, deserves a separate field for research due to its enormous applications and elegant performance. The basic intend to develop this technology was to enhance the efficiency, utilization and performance of the computer resources b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
1
1
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…If customer wants to send the money or debit the money from bank account, he/she will get One Time Password on registered mobile phone number. The GSM system created One Time Password for enforce verify [13,14] transaction from the desire bank side. This OTP requires to be entered for the transaction deal to be execute.…”
Section: Architecturementioning
confidence: 99%
“…If customer wants to send the money or debit the money from bank account, he/she will get One Time Password on registered mobile phone number. The GSM system created One Time Password for enforce verify [13,14] transaction from the desire bank side. This OTP requires to be entered for the transaction deal to be execute.…”
Section: Architecturementioning
confidence: 99%
“…They tried to achieve higher performance improvements using various Natural Language Pro-cessing (NLP) techniques and text classification approaches. Some studies use single set features, such as bag of words (BOW) [3], [4], N-grams [5], LIWC [6] or LDA [7], [8] to identify depression in their posts. Some other papers compare the perfor-mance of individual features with various machine learning classifiers [9] - [12].…”
Section: Introductionmentioning
confidence: 99%