Volume 10 Number 2 June 2019


A Reduced Feature Representation based Online Signature Authentication

Youssef Elmir, Nasreddine Karour, Souleymane Ouled Jaafri

https://doi.org/10.6025/jisr/2019/10/2/39-47

Abstract In order to achieve perfection in security field, the biometric recognition has been used as a tool, because it is based on physiological and behavioral characteristics of a person which unlike the traditional prevailing methods of human identification, cannot be forgotten, stolen, eliminated or changed with time. In this paper, a theoretical and general presentation of an online signature based... Read More


Data and Programming Security Issues in Fog Computing

Pranav Vyas, Dharmendra Patel

https://doi.org/10.6025/jisr/2019/10/2/67-76

Abstract IOT devices suffer from the drawbacks of limited computational resources at local level. IOT devices are required to gather and process large quantity of data with limited resources. One solution is to upload data from IOT devices to cloud based systems, which can process data and send results back to devices. This technique suffers from delay in processing and results in... Read More