-
1
-
2
Openstack authentication protocol based on digital certificate
Published 2019-02-01“…As the industry standard for open source cloud platforms,openstack uses the single-factor authentication method based on username and password that provides by keystone components to identity authentication mechanism,while it is not suitable for application scenarios with high security level requirements.A digital certificate-based identity authentication protocol which had cloud user identification protocol and authentication protocol was designed to meet the requirements.With expending the keystone component to achieve a digital certificate-based identity authentication system,a combination of authentication server,UKey technology,encryption technology and well-established key management and so on was used.According to the research,the system can effectively resist multiple cyber-attacks and improve the security of cloud users when they log in to the cloud platform.…”
Get full text
Article -
3
Optimasi Keamanan Web Server Terhadap Serangan Brute-Force Menggunakan Penetration Testing
Published 2023-02-01“…Hasil uji coba simulasi serangan pada server berhasil dilakukan dengan mendapatkan username dan password, hal ini tentunya berbahaya system dapat diambil alih oleh penyusup. …”
Get full text
Article -
4
Sistem Berbasis Private Blockchain sebagai Penyedia Layanan Autentikasi Publisher-Broker-Subscriber Pada Protokol Message Queue Telemetry Transport
Published 2022-08-01“… Protokol MQTT pada umumnya menggunakan username dan password untuk memvalidasi klien yang terhubung ke broker. …”
Get full text
Article -
5
Evaluation of Bacillus coagulans LMG S-31876 for immunomodulation and stress: a double-blind, placebo-controlled clinical trial
Published 2025-01-01“…trialid=77914&EncHid=24313.96864&userName=CTRI/2023/01/048720, CTRI/2023/01/048720.…”
Get full text
Article -
6
Understanding Citizens’ Response to Social Activities on Twitter in US Metropolises During the COVID-19 Recovery Phase Using a Fine-Tuned Large Language Model: Application of AI
Published 2025-02-01“…In addition, for privacy considerations, any identifiable information, such as author IDs and usernames, was excluded, retaining only the text for analysis. …”
Get full text
Article -
7
Explainable artificial intelligence in web phishing classification on secure IoT with cloud-based cyber-physical systems
Published 2025-01-01“…Generally, phishers use strategies such as advanced phishing software and fake emails to illegally acquire confidential details like usernames and passwords from financial accounts. This article develops an Explainable Artificial Intelligence with Aquila Optimization Algorithm in Web Phishing Classification (XAIAOA-WPC) approach on secure Cyber-Physical Systems. …”
Get full text
Article