No photo of Juanita Boyle

Juanita Boyle, (PhD Researcher)

  • 2 Citations
  • 1 h-Index
20172018
If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Juanita Boyle is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 1 Similar Profiles
Authentication Engineering & Materials Science
Crime Engineering & Materials Science
Learning systems Engineering & Materials Science
Steganography Engineering & Materials Science
Human computer interaction Engineering & Materials Science
Digital storage Engineering & Materials Science
Discrete wavelet transforms Engineering & Materials Science
Industry Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2017 2018

  • 2 Citations
  • 1 h-Index
  • 4 Paper
  • 1 Article

A Review of Identity, Identification & Authentication

Blue, J., Condell, J. & Lunney, T., 28 Sep 2018, (Accepted/In press) In : International Journal for Information Security Research. 8, 2, p. 794-804 11 p., 561.

Research output: Contribution to journalArticle

Open Access
File
Crime
Authentication

Bayesi-Chain: Intelligent Identity Authentication

Blue, J., Condell, J. & Lunney, T., 20 Jun 2018, p. 1-6. 6 p.

Research output: Contribution to conferencePaper

Open Access
File
Authentication
Learning systems
Crime

Digital Footprints: Your Unique Identity

Blue, J., Condell, J. & Lunney, T., 3 Jul 2018, p. 1-4. 4 p.

Research output: Contribution to conferencePaper

Open Access
File
Human computer interaction
Learning systems

A Novel Approach for Secure Identity Authentication in Legacy Database Systems

Blue, J., Furey, E. & Condell, J., 21 Jun 2017, p. 1-6. 6 p.

Research output: Contribution to conferencePaper

Open Access
File
Authentication
Industry
Servers
Data privacy
Crime

Identity Document Authentication using Steganographic Techniques: The Challenges of Noise

Blue, J., Condell, J. & Lunney, T., 21 Jun 2017, p. 1-6. 6 p.

Research output: Contribution to conferencePaper

Open Access
File
Steganography
Authentication
Digital storage
Discrete wavelet transforms
Discrete cosine transforms