„Authentication“
Suchergebnisse
3.280 Treffer
-
Applied information security – a hands-on approach
-
On the Security of “Secure and Lightweight Authentication with Key Agreement for Smart Wearable Systems”
-
An efficient anonymous batch authentication scheme based on priority and cooperation for VANETs
-
Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code
-
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing
-
Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
-
Quantum identity authentication without entanglement
-
IoT Enabled RFID Authentication and Secure Object Tracking System for Smart Logistics
-
A SDR-based verification platform for 802.11 PHY layer security authentication
-
Chloroplast DNA-derived markers for the authentication of oriental medicinal Rubus species and mistaken identity of bokbunja in the local markets of Korea
-
The use of thermal analysis methods for authentication and conservation state determination of historical and/or cultural objects manufactured from leather
-
DNA barcoding in authentication of herbal raw materials, extracts and dietary supplements: a perspective
-
Continuous User Authentication System: A Risk Analysis Based Approach
-
Extension of an Efficient 3GPP Authentication and Key Agreement Protocol
-
Privacy Protection for Point-of-Care Using Chaotic Maps-Based Authentication and Key Agreement
-
Sourdough authentication: quantitative PCR to detect the lactic acid bacterial microbiota in breads
-
Saccadic trajectory-based identity authentication
-
A Survey of Transform Domain based Semifragile Watermarking Schemes for Image Authentication
-
Replay attack detection based on distortion by loudspeaker for voice authentication
-
A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks