„Authentication“
Suchergebnisse
3.280 Treffer
-
Efficient secure data retrieval on cloud using multi-stage authentication and optimized blowfish algorithm
-
Security Framework
-
Pro ASP.NET Core Identity – Under the Hood with Authentication and Authorization in ASP.NET Core 5 and 6 Applications
-
An Ultra-Lightweight Mutual Authentication Protocol Based on LPN Problem with Distance Fraud Resistant
-
An improved source location privacy protection using adaptive trust sector-based authentication with honey encryption algorithm in WSN
-
IOV-a novel mechanism for initiating secure vehicle data transmission using PSO with two phase authentication
-
Finger knuckle print recognition for personal authentication based on relaxed local ternary pattern in an effective learning framework
-
A Secure User Authentication Protocol Based on ECC for Cloud Computing Environment
-
VoIP over IP with fingerprint authentication and digital signature
-
Public key versus symmetric key cryptography in client–server authentication protocols
-
Binary phase hopping based spreading code authentication technique
-
A survey on fragile watermarking based image authentication schemes
-
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
-
Security of facial biometric authentication for attendance system
-
An efficient low bit rate image watermarking and tamper detection for image authentication
-
An Efficient Authentication Scheme Using Blockchain Technology for Wireless Sensor Networks
-
SpyChain: A Lightweight Blockchain for Authentication and Anonymous Authorization in IoD
-
Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment
-
Re-AuTh: Lightweight Re-Authentication with Practical Key Management for Wireless Body Area Networks
-
A secure three-factor anonymous roaming authentication protocol using ECC for space information networks