„Authentication“
Suchergebnisse
3.280 Treffer
-
LAVA: Log Authentication and Verification Algorithm
-
Secure quantum report with authentication based on six-particle cluster state and entanglement swapping
-
New Authentication Method for Vector Geographic Data Based on Perceptual Hash
-
An effective mechanism for medical images authentication using quick response code
-
Fuzzy enhanced secure multicast routing for improving authentication in MANET
-
Efficient group authentication in RFID using secret sharing scheme
-
Continuous user authentication based score level fusion with hybrid optimization
-
Multimedia image data processing on smartphone for authentication
-
Biometric Authentication for Gender Classification Techniques: A Review
-
Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value
-
Secured and memory overhead controlled data authentication mechanism in cloud computing
-
Multi-biometric authentication system using finger vein and iris in cloud computing
-
Separable authentication in encrypted HEVC video
-
A turtle shell-based visual secret sharing scheme with reversibility and authentication
-
Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
-
A data authentication scheme for UAV ad hoc network communication
-
An identity authentication scheme based on cloud computing environment
-
Anonymous mutual authentication with location privacy support for secure communication in M2M home network services
-
A key agreement authentication protocol using an improved parallel Pollard rho for electronic payment system
-
Personal Authentication Using a Kinect Sensor