„Authentication“
Suchergebnisse
3.280 Treffer
-
A homomorphic encrypted reversible information hiding scheme for integrity authentication and piracy tracing
-
Face authentication in encrypted domain based on correlation filters
-
Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
-
A security-enhanced mutual authentication scheme with privacy protected in wireless sensor networks
-
Authentication based on blind signature and ring signature algorithms during vertical handover in heterogeneous wireless networks
-
Smart card-based secure authentication protocol in multi-server IoT environment
-
Review of different classes of RFID authentication protocols
-
A comparative analysis of similarity distance measure functions for biocryptic authentication in cloud databases
-
A probabilistic image authentication method based on chaos
-
Implicit authentication protocol and self-healing key management for WBANs
-
A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix
-
A ReRAM Physically Unclonable Function (ReRAM PUF)-Based Approach to Enhance Authentication Security in Software Defined Wireless Networks
-
New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography
-
A High Security RFID System Authentication Protocol Design Base on Cloud Computer
-
Enhanced secure device authentication algorithm in P2P-based smart farm system
-
ELAKA: Energy-Efficient and Lightweight Multi-Server Authentication and Key Agreement Protocol Based on Dynamic Biometrics
-
Biometric authentication using stem cell research
-
Authentication by Hand Vein Patterns using Back Propagation Network
-
WiMax Security
-
Privacy Preservation Authentication Protocol For Cloud Computing – Sharing Important and secret information between Cloud