„Authentication“
Suchergebnisse
3.280 Treffer
-
Differential Power-Analysis Attacks – A Practical Example for Hardware Countermeasures Protecting Cryptographic Circuits
-
Physically Unclonable Functions – Constructions, Properties and Applications
-
Evaluation of EAP Authentication Methods
-
USB Device Authentication
-
Introduction to Public Key Infrastructures
-
Authentication and identity privacy in the wireless domain
-
Molecular Sexing of Beef- Why and How? – Analytical Methods to Prevent Meat Fraud, Misrepresentation and Unfair Competition
-
Facial Analysis in Video: Detection and Recognition
-
Physically unclonable functions – constructions, properties and applications
-
Radio frequency identification – security and privacy issues : 9th international workshop ; revised selected papers
-
Research in attacks, intrusions, and defenses – 16th international symposium ; proceedings
-
IPSec – tunneling im Internet ; [Analyse der Protokollkomponenten, Authentication Header, Encapsulating Security Payload, IP Compression, ISAKMP, Konfiguration und Implementierung eines VPN]
-
Authenticity and authentication in language learning – distinctions, orientations, implications
-
Introduction to public key infrastructures
-
Implementation of Authentication and Transaction Security – Network Security using Kerberos
-
Food Authentication – Management, Analysis and Regulation
-
Nanoparticle Sensor to Detect and Quantify Pig DNA in Processed Foods – Nanoparticle Sensor to Authenticate Halal Foods
-
Internet Authentication for Remote Access – Authentication Solutions for Internet Remote Access Networks Aiming Ubiquitous Mobility
-
Biometric cryptosystems – authentication, encryption and signature for biometric identities
-
Implementation Of Authentication In E-Governance–an Uml Based Approach