„Authentication“
Suchergebnisse
3.280 Treffer
-
Cancelable features using log-Gabor filters for biometric authentication
-
Cryptanalysis and improvement of ‘a secure authentication scheme for telecare medical information system’ with nonce verification
-
An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud
-
Study on the security of the authentication scheme with key recycling in QKD
-
A Novel Multi-Server Authentication Scheme for e-commerce Applications Using Smart Card
-
On modes of operations of a block cipher for authentication and authenticated encryption
-
Conceivable security risks and authentication techniques for Smart devices: A comparative evaluation of security practices
-
Practical deniable authentication for pervasive computing environments
-
Watermarking authentication: Using the fragile mode or the robust mode?
-
Multi-block chaining-based authentication mode
-
Authentication codes based on resilient Boolean maps
-
Multimedia, computer graphics and broadcasting
-
Multimedia, computer graphics and broadcasting
-
Cryptanalysis of Controlled Quantum Secure Direct Communication and Authentication Protocol Based on Five-Particle Cluster State and Quantum One-Time Pad
-
Authentication and privilege attribute security application with related key distribution functions
-
Security protocols XIX – 19th international workshop, Cambridge, UK, April 28 - 30, 2011 ; revised selected papers
-
Robust hash generation technique for content-based image authentication using histogram
-
SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system
-
Design of mVoIP service based authentication system
-
LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication