„Authentication“
Suchergebnisse
3.280 Treffer
-
Multimedia Data Hiding and Authentication via Halftoning and Coordinate Projection
-
A biometric authentication model using hand gesture images
-
RFID and beyond - a survey on the most recent developments in wireless authentication systems
-
Authentication and Key Agreement Protocols – Cryptanlysis and Design
-
Privacy Protecting Biometric Authentication Systems – A Novel Framework to Protect Privacy
-
Kerberos Security in a Client-Server System Management Application – The Implementation of an Authentication Mechanism Using the Generic Security Services API
-
Hardware-crypto-token gestütztes single sign-on für zertifikatsbasierte Authentifizierung
-
Recommendation of Health Card – Instead of carrying a pile of health record carry a smart card
-
AI and Session Based Password Authentication Schemes for Android
-
Security Challenges in Social Engineering
-
Security-Driven Human Resource Management System – A Model for Securing Human Resource Information
-
Authentication and Key Establishment – No Silver Bullet
-
Approximate message authentication and robust image hashing
-
Security of Biometrics Authentication Protocols – Practical and Theory Applications
-
Secure and robust image hashing algorithm for content based image authentication
-
Optimum Space And Security In 3D Password Scheme
-
Ecommerce Security Issues, Policies and Model
-
Ecommerce - Introduction, Technology, Cryptography
-
Usability vs. Security: The Everlasting Trade-Off in the Context of Apple iOS Mobile Hotspots
-
Financial cryptography and data security – revised selected papers