„Authentication“
Suchergebnisse
3.280 Treffer
-
A mobile authentication system resists to shoulder-surfing attacks
-
Design of USIM-based secure user authentication scheme in a mobile office environment
-
A New Certificateless and Secure Authentication Scheme for Ad hoc Networks
-
Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications
-
3D Biometrics and Random Number Generation for Symmetric Cryptography – A Cloud Computing Based Approach
-
Analyzing proposals for improving authentication on the TLS-/SSL-protected Web
-
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol
-
An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography
-
A speech content authentication algorithm based on a novel watermarking method
-
An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
-
An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data
-
Exploring the Impact of QR Codes in Authentication Protection: A Study Based on PMT and TPB
-
Secure user authentication based on the trusted platform for mobile devices
-
An anonymous authentication scheme withstanding the conspiracy attack
-
Security analysis and improvement of a tag encoding authentication scheme for network coding
-
Captcha as Graphical password
-
Authentication of Acori Tatarinowii Rhizoma (Shi Chang Pu) and its adulterants by morphological distinction, chemical composition and ITS sequencing
-
A dual fragile watermarking scheme for speech authentication
-
Enhanced authentication for outsourced educational contents through provable block possession
-
Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things