„Authentication“
Suchergebnisse
3.280 Treffer
-
Ransomware, Viruses, Social Engineering and Other Threats – Protecting your Digital Assets
-
Complex three‐dimensional patterned oxide thin film physical authentication tags obtainable with a mass production scalable, highly multiparameter dependent combinatorial process
-
Transactions on Pattern Languages of Programming III
-
Physically secure and fog-enabled lightweight authentication scheme for WBAN
-
CAPTCHA farm detection and user authentication via mouse-trajectory similarity measurement
-
Enhancing security and usability with context aware multi-biometric fusion for continuous user authentication
-
Administration of Access Rights in Web Applications
-
TEE-based designs for network gateways, web authentication, and VM introspection
-
Studying user experience and acceptance of web authentication solutions
-
Enhancing cloud security and deduplication efficiency with SALIGP and cryptographic authentication
-
Authentication in Insecure Environments – Using Visual Cryptography and Non-Transferable Credentials in Practise
-
Mobility Management – Principle, Technology and Applications
-
Characterization and Authentication of Olive and Other Vegetable Oils – New Analytical Methods
-
Meat Authentication Based on Animal Species and Other Quality Meat Attributes (Protected Geographical Indication, Organic Production, and Halal and Kosher Products) by HPLC–UV Fingerprinting and Chemometrics
-
The dual face of mycology: forensic signatures and edible mushroom authentication
-
Data Privacy Management and Autonomous Spontaneous Security – 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers
-
Financial Cryptography and Data Security – 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers
-
Biometric Authentication – ECCV 2004 International Workshop, BioAW 2004, Prague, Czech Republic, May 15th, 2004. Proceedings
-
Strong anonymous batch authentication scheme against sybil attack in VANET
-
Optical authentication of nano-scale artifacts using their interference images under white light illumination