„Authentication“
Suchergebnisse
3.280 Treffer
-
Cryptanalysis and enhancement of a quantum-secure two-party authentication protocol for mobile devices
-
Interpretable AI-driven multidimensional chemical fingerprints for geographical authentication of Euryales Semen
-
Blended clustering energy efficient routing and PUF based authentication in IoT enabled smart agriculture systems
-
Application of metabolomics and chemometrics for authentication of vegetable oils and adulteration detection: a review
-
An Understandable Cross-Chain Authentication Mechanism for JointCloud Computing
-
Quasi-ordered plasmonic metasurfaces with unclonable stochastic scattering for secure authentication
-
Molecular authentication of Chironomidae larvae (Insecta: Diptera) using mitochondrial cytochrome oxidase-I gene sequence
-
AI-synergistic effect in C-RNN based online signature profiling and hash-QR encoding for forge signature detection, documents protection and applications authentication
-
Lightweight identity authentication and key agreement scheme for VANETs based on SSL-PUF
-
Protocols for authentication and key establishment
-
Biometric User Authentication for it Security – From Fundamentals to Handwriting
-
Protocols for authentication and key establishment
-
Protocols for Authentication and Key Establishment
-
Advances in authentication and security protocols for 5G networks: a comprehensive survey
-
A lightweight and secure authentication and privacy protection scheme for internet of medical things
-
Quantum-secured cloud communications in 6G networks: an advanced key shifting model with mutual identity authentication for optimal performance in time-constrained environments
-
Secured VANET Using Privacy-Preserving Authentication Approach
-
Self-Sovereign Identities for People on the Move — A New Approach to Public Sector Authentication? – DIALOGUE ON TECH AND MIGRATION
-
Advanced Computing and Systems for Security – Volume Ten
-
Advanced Computing and Systems for Security – Volume Nine