„Authentication“
Suchergebnisse
3.280 Treffer
-
Provisioning, authentication, and integrity-preserving communication scheme for Internet of things-enabled devices
-
A multi-factor user authentication protocol for the internet of drones environment
-
Design of secure and unique addressing with mutual authentication scheme in IoT networks
-
Privacy and Identity Management for Life – 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers
-
Characterization and Authentication of Olive and Other Vegetable Oils – New Analytical Methods
-
SoK : Delegated Security in the Internet of Things
-
Absicherung von Diensten mit Keycloak
-
Securing cloud applications with two-factor authentication
-
Internet of things encryption technology combining elliptic curve cryptosystem, hash function, and RFID-based authentication
-
Identification and Authentication of Vegetable Oils by Digital Colorimetry and IR Spectrometry
-
Secured VANET: an improved COOT-algorithm-based optimal routing protocol with multiple authentication and fake message detection for secure data transmission
-
A secure authentication and optimization based device-to-device communication for 5G enabled IoT applications of smart cities
-
Privacy preserved two factor authentication system using spread spectrum watermarking of fingerprint and crypto code
-
Secure Hybrid Data Transmission Protocol for WSN with Key Management and Message Authentication
-
Comparative phytochemical profiling and authentication of four Artemisia species using integrated GC-MS, HPTLC and NIR spectroscopy approach
-
Biosig 2022 – proceedings of the 21st International Conference of the Biometrics Special Interest Group : 14.-16. September 2022, Darmstadt, Germany
-
Liveness‐Verified Dynamic Time Warping‐Based Authentication and Hybrid Adaptive Neuro‐Fuzzy Inference System Identification for Single‐Channel Diaphragmatic Breathing Surface Electromyography Biometrics
-
Privacy preserving biometric authentication based on fully homomorphic encryption, blockchain, and IPFS data storage
-
Differential Cryptanalysis of the Reduced Pointer Authentication Code Function Used in Arm’s FEAT_PACQARMA3 Feature
-
Rat hepatic stellate cell line CFSC-2G: genetic markers and short tandem repeat profile useful for cell line authentication