„Authentication“
Suchergebnisse
3.280 Treffer
-
A Privacy-Preserving Surveillance Video Sharing Scheme: Storage, Authentication, and Joint Retrieval
-
EyeAuth: smartphone user authentication via reflexive eye movements
-
ECC based secure privacy-preserving authentication scheme for wireless sensor networks in IoT environment
-
Accessible authentication methods for persons with diverse cognitive abilities
-
Algorithmic authenticity – an overview
-
Trusted Computing and Information Security – 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings
-
Aspekte des „Samplings“ – Eine Frage des Sounds?
-
Video authentication detection using deep learning: a systematic literature review
-
PLASMA-Privacy-Preserved Lightweight and Secure Multi-level Authentication scheme for IoMT-based smart healthcare
-
Multi-modal biometric authentication system based on face and signature using legion feature estimation technique
-
Reference materials for food authentication
-
Hardware Support for Authentication in Cyber Physical Systems
-
Expertise as a signature: continuous implicit authentication based on behavior
-
Secure channel estimation model for cognitive radio network physical layer security using two-level shared key authentication
-
Privacy-preserving Web single sign-on: Formal security analysis and design
-
Wearable authentication: Trends and opportunities
-
Mobility Management – Principle, Technology and Applications
-
A Novel Pyra-Cryptosystem Relying Secure Light-Weight Data Exchange, Peer-to-Peer Authentication, and Secure Communication Session Key Management Approach-Based Model for Internet of Things Network Security
-
Towards secure authentication standards for academia, industry and end-users
-
Offline Efficient Signature Authentication Using Octave Convolution Neural Network