„Authentication“
Suchergebnisse
3.280 Treffer
-
An Optimized Multi-kernel Based Extreme Learning Machine for Authentication Threat Detection with Feature Reduction Scheme in IoT
-
A Secure and Lightweight ZKP-based Mutual Authentication Scheme with Key Agreement
-
Biometric-Based Physical and Cybersecurity Systems
-
Learning-based VANET Communication and Security Techniques
-
Java EE 8 Recipes – A Problem-Solution Approach
-
Practical Information Security – A Competency-Based Education Course
-
Certification and authentication of brand value propositions
-
Deep learning-based user authentication with hybrid encryption for secured blockchain-aided data storage and optimal task offloading in mobile edge computing
-
Authentication based vanet for data transfer: unveiling the ability of deep learning models for attack classification
-
ICT Systems Security and Privacy Protection – 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings
-
Advanced Computing and Systems for Security – Volume Six
-
Advanced Computing and Systems for Security – Volume Five
-
Trusted Digital Circuits – Hardware Trojan Vulnerabilities, Prevention and Detection
-
Modelling and Verification of Secure Exams
-
Infrastructure Software Modules for Enterprises – Flexible Software Systems, Module Use-Cases, and Wireframes
-
Lightweight authentication scheme for edge control systems in Industrial Internet of Things
-
2-Phase Multi-trait Biometric Authentication Model Against Spoofing Attack Using Deep Hash Model
-
Botanical, Chemical, and DNA Barcode-Based Authentication of Herbal Ayurvedic Medicines from the Menispermaceae
-
Food Authentication – Management, Analysis and Regulation
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems I