„Authentication“
Suchergebnisse
3.280 Treffer
-
DevOps, DBAs, and DBaaS – Managing Data Platforms to Support Continuous Integration
-
Implementing DirectAccess with Windows Server 2016
-
Triboelectric Nanogenerators
-
Privacy-enhanced identity management – from cryptography to practice
-
Advanced Computing and Systems for Security – Volume 2
-
Cryptography Made Simple
-
Advanced Computing and Systems for Security – Volume 1
-
Hyperledger Fabric-Powered Network Slicing Handover Authentication
-
Authentication and Differentiation of Morinda citrifolia and Morinda coreia Fruits and Their Commercial Products
-
FPGA-based dual-layer authentication scheme utilizing AES and ECC for unmanned aerial vehicles
-
Security in Network Coding
-
Applications and Usability of Interactive TV – Third Iberoamerican Conference, jAUTI 2014, and Third Workshop on Interactive Digital TV, Held as Part of Webmedia 2014, João Pessoa, PB, Brazil, November 18-21, 2014. Revised Selected Papers
-
Human Aspects of Information Security, Privacy, and Trust – Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings
-
Leakage Resilient Password Systems
-
Information Security Practice and Experience – 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings
-
Robust Image Authentication in the Presence of Noise
-
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance – 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers
-
Counterfeit Integrated Circuits – Detection and Avoidance
-
Encrypted Email – The History and Technology of Message Privacy
-
Information and Communications Security – 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers