„Authentication“
Suchergebnisse
3.280 Treffer
-
Cyberspace Safety and Security – 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings
-
Information and Communications Security – 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings
-
Integrated Circuit Authentication – Hardware Trojans and Counterfeit Detection
-
Secure IP Mobility Management for VANET
-
Privacy technologies and policy – revised selected papers
-
Information systems security – 9th international conference ; proceedings
-
Security protocols XXI – 21th international workshop, Cambridge, UK, March 19 - 20, 2013 ; revised selected papers
-
Provable security – 7th international conference ; proceedings
-
Security in computing and communications – international symposium ; proceedings
-
Public key infrastructures, services and applications – 9th European workshop ; revised selected papers
-
Digital forensics and watermaking [watermarking] – 11th international workshop ; revised selected papers
-
The use of chaotic pseudo random number and elliptic curve cryptosystem in an efficient OTP-based authentication scheme for online learning system
-
Electronic Signatures – Authentication Technology from a Legal Perspective
-
Fine-Grained Authorization Services in Virtual Organizations – Refined Access-Control Decision Making in Large Institutions
-
Fine grained authorization services in virtual organizations – refined access control decision making in large institutions
-
Discriminative Preprocessing of Speech – Towards Improving Biomatric Authentication
-
Digital Image Forensics – There is More to a Picture than Meets the Eye
-
Information security applications – 12th international workshop ; revised selected papers
-
RFID security and privacy – 7th international workshop ; revised selected papers
-
Transparent User Authentication – Biometrics, RFID and Behavioural Profiling