„Authentication“
Suchergebnisse
3.280 Treffer
-
Authentication of Cinnamomum verum (Ceylon cinnamon) in commercial products by qualitative and real-time quantitative PCR assays
-
A Secure and Fast Handover Authentication Scheme for 5G-Enabled IoT Using Blockchain Technology
-
Implementation of a novel secured authentication protocol for cyber security applications
-
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication
-
Designing secure PUF-based authentication protocols for constrained environments
-
Enhancing banknote authentication by guiding attention to security features and manipulating prevalence expectancy
-
Security analysis and provision of authentication protocol, based on peer-to-peer structure in IOT platform
-
Hyperelliptic curve signcryption based privacy preserving message authentication and fuzzy TOPSIS-based trust management scheme for fog enabled VANET
-
DNA barcoding authentication for the wood of eight endangered Dalbergia timber species using machine learning approaches
-
Rapid detection of several endangered agarwood-producing Aquilaria species and their potential adulterants using plant DNA barcodes coupled with high-resolution melting (Bar-HRM) analysis
-
A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication
-
Shedding New Light on ZnCl 2 ‐Mediated Addition Reactions of Grignard Reagents to Ketones: Structural Authentication of Key Intermediates and Diffusion‐Ordered NMR Studies
-
Advanced Computing and Systems for Security: Volume 14
-
Understanding Cryptography – A Textbook for Students and Practitioners
-
Authenticated commutator key agreement protocol
-
Diophantine cryptography in free metabelian groups: Theoretical base
-
Continuous hard-to-invert functions and biometric authentication
-
A Practical Attack on a Certain Braid Group Based Shifted Conjugacy Authentication Protocol
-
Two-party key establishment: From passive to active security without introducing new assumptions
-
No-leak authentication by the Sherlock Holmes method