„Authentication“
Suchergebnisse
3.280 Treffer
-
Towards optimal score level fusion for adaptive multi-biometric authentication system
-
A dynamic C-V2X anonymous authentication and group key agreement protocol
-
Comparison of data processing strategies using commercial vs. open-source software in GC-Orbitrap-HRMS untargeted metabolomics analysis for food authentication: thyme geographical differentiation and marker identification as a case study
-
Searchable encryption with randomized ciphertext and randomized keyword search
-
Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection
-
Automatic human identification using fingerprint images based on Gabor filter and SIFT features fusion
-
Raspberry Pi implemented with MATLAB simulation and communication of physiological signal-based fast chaff point (RPSC) generation algorithm for WBAN systems
-
A new adaptive XOR, hashing and encryption-based authentication protocol for secure transmission of the medical data in Internet of Things (IoT)
-
Certificate-less Aggregate Signature Authentication Scheme (CLASAS) for secure and efficient data transmission in Wireless Sensor Networks (WSNs)
-
A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC
-
An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing
-
Enhancing biometric authentication security through the novel integration of graph theory encryption and chaotic logistic mapping
-
A Lightweight Two-Factor Continuous Authentication Protocol for Agricultural IoT Devices
-
On the Security of a Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks
-
DNA barcoding of online herbal supplements: crowd-sourcing pharmacovigilance in high school
-
Binary Wavelet Transform-Based Financial Text Image Authentication Algorithm
-
An authentication mechanism based on blockchain for IoT environment
-
Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems
-
Authentication of multiple transaction using enhanced Elman spike neural network optimized with glowworm swarm optimization
-
A cancelable biometric authentication scheme based on geometric transformation