„Authentication“
Suchergebnisse
3.280 Treffer
-
Iris‐Inspired Microparticles with a Two‐Factor Authentication Security Feature for Wet‐Phase Enhanced Anti‐Counterfeiting Strategies
-
Fixed-text keystroke dynamics authentication data set—collection and analysis
-
Enhancing Fingerprint Authentication: A Systematic Review of Liveness Detection Methods Against Presentation Attacks
-
Molecular authentication of commercial “Qian-hu” through the integration of nrDNA internal transcribed spacer 2 and nucleotide signature
-
RETRACTED ARTICLE: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment
-
An Improved Authentication Scheme for V2I Communication
-
Secure authentication and key management based on hierarchical enhanced identity based digital signature in heterogeneous wireless sensor network
-
L3AM: Linear Adaptive Additive Angular Margin Loss for Video-Based Hand Gesture Authentication
-
Educert-chain: a secure and notarized educational certificate authentication and verification system using permissioned blockchain
-
Block chain-based security and authentication for forensics application using consensus proof of work and zero knowledge protocol
-
Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes
-
An innovative molecular approach towards the cost-effective entomological authentication of honey
-
Secure mutual authentication quantum key agreement scheme for two-party setting with key recycling
-
Cryptography with optimal deep learning-based authentication scheme for preserving anonymity in telecare medical information system
-
Secure authentication scheme with Archimedes optimization algorithm for load balancing technique in fog computing
-
A new authentication approach for seamless handover in IP networks – design, modelling, verification and performance evaluation
-
The Human Factor: Why Employees Are Your Biggest Cybersecurity Risk
-
Implementation and evaluation of a medicines authentication system in a German secondary care environment
-
Leveraging New Paradigms for Enhanced Mobile Network Security
-
Authentication-Centric and Access-Controlled Architecture for Edge-Empowered SDN-IoT Networks