„Authentication“
Suchergebnisse
3.280 Treffer
-
A General Strategy for Food Traceability and Authentication Based on Assembly‐Tunable Fluorescence Sensor Arrays
-
The authentication of sherry wines using pattern recognition: an inter laboratory study
-
Controllable Modulation of Trapped Carriers in Mechano/Thermo Dual‐Responsive Particles for Advanced Stress‐Encoded Information Storage
-
Dynamic authentication for intelligent sensor clouds in the Internet of Things
-
Video watermarking technique using motion vectors to video authentication
-
Authentication of traditional meat products (Haleem) sold in India: a first report confirming species mislabelling
-
Molecular differentiation of the green and purple Tulsi (Ocimum tenuiflorum L.) and its application in authentication of market samples
-
Molecular authentication, metabolite profiling and in silico–in vitro cytotoxicity screening of endophytic Penicillium ramusculum from Withania somnifera for breast cancer therapeutics
-
Ensemble recognition model with optimal training for multimodal biometric authentication
-
Privacy-preserving V2I communication and secure authentication using ECC with physical unclonable function
-
A secure blockchain-assisted authentication framework for electronic health records
-
Spectral insights: advancing the authentication and quality assessment of Moroccan saffron through UV–visible spectroscopy and multivariate chemometric methods
-
Blockchain-based framework and platform for validation, authentication & equivalency of academic certification and institution’s accreditation: UAE case study and system performance (2022)
-
Designing usable and secure authentication mechanisms for public spaces
-
Vom AFS-kaserver zu Kerberos V5
-
Best Practice Manual for Digital Image Authentication
-
Secured Authentication System for Internet of Things
-
Secured Authentication System for Internet of Things
-
FORENSIC SPEECH AND AUDIO ANALYSIS WORKING GROUP BEST PRACTICE GUIDELINES FOR ENF ANALYSIS IN FORENSIC AUTHENTICATION OF DIGITAL EVIDENCE
-
Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography