„Authentication“
Suchergebnisse
3.280 Treffer
-
Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
-
Anthocyanin fingerprinting as an authentication testing tool for blueberry, aronia, and pomegranate juices
-
Secure in-vehicle Systems using Authentication
-
The utility of behavioral biometrics in user authentication and demographic characteristic detection: a scoping review
-
Improving arabic signature authentication with quantum inspired evolutionary feature selection
-
Deep learning based authentication schemes for smart devices in different modalities: progress, challenges, performance, datasets and future directions
-
Enhancing security for document exchange using authentication and GAN encryption
-
Improved RFID mutual authentication protocol against exhaustive attack in the context of big data
-
A formal security analysis of the fast authentication procedure based on the security context in 5G networks
-
Using Artificial Intelligence Techniques to Implement a Multifactor Authentication System
-
A novel three-factor authentication and optimal mapreduce frameworks for secure medical big data transmission over the cloud with shaxecc
-
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)
-
PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks
-
Delineation and authentication of ferroptosis genes in ventilator-induced lung injury
-
Pump up password security! – Evaluating and enhancing risk-based authentication on a real-world large-scale online service
-
An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
-
ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
-
Reversible image authentication using a central folding strategy with two images
-
Weakly Supervised Object Localization with Background Suppression Erasing for Art Authentication and Copyright Protection
-
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review