„Authentication“
Suchergebnisse
3.280 Treffer
-
Development of Photochromic Authentication Patterns Using Self-Healable Sodium Alginate Hydrogel: Optical Strategy Toward Confidential Information Encryption
-
An efficient three-factor authentication protocol for wireless healthcare sensor networks
-
PGASH: Provable group-based authentication scheme for Internet of Healthcare Things
-
Improving the performance of authentication protocols using efficient modular multi exponential technique
-
A Self‐Oscillated Organic Synapse for In‐Memory Two‐Factor Authentication
-
JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing
-
Cancelable biometric authentication system based on hyperchaotic technique and fibonacci Q-Matrix
-
Development of trust-based authorization and authentication framework for secure electronic health payment in cloud environment
-
Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications
-
Quantum Secret Sharing with Identity Authentication Based on GHZ States Entanglement Swapping
-
Auto-authentication watermarking scheme based on CNN and perceptual hash function in the wavelet domain
-
Enhanced ubiquitous system architecture for securing healthcare IoT using efficient authentication and encryption
-
DIN EN ISO 21177, Intelligent transport systems - ITS station security services for secure session establishment and authentication between trusted devices (ISO/FDIS 21177:2023) – = Intelligente Verkehrssysteme - Sicherheitsdienste für eine ITS-Station zum sicheren Aufbau von Sitzungen und zur Authentisierung zwischen vertrauenswürdigen Geräten (ISO/FDIS 21177:2023)
-
Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities
-
Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory
-
A measurement device independent multi-party quantum key agreement protocol with identity authentication
-
Strengthening Multi‐Factor Authentication Through Physically Unclonable Functions in PVDF‐HFP‐Phase‐Dependent a‐IGZO Thin‐Film Transistors
-
Provable secure authentication key agreement for wireless body area networks
-
LAVA: Log Authentication and Verification Algorithm
-
PSD2 in the UK. Reshaping the Landscape and Navigating Challenges