„Authentication“
Suchergebnisse
3.280 Treffer
-
Towards Certificate-Based Authentication for Future Mobile Communications
-
A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT
-
TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments
-
Printed and scanned document authentication using robust layout descriptor matching
-
Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain
-
Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems
-
Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain
-
A secure color image dual watermarking combining block feature modulation and voting mechanism for authentication and copyright protection
-
Deep‐Learning‐Assisted Thermogalvanic Hydrogel E‐Skin for Self‐Powered Signature Recognition and Biometric Authentication
-
An efficient framework for authentication and blockchain authorization of secured healthcare information using hpcsg- rotdf-slorb and dhsk-decc
-
Moroccan extra virgin argan oil authentication by using ultraviolet–visible and front face fluorescence spectroscopies combined with different descriptive and predictive chemometric tools
-
A 3-factor authentication access control system using RFID, fingerprint, token and code
-
Cloud auditing and authentication scheme for establishing privacy preservation
-
Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing
-
Unboxing fog security: a review of fog security and authentication mechanisms
-
Enhancing graphical password authentication system with deep learning-based arabic digit recognition
-
Asymmetric image authentication algorithm using double random modulus decomposition and CGI
-
New ECC-Based IoT Authentication Protocol for Securing RFID Systems
-
Development of an Enhanced Blockchain Mechanism for Internet of Things Authentication
-
Comparative Analysis of Handover Authentication Techniques in VANETs