„Authentication“
Suchergebnisse
3.280 Treffer
-
Secure multiparty access and authentication based on advanced fuzzy extractor in smart home
-
A secure secret image sharing with steganography and authentication by Hamming code (15,11) for compressed images
-
Real time implementation of voice based robust person authentication using T-F features and CNN
-
AZURE AZ 500 STUDY GUIDE-1 – Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500
-
AZURE AZ 500 STUDY GUIDE-2 – Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500
-
A double-embedding hidden image encryption and authentication scheme based on compressed sensing and double random phase encoding
-
Quantum-Secure N2N Authentication Protocol Model for IoT Sensor Networks
-
Application of hyphenated techniques to the chromatographic authentication of flavors in food products and perfumes
-
Security system based on hand geometry and palmprint for user authentication in E-correction system
-
Single‐Photon Based Three‐Party Quantum Secure Direct Communication with Identity Authentication
-
An Efficient Unique Tokenized Authentication Technique Based Data Offloading Approach Using Key Exchange to Maintain Data Integrity in Heterogeneous Networks
-
Secure deep multimodal biometric authentication using online signature and face features fusion
-
Authentication and Key Establishment in WSN Based on Key Predistribution
-
Chaotic map based multi-factor authentication protocol for underwater environment monitoring
-
Geographic origin of meat—elements of an analytical approach to its authentication
-
Application of a modified tetra-primer ARMS–PCR assay for rapid Panax species identity authentication in ginseng products
-
Non-linear Optical Response as a Food Authentication: Investigation of Non-linear Optical Properties of Edible Oils by Spatial Self-Phase Modulation (SSPM) Method
-
A provably lightweight mutually authentication and key establishment protocol using extended chaotic map for telecare medicine information system
-
AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments
-
Development of DNA markers using next-generation sequencing approach for molecular authentication of Boerhavia diffusa L. and Tinospora cordifolia (Willd.) Miers