„Authentication“
Suchergebnisse
3.280 Treffer
-
Provable security for lightweight message authentication and encryption
-
In Depth Guide to IS-IS Routing – Learn Intermediate System to Intermediate System Routing from scratch
-
WiFi signal-based user authentication
-
Measuring Adoption of Phishing-Resistant Authentication Methods on the Web
-
Secrecy, Covertness and Authentication in Wireless Communications – Physical Layer Security Approach
-
1H NMR spectroscopy combined with multivariate data analysis for authentication of “Swabian–Hall Quality Pork” with protected geographical indication
-
Volatilomic with chemometrics: a toward authentication approach for food authenticity control
-
Multiple image watermarking with dual authentication for smart and safe city environment
-
Internet of medical things-based authentication for an optimized watermarking of encrypted EEG
-
ECG-based authentication systems: a comprehensive and systematic review
-
Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures
-
Node Authentication and Trust-Aware Secure Routing in NDN-IoT Empowered Savvy City Applications
-
An improved authentication and key management scheme for hierarchical IoT network using elliptic curve cryptography
-
Public key cryptography – proceedings
-
Design of blockchain-based authentication and key agreement protocol for health data sharing in cooperative hospital network
-
Multimodal cancelable biometric authentication system based on EEG signal for IoT applications
-
An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments
-
Query Authentication Using Intel SGX for Blockchain Light Clients
-
Classification and authentication of materials using prompt gamma ray activation analysis
-
Distraction descriptor for brainprint authentication modelling using probability-based Incremental Fuzzy-Rough Nearest Neighbour