„Authentication“
Suchergebnisse
3.280 Treffer
-
Simultaneous encryption and authentication of messages over GPUs
-
Genetic evidence of an Asian background in heteroplasmic Iberian cattle (Bos taurus): Effect on food authentication studies based on polymerase chain reaction‐restriction fragment length polymorphism analysis
-
BTDA: Two-factor dynamic identity authentication scheme for data trading based on alliance chain
-
Development and authentication of Panax ginseng cv. Sunhong with high yield and multiple tolerance to heat damage, rusty roots and lodging
-
Classification and Authentication of Induction Motor Faults using Time and Frequency Feature Dependent Probabilistic Neural Network Model
-
An effective compressed image authentication scheme based on N-variant AMBTC
-
Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing
-
DNA barcoding authentication of Uncaria species using machine learning approaches
-
Chemometric analysis for authentication of ‘Syrah’ and ‘Tempranillo’ red wines of San Francisco Valley-Brazil compared to wines from other world regions by the molecular profile in HPLC
-
Information security theory and practice – security, privacy and trust in computing systems and ambient intelligent ecosystems ; 6th IFIP WG 11.2 international workshop ; proceedings
-
Authentication of olive oil in commercial products using specific, sensitive, and rapid loop-mediated isothermal amplification
-
Enhancing Security Using Secure Authentication Model in Fog Computing Model
-
Identification and Authentication of Milk Using Digital Colormetry of Indicator Test Systems, Smartphone, and Chemometric Analysis
-
Pashmina authentication on imagery data using deep learning
-
Multimodal biometrics authentication using extreme learning machine with feature reduction by adaptive particle swarm optimization
-
Application of RapidHIT™ ID for cell authentication by fast and convenient STR profiling
-
Privacy-aware access control (PAAC)-based biometric authentication protocol (Bap) for mobile edge computing environment
-
GAN-based patient information hiding for an ECG authentication system
-
Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture
-
Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications