„Authentication“
Suchergebnisse
3.280 Treffer
-
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection
-
An optical-based encryption and authentication algorithm for color and grayscale medical images
-
Quadratic residue-based unilateral authentication protocol for RFID system
-
Authentication of fish oil (omega-3) supplements using class-oriented chemometrics and comprehensive two-dimensional gas chromatography coupled to mass spectrometry
-
An adaptive centralized authentication control method to reduce association delay in the IoT 802.11ah protocol
-
An Efficient Group-based Service Authentication and Session Key Negotiation Scheme for mMTC Devices in 5G
-
Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication
-
A Novel Three-Party Mutual Authentication Quantum Key Agreement Protocol with GHZ States
-
11th Euro Fed Lipid Congress, New Strategies for a High Quality Future (27–30 October 2013, Antalya, Turkey)
-
An alternative RP‐HPLC method for the separation and determination of tocopherol and tocotrienol homologues as butter authenticity markers: A comparative study between two European countries
-
Authentication of borage oil
-
An Improved Lightweight Privacy Preserving Authentication Scheme for SIP-Based-VoIP Using Smart Card
-
An Improved Lightweight Privacy Preserving Authentication Scheme for SIP-Based-VoIP Using Smart Card
-
Towards serverless fast one round authentication with two mobile end devices
-
Towards adaptive unknown authentication for universal domain adaptation by classifier paradox
-
Azure Security For Critical Workloads – Implementing Modern Security Controls for Authentication, Authorization and Auditing
-
User authentication method based on keystroke dynamics and mouse dynamics using HDA
-
Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem
-
Secured two factor authentication, graph based replication and encryption strategy in cloud computing
-
Security analysis and improvement of a privacy-preserving authentication scheme in VANET