„Authentication“
Suchergebnisse
3.280 Treffer
-
Network Communication Encoding: A Study for Authentication Protocols
-
Classification and authentication of Slovak varietal wines by attenuated total reflectance Fourier-transform infrared spectrometry and multidimensional data analysis
-
An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric
-
Integrated LTE and Wi-Fi Network Architecture with Authentication of User Equipment for Dropping off the Surplus Load of LTE
-
Authentication of shiitake powder using HPLC fingerprints combined with chemometrics
-
Chromatographic fingerprint application possibilities in food authentication
-
Quantum Identity Authentication Based on Round Robin Differencial Phase Shift Communication Line
-
Quantum Identity Authentication Scheme Based on Quantum Walks on Graphs with IBM Quantum Cloud Platform
-
Bridging R2R Printed Wireless 1 Bit‐Code Generator with an Electrophoretic QR Code Acting as WORM for NFC Carrier Enabled Authentication Label
-
An Efficient Double-Offloading Biometric Authentication Scheme Based on Blockchain for Cross Domain Environment
-
Authentication of Control Devices in the Internet of Things with the Architecture of Edge Computing
-
Architecture and Operation Algorithm of a Biometric Voice Authentication System
-
IoT authentication model with optimized deep Q network for attack detection and mitigation
-
Generic transformation from broadcast encryption to round-optimal deniable ring authentication
-
Multi-instance cancelable iris authentication system using triplet loss for deep learning models
-
Secret Dynamic Key Authentication and Decision Trust Secure Routing Framework for Internet of Things Based WSN
-
Self-authentication Model to Prevent Cheating Issues in Grayscale Visual Secret Sharing Schemes
-
A Survey of Android Mobile Phone Authentication Schemes
-
Financial cryptography and data security – FC 2021 International Workshops : CoDecFin, DeFi, VOTING, and WTSC, virtual event, March 5, 2021, revised selected papers
-
Scalable, password-based and threshold authentication for smart homes