„Authentication“
Suchergebnisse
3.280 Treffer
-
Where is the game? Wild meat products authentication in South Africa: a case study
-
A formal analysis technique for authentication protocols
-
An Investigaton into Authetication security of GSM algorithm for Mobile Banking
-
Cobalt‐Nanoporous Carbon Functionalized Nanocomposite‐Based Triboelectric Nanogenerator for Contactless and Sustainable Self‐Powered Sensor Systems
-
A UPnP extension for enabling user authentication and authorization in pervasive systems
-
BIOSIG 2019 – proceedings of the 18th International Conference of the Biometrics Special Interest Group : 18.-20. September 2019 in Darmstadt, Germany
-
Hardware Protection through Obfuscation
-
Hardware IP Security and Trust
-
Digital Fingerprinting
-
Information Systems Security and Privacy – First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers
-
Introduction to Cryptography with Maple
-
Trust, privacy and security in digital business – 9th international conference ; proceedings
-
Applied Information Security – A Hands-on Approach
-
APT verstehen und abwehren – Strategien und Konzepte für die Implementierung einer hochsicheren Administrationsumgebung zur Absicherung von Authentifizierungssystemen gegen APT-Angriffe = Concepts and strategies for the implementation of a high security administration environment to protect authentication systems against APT-attacks
-
Verify It's You: How Users Perceive Risk-based Authentication
-
From a pile of IP addresses to a clear authentication and authorization with Shibboleth
-
DIN CEN/TS 17261, DIN SPEC 16580, Biometric authentication for critical infrastructure access control - requirements and evaluation – = Biometrische Authentifikation für die Zugangskontrolle zu kritischen Infrastrukturen - Anforderungen und Evaluierung
-
An efficient mutual authentication and key agreement scheme without password for wireless sensor networks
-
Rapid authentication of mono-floral honeys by capillary zone electrophoresis
-
User authentication using Blockchain based smart contract in role-based access control