„Authentication Management“
Suchergebnisse
1.000+ Treffer
-
The art of security – safeguarding the digital world: principles, strategies, and techniques
-
The art of security – safeguarding the digital world: principles, strategies, and techniques
-
GPNST: An Improved Graphical Password Authentication Scheme Leveraging Neural Style Transfer Technique on Smartphones
-
SAP Business Technology Platform – Sicherheit und Berechtigungen
-
Enhancing Cloud Security Through a Multi-Level Authentication Model: A QoS-Based Approach to Performance Measurement for Source Management
-
TouchMetric: a machine learning based continuous authentication feature testing mobile application
-
TCpC: a graphical password scheme ensuring authentication for IoT resources
-
Authentication of emission monitoring data and optimization of desulfurization in the molybdenum roasting process based on BAT-OOPN and the response surface method
-
Machine learning-based cloud security system with multi authentication for data classification in Financial Sectors
-
Enhanced fingerprint authentication: a deep learning and error correction-based biometric cryptosystem
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems LII
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems LVI – Special Issue on Data Management - Principles, Technologies, and Applications
-
Information Systems Security – 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings
-
Multimedia and Ubiquitous Engineering
-
Data Privacy Management and Autonomous Spontaneous Security – 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers
-
Information Systems Security – 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings
-
Multimedia and Ubiquitous Engineering – MUE 2013
-
Advances in Cryptology – Proceedings of Crypto 82
-
Data Privacy Management and Autonomous Spontaneous Security – 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers
-
Security Protocols XVII – 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers