Search Results - "Authentication"
-
1
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
Published 2019Subjects: “…Internet of Things; identity authentication; collaborative authentication; security…”
Get full text
-
2
Distributed authentication for the Western Australian University Libraries
Published 2004Subjects: “…distributed authentication infrastructure…”
Get full text
Get full text
-
3
A Distributed Authentication Infrastructure for Western Australian Universities
Published 2003Subjects: “…distributed authentication infrastructure…”
Get full text
-
4
Building a shared authentication infrastructure: a matter of trust
Published 2002Subjects: “…distributed authentication infrastructure…”
Get full text
Get full text
-
5
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004Subjects: “…Smart cards - Authentication - Case studies…”
Get full text
Get full text
-
6
-
7
-
8
In-vitro and in-silico selection of DNA-based aptamer towards pork detection using SELEX
Published 2024Subjects: “…Food authentication…”
Get full text
Get full text
-
9
-
10
-
11
Personal identification by Keystroke Pattern for login security
Published 2001Subjects: “…Computers - Access control - Keystroke timing authentication.…”
Get full text
Get full text
-
12
A framework of authentication and authorization for e-health services
Published 2006Subjects: Get full text
Get full text
-
13
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004Subjects: Get full text
Get full text
-
14
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
Published 2010Subjects: Get full text
Get full text
-
15
Digital signature-based secure communication in cognitive radio networks
Published 2011Subjects: Get full text
-
16
Strengthening user authentication for better protection of mobile application systems
Published 2016Subjects: “…User authentication; Data protection; Data transmission; Wireless communication; Mobile application systems…”
Get full text
Get full text
-
17
Investigation into the animal species contents of popular wet pet foods
Published 2015Subjects: Get full text
-
18
Chaotic map based key agreement with/out clock synchronization
Published 2007Subjects: Get full text
-
19
The fantasy of authenticity: touring with Lacan
Published 2016Subjects: “…Authenticity; Alienation; Lacan; Fantasy; Existentialism…”
Get full text
-
20