Search Results - "Authentication"

Refine Results
  1. 1

    Multi-point collaborative authentication method based on user image intelligent collection in the internet of things by Li, Yunfa, Tu, Yifei, Lu, Jiawa

    Published 2019
    Subjects: “…Internet of Things; identity authentication; collaborative authentication; security…”
    Get full text
  2. 2

    Distributed authentication for the Western Australian University Libraries by Green, Peter

    Published 2004
    Subjects: “…distributed authentication infrastructure…”
    Get full text
    Get full text
  3. 3

    A Distributed Authentication Infrastructure for Western Australian Universities by Green, Peter, Reid, A.

    Published 2003
    Subjects: “…distributed authentication infrastructure…”
    Get full text
  4. 4

    Building a shared authentication infrastructure: a matter of trust by Green, Peter

    Published 2002
    Subjects: “…distributed authentication infrastructure…”
    Get full text
    Get full text
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Personal identification by Keystroke Pattern for login security by Abdullah, Norhayati

    Published 2001
    Subjects: “…Computers - Access control - Keystroke timing authentication.…”
    Get full text
    Get full text
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    The fantasy of authenticity: touring with Lacan by Knudsen, Daniel C., Rickly, J.M., Vidon, Elizabeth S.

    Published 2016
    Subjects: “…Authenticity; Alienation; Lacan; Fantasy; Existentialism…”
    Get full text
  20. 20