Search

Your search keyword '"Data_MISCELLANEOUS"' showing total 26,820 results

Search Constraints

Start Over You searched for: Descriptor "Data_MISCELLANEOUS" Remove constraint Descriptor: "Data_MISCELLANEOUS"
26,820 results on '"Data_MISCELLANEOUS"'

Search Results

51. A feature adaptive image watermarking framework based on Phase Congruency and Symmetric Key Cryptography

52. BPAF: Blockchain-Enabled Reliable and Privacy-Preserving Authentication for Fog-Based IoT Devices

53. Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking

54. Efficient privacy-preserving data replication in fog-enabled IoT

55. BioSec: A Biometric Authentication Framework for Secure and Private Communication Among Edge Devices in IoT and Industry 4.0

56. Functional Brain Networks Underlying Auditory Saliency During Naturalistic Listening Experience

57. Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment

58. U.S. Adult Perspectives on Facial Images, DNA, and Other Biometrics

59. Improved Cloud Auditing Protocol and Its Application for Pandemic Data Management

60. A Decentralized Electronic Reporting Scheme with Privacy Protection Based on Proxy Signature and Blockchain

61. A Comprehensive Trustworthy Data Collection Approach in Sensor-Cloud Systems

62. Approach for Reengineering Transformation from Relational Database to OWL Ontology

63. Implementation of a Security System in IaaS Cloud Server through an Encrypted Blockchain

64. Multifactor Pattern Implicit Authentication

65. Robust Reversible Watermarking in Encrypted Image With Secure Multi-Party Based on Lightweight Cryptography

66. Fundamentals of Physical Layer Anonymous Communications: Sender Detection and Anonymous Precoding

67. An alternative C++-based HPC system for Hadoop MapReduce

68. Forbearance: Strategic Nonresponse to Competitive Attacks

69. Trust Based Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks

70. Improving Data Security, Privacy, and Interoperability for the IEEE Biometric Open Protocol Standard

71. Cryptographic switching functions for multiplicative watermarking in cyber-physical systems

72. Color Alignment for Relative Color Constancy via Non-Standard References

73. An Encrypted Cloud Email Searching and Filtering Scheme Based on Hidden Policy Ciphertext-Policy Attribute-Based Encryption With Keyword Search

74. A generic framework for deep incremental cancelable template generation

75. Fingerprint-based robust medical image watermarking in hybrid transform

76. The PLUS Multi-Sensor and Longitudinal Fingerprint Dataset: An Initial Quality and Performance Evaluation

77. Secure Cloud Data Deduplication with Efficient Re-Encryption

78. Histograms of oriented mosaic gradients for snapshot spectral image description

79. A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol

80. Blind Camcording-Resistant Video Watermarking in the DTCWT and SVD Domain

81. Unsupervised multi-branch capsule for hyperspectral and LiDAR classification

82. Understanding the effects of conceptual and analytical choices on ‘finding’ the privacy paradox:A specification curve analysis of large-scale survey data

83. We Care About Different Things: Non-Elite Conceptualizations of Social Media Privacy

84. Trust in financial institutions: A survey

85. Trajectory as an Identity: Privacy-Preserving and Sybil-Resistant Authentication for Internet of Vehicles

86. Performance Analysis of Wireless Sensor Networks Based on Trust Mechanism

87. Cloud Computing: A Review

88. Multimodal Biometric Authentication for Smartphones

89. Watermarking of a 3D Model based on Wavelet Transform

90. Secure Multimodal Authentication Scheme for Wireless Sensor Networks

91. A Paper on Finger Print Recognition

92. Reusable Group Fuzzy Extractor and Group-Shared Bitcoin Wallet

93. Review on EEG-Based Authentication Technology

94. Hough Transform for Distinctive Edge Detection to Images in Fingerprint Recognition Matching Transformation

95. Trust Management in the World of Cloud Computing. Past Trends and Some New Directions

96. Allocating Duplicate Copies for IoT Data in Cloud Computing based on Harmony Search Algorithm

97. Design of a fingerprint template protection scheme using elliptical structures

98. Quenching and Distortion*

99. FinPAD: State-of-the-art of fingerprint presentation attack detection mechanisms, taxonomy and future perspectives

100. Blockchain-Based Electronic Health Records Sharing Scheme with Data Privacy Verifiable

Catalog

Books, media, physical & digital resources