Search

Your search keyword '"COMPUTER access control"' showing total 8,047 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER access control" Remove constraint Descriptor: "COMPUTER access control"
8,047 results on '"COMPUTER access control"'

Search Results

101. Hybrid Biometric Based Person Identification Using Machine Learning.

102. Secured Cloud Communication Using Lightweight Hash Authentication with PUF.

103. Cooperative Detection Method for DDoS Attacks Based on Blockchain.

104. Framework for implementing a big data ecosystem in organizations.

105. DEEP FAKES: An Authenticity Challenge.

106. A combined authentication strategy for public cloud using attribute based encryption.

107. Understanding Non-Fungible Token (NFT) Purchase Motivations.

108. Perceptions of Risk and Security Concerns with Mobile Devices using Biometric vs Traditional Authentication Methods.

109. A survey on face template protection methods.

110. THE EMERGENCE OF LIMINAL CYBERSPACE - CHALLENGES FOR THE ONTOLOGICAL WORK IN CYBERSECURITY.

111. A Review of Reversible Data Hiding-Encrypted Image(RDH-EI) Methods.

112. Light Weight Authentication Scheme for Smart Home IoT Devices.

113. Binary Multifold Encryption Technique for Complex Cloud Systems.

114. E-Authentication System Using QR Code & OTP.

115. Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing.

116. Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum.

117. Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method.

118. User Authentication Mechanism for Access Control Management: A Comprehensive Study.

119. Data Democratization for Value Creation: Despite the risks and challenges, data democratization has the potential to unleash the full power of company data.

120. Build a Web Application on Firebase.

121. LEOBAT: Lightweight encryption and OTP based authentication technique for securing IoT networks.

122. A Novel ES-RwCNN Based Finger Vein Recognition System with Effective L12 DTP Descriptor and AWM-WOA Selection.

123. EFFICIENT OTP GENERATION WITH ENCRYPTION AND DECRYPTION FOR SECURE FILE ACCESS IN CLOUD ENVIRONMENT.

124. The Implementation of zk-SNARK HH Authentication on IoT Protocols.

125. A Chosen Random Value Attack on WPA3 SAE Authentication Protocol.

126. DeFi: The Financial Fabric of the Metaverse.

127. Secure Authentication and Key Agreement Protocol for Cloud-Assisted Industrial Internet of Things.

128. Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol.

129. An Authentication Based Approach for Prevention of Spectrum Sensing Data Falsification Attacks in Cognitive Radio Network.

130. A Novel Framework for Open-Set Authentication of Internet of Things Using Limited Devices.

131. 基于生物特征识别的门限身份认证方案.

132. Secured Vehicle Life Cycle Tracking Using Blockchain and Smart Contract.

133. IPTV Access Methods with RADIUS-Server Authorization.

134. A hybrid system for monitoring and automated recovery at the Glasgow Tier-2 cluster.

135. WLCG Token Usage and Discovery.

136. Secure Command Line Solution for Token-based Authentication.

137. LHC Data Storage: Preparing for the Challenges of Run-3.

138. Accounting in the CloudVeneto private cloud.

139. The new (and improved!) CERN Single-Sign-On.

140. Archival, anonymization and presentation of HTCondor logs with GlideinMonitor.

141. The evolution of the CMS monitoring infrastructure.

142. The Challenges of Open Source Software Alternatives.

143. ARE YOU WHO YOU SAY YOU ARE? COMPUTER SCIENCE AND THE PROBLEM OF DIVINE SELF‐AUTHENTICATION.

144. Evaluation of Machine Learning Algorithms for the Detection of Fake Bank Currency.

145. Modelling an Intrusion Detection system using ensemble approach based on voting to improve accuracy of base classifiers.

146. Dynamic Image Capturing System for CCTV Managing.

147. Recursive Equation Approach of Information Hiding for Authentication of Digital Data.

148. Identity Governance Framework for Privileged Users.

149. Improving Unlinkability of Attribute-based Authentication through Game Theory.

150. CRYPTOGRAPHIC METHOD BASED ON NATURAL-ELZAKI TRANSFORM.

Catalog

Books, media, physical & digital resources