Search

Your search keyword '"Data_MISCELLANEOUS"' showing total 26,820 results

Search Constraints

Start Over You searched for: Descriptor "Data_MISCELLANEOUS" Remove constraint Descriptor: "Data_MISCELLANEOUS"
26,820 results on '"Data_MISCELLANEOUS"'

Search Results

101. Trusted Routing Protocol for Flying Ad Hoc Networks

102. Fingerprint pre-processing and feature engineering to enhance agricultural products categorization

103. Provocări tehnologice în crearea standardelor pentru analiza amprentelor digitale // Technological Challenges in Creating Standards for Fingerprint Analysis

104. A DCT Fractional Bit Replacement Based Dual Watermarking Algorithm for Image Authentication

105. SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment

106. The use of polar harmonic transformations in the development of methods for robust image watermarking

107. Building a trust model system to avoid cloud services reputation attacks

108. Replica Selection Algorithm in Data Grids: the Best-Fit Approach

109. Advanced Watermarking o f Digital Images Showing Robust, Semi Fragile a nd Fragile Behaviour

110. Future of Cybersecurity: A Study on Biometric Scans

111. Files Storage & Sharing Platform Using Cloud

112. Best cylindrical map projections according to the undesirability of angular and areal distortions

113. Privacy-Preserving Fingerprint Authentication Using D-H Key Exchange and Secret Sharing

114. Improving last-mile delivery for e-commerce: the case of Sweden

115. Opportunities and challenges of crowd logistics on the last mile for courier, express and parcel service providers – a literature review

116. POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing

117. Enhanced and secured random number generation for eUASBP

118. Enhancing Packet-Level Wi-Fi Device Authentication Protocol Leveraging Channel State Information

119. Data Privacy Preservation and Trade-off Balance Between Privacy and Utility Using Deep Adaptive Clustering and Elliptic Curve Digital Signature Algorithm

120. Conceptual engineering: when do we need it? How can we do it?

121. Understanding the interrelationship of barriers towards business model re-engineering under the evolving privacy laws: an interpretive Structure Modelling approach

122. An Interaction-Based and Graph-Based Hybrid Approach to Evaluate Trust in Online Social Networks (OSNs)

123. Privacy-preserving comparison based data aggregation protocols for mobile sensing

124. Collusion-free for Cloud Verification toward the View of Game Theory

125. Deliberate practice and individual entrepreneurial orientation training retention: a multi-wave field experiment

126. Impulsive Behavior Detection System Using Machine Learning and IoT

127. Hachimoji DNA-based reversible blind color images hiding using Julia set and SVD

128. Robust and Secure Zero-Watermarking Algorithm for Medical Images Based on Harris-SURF-DCT and Chaotic Map

129. DT CWT and Schur decomposition based robust watermarking algorithm to geometric attacks

130. A General Region Nesting-Based Semi-Fragile Reversible Watermarking for Authenticating 3D Mesh Models

131. ERINet: Enhanced rotation-invariant network for point cloud classification

132. Auditory memory among a sample of students with learning disabilities in English in Irbid Governorate

133. Protection of data using image watermarking technique

134. Authentication of Voice Commands by Leveraging Vibrations in Wearables

135. Zero Trust: The What, How, Why, and When

136. DPLQ: Location‐based service privacy protection scheme based on differential privacy

137. Adversarial Analysis for Source Camera Identification

138. Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks

139. An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy

140. A Privacy Attack on Coded Caching by Colluding Users

141. Creating opportunities for temporary disconnection: How tourism professionals provide alternatives to being permanently online

142. A systematic review of detection and prevention techniques of SQL injection attacks

143. Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment

144. Neuropsychological performance in young adults with cannabis use disorder

145. BLOcKeR: A Biometric Locking Paradigm for IoT and the Connected Person

146. WATERMARK TECHNIQUE FOR AUTHENTICATION OF VISIBLY WATERMARK IMAGES

147. Enhancing the Time Performance of Encrypting and Decrypting Large Tabular Data

148. Specifics of nature of the biometric data definition in law of the European Union

149. Security weakness of dynamic watermarking-based detection for generalised replay attacks

150. Cryptography based Internet Security ATM System using Fingerprint for securing PIN

Catalog

Books, media, physical & digital resources