Search

Your search keyword '"COMPUTER access control"' showing total 8,047 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER access control" Remove constraint Descriptor: "COMPUTER access control"
8,047 results on '"COMPUTER access control"'

Search Results

1. The Security Jawbreaker.

2. Authentication Security of Combinatorial Watermarking for GNSS Signal Authentication.

3. Home computer ownership and educational outcomes of adolescents in Greece.

4. A lightweight and anonymous mutual authentication and key agreement scheme for WBAN.

5. IDENTITY-BASED PRIVACY-PRESERVING ANONYMOUS AUTHENTICATION ACCESS CONTROL FOR SECURE CLOUD COMPUTING.

6. Telemedicine Model for Hyperglycaemia Patients on Emergency in Ughelli, Delta State.

7. Extending Rucio with modern cloud storage support.

8. GPS Spoofing-Resilient Filtering Using Self-Contained Sensors and Chimera Signal Enhancement.

9. Secure approach to sharing digitized medical data in a cloud environment.

10. Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics.

11. A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust.

12. Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT.

13. IMPROVING USER SECURITY DURING A CALL.

14. Security of Romanian Electronic Passports: The Protection of Personal Data in the Digital Age.

15. EFFICIENT FRAMEWORK OF SECURITY FOR INTERNET OF THINGS.

16. Digital Text Document Watermarking Based Tampering Attack Detection via Internet.

17. Sphinx-in-the-Head: Group Signatures from Symmetric Primitives.

18. Implementation of two-factor user authentication in computer systems.

19. Authentic Strategy - Calling for More than Just Good Strategy.

20. Comprehensive Security and Privacy Framework against Malicious Insider in Cloud-based Machine Learning.

21. The Bureaucratic Route of the Real Estate Sale Contracts.

22. A New Face Swap Detection Technique for Digital Images.

23. Behavioral authentication for security and safety.

24. Privacy-preserving location authentication for low-altitude UAVs: A blockchain-based approach.

25. Los Conflictos Socioambientales en el Bajo Cauca antioqueño (Colombia): Sentidos y Políticas Públicas.

26. IoT-based door access using three security-layers.

27. Blockchain-Based Secure Authentication Solution for Web Applications.

28. An Application-Based Tool That Contains Both an Enhanced Password Generator and a Password Strength Checker.

29. Implementation of smart saver, logged-in device protector.

30. EVALUATING RESTRICTIVE VOTING AND MOVINET-BASED TRANSFER LEARNING FOR ROBUST FACE LIVENESS DETECTION.

31. Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms.

32. EEDF: Enhanced Encryption Decryption Framework for Device Authentication in IoT.

33. Biometric Authentication & It’s Security Purposes.

34. The zero trust supply chain: Managing supply chain risk in the absence of trust.

35. A Lightweighted Secure Scheme for Data Aggregation in Large-Scale IoT-Based Smart Grids.

36. WebGuardian: Holistic Approach to Address Dynamic Web Application Threat Landscape.

37. Power-Based Side-Channel Attacks on Program Control Flow with Machine Learning Models.

38. Siamese Neural Network for Keystroke Dynamics-Based Authentication on Partial Passwords.

39. The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets.

40. End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs.

41. Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph.

42. Privacy Policies across the Ages: Content of Privacy Policies 1996-2021.

43. Mechanized Proofs of Adversarial Complexity and Application to Universal Composability.

44. A Vulnerability Assessment Framework for Privacy-preserving Record Linkage.

45. EULER: Detecting Network Lateral Movement via Scalable Temporal Link Prediction.

46. PrivExtractor: Toward Redressing the Imbalance of Understanding between Virtual Assistant Users and Vendors.

47. Costs and Benefits of Authentication Advice.

48. RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware.

49. Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices.

50. Graph-Based Replication and Two Factor Authentication in Cloud Computing.

Catalog

Books, media, physical & digital resources