Search

Your search keyword '"LEGAL authentication software"' showing total 193 results

Search Constraints

Start Over You searched for: Descriptor "LEGAL authentication software" Remove constraint Descriptor: "LEGAL authentication software"
193 results on '"LEGAL authentication software"'

Search Results

1. Optimal Probabilistic Fingerprint Codes.

2. A new perceptual video fingerprinting system.

3. Reflective Particle Tag for Arms Control and Safeguards Authentication.

4. INTRODUCING MICRO-AUTHENTICATION SERVERS, IN EMERGING PERVASIVE ENVIRONMENTS.

5. Practical authentication scheme for SIP.

6. Security of message authentication codes in the presence of key-dependent messages.

7. Toward Secure Vehicular Ad-hoc Networks: A Survey.

8. A new class of 3-fold perfect splitting authentication codes.

9. ILLiad, CAS, Shibboleth, and PHP: The Road to Single Sign-On.

10. RUASN: A Robust User Authentication Framework for Wireless Sensor Networks.

11. Online joint palmprint and palmvein verification

12. Biometric personal authentication using keystroke dynamics: A review.

13. Computationally efficient mutual entity authentication in wireless sensor networks.

14. SYSTEMC-BASED HARDWARE/SOFTWARE CO-DESIGN OF ELLIPTIC CURVE CRYPTOGRAPHIC SYSTEM FOR NETWORK MUTUAL AUTHENTICATION.

15. Vehicle model recognition from frontal view image measurements

18. Another kind of ethics: from corrections to retractions Editorial.

19. Implementing Zero-Knowledge Authentication with Zero Knowledge (ZKA•wzk).

20. Authentication and ID-Based Key Management Protocol in Pervasive Environment.

21. Parallel and Concurrent Security of the HB and HB+ Protocols.

22. Non-linear and non-group cellular automata chaining technique for cryptographic applications

23. Low Complexity Speaker Identification Approach.

24. Secure and Robust Error Correction for Physical Unclonable Functions.

25. Facial Recognition in Uncontrolled Conditions for Information Security.

26. Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection

27. Improved security analysis for OMAC as a pseudorandom function.

28. Fighting Phishing with Discriminative Keypoint Features.

29. Video-Based Person Authentication Using Face and Visual Speech.

30. A New User Dependent Iris Recognition System Based on an Area Preserving Pointwise Level Set Segmentation Approach.

31. The authentication and authorization infrastructure of perfSONAR MDM.

32. EFDA-fed: European federation among fusion energy research laboratories.

33. Lessons Learned from the SDSS Catalog Archive Server.

34. 50 Years of Image Processing and Pattern Recognition in China.

35. Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks.

36. Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems.

37. Fragility and Robustness of Binary-Phase-Only-Filter-Based Fragile/Semifragile Digital Image Watermarking.

38. Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions.

39. Cryptographic relational algebra for databases using the field authenticator

40. Text luminance modulation for hardcopy watermarking

41. LlNEAR-TIME CERTIFYING RECOGNITION ALGORITHMS AND FORBIDDEN INDUCED SUBGRAPHS.

42. Rate-Distortion-Authentication Optimized Streaming of Authenticated Video.

43. Controlled and Cooperative Updates of XML Documents in Byzantine and Failure-Prone Distributed Systems.

44. The Rise of Web Service Ecosystems.

45. Perl∷Critic.

46. Understanding SSRS Authentication.

47. A communication-efficient three-party password authenticated key exchange protocol

48. GroupTest: Multifactor authentication.

49. Juggling Multiple SaaS Apps?

50. CROSS-PLATFORM Identity Management Solutions FOR SINGLE SIGN-ON.

Catalog

Books, media, physical & digital resources