Search

Your search keyword '"authentication methods"' showing total 34 results

Search Constraints

Start Over You searched for: Descriptor "authentication methods" Remove constraint Descriptor: "authentication methods"
34 results on '"authentication methods"'

Search Results

1. MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms.

2. Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study.

3. Artificial intelligence in physiological characteristics recognition for internet of things authentication

5. Biometric technology in banking institutions: ‘The customers’ perspectives’

6. Migrating to Hosted EZproxy: Our Library's Experience.

7. On the Security of the EMV Authentication Methods of Contactless Cards.

8. Steganography-based Password Management: A conceptual Model

9. DNA-based approaches for dairy products authentication: A review and perspectives.

10. Biometric technology in banking institutions: 'The customers' perspectives'.

11. QR code based two-factor authentication to verify paper-based documents.

12. We Have Outgrown IP Authentication.

13. Password Management : A Study about Current Challenges with Password Management

14. Evaluation of the Waiting Time Tolerance of User Authentication in Custom Applications of IDTV

15. The Initial Effects of EMV Migration on Chargebacks in the United States.

16. g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices.

17. RA21 Considerations for Medical Libraries.

18. Authentication Methods and Recent Developments.

19. Quality and Authenticity Control of Functional Red Yeast Rice—A Review

20. DNA-based approaches for dairy products authentication: A review and perspectives

21. BIOMETRIC MULTI-FACTOR AUTHENTICATION SCHEME IN CLOUD COMPUTING.

22. g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices

23. Evalvacija metod učenja tujega jezika pri odklepanju zaslona na mobilnih napravah

24. QR code based two-factor authentication to verify paper-based documents

25. A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance.

26. СИСТЕМИ АВТОРИЗАЦІЇ З ВИКОРИСТАННЯМ РІЗНИХ МЕТОДІВ АУТЕНТИФІКАЦІЇ

27. The TIPPI Point: Toward Trustworthy Interfaces.

28. Usability and verifiability of secure features for authenticating identity

29. Quality and Authenticity Control of Functional Red Yeast Rice—A Review

30. Zagotavljanje varnosti v brezžičnih poslovnih omrežjih

31. Autentizace non-human buněčných linií

32. Quality and Authenticity Control of Functional Red Yeast Rice—A Review.

34. A survey of continuous and transparent multibiometric authentication systems

Catalog

Books, media, physical & digital resources