Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 6929

Страница 3 из 693

Extended Role Access Control Model for Web Applications Based on Path Hierarchy

Система дистанционного обучения на базе биометрической аутентификацииA distance learning system with a biometric user authentication system was developed.

ESP STUDENTS' TAKE ON AUTHENTIC AND ADAPTED TEXTS is particularly important for English for Specific Purposes - use of authentic texts. However, this time

Cross-application authentication-application requests protocol based on authentication framework “oAuth 2.0”.

ДИСПОЗИЦИОННАЯ АУТЕНТИЧНОСТЬ ЖЕНЩИН В ВИРТУАЛЬНОЙ СРЕДЕ authenticity of women of different age groups in a virtual environment. The study involved 80 women aged 21

Information security with message authentication codeThis article describes three Message authentication code algorithms. These algorithms ensure

Using wavelet scattering transform to create voiceprint of a password that implement user identification and verification. Voice identification, which implements text

Применение многомодальной аутентификации на объектах критической информационной инфраструктуры

Система автоматизации контроля уровня квалификации персонала

The scheme of vertical handover procedure with care-of-address function user recognition. The procedure includes the authorization phase, registration, authentication

Страница 3 из 693