Материалов:
1 005 021

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 8677

Страница 1 из 868

Blockchain Fog-based scheme for identity authentication in smart buildingThis paper presents a proposal for an authentication scheme for smart building systems

Improved Multisignature Scheme for Authenticity of Digital Document in Digital Forensics Using Edward-Curve Digital Signature Algorithm, authenticity is essential, especially in legal situations and digital forensics. As technology advances

EHE: nonce misuse-resistant message authenticationWe propose a nonce misuse-resistant message authentication scheme called EHE (Encrypt

Биометрическая аутентификация в информационных технологиях, also the main stages of biometric authentication of faces and the possibilities of their realization

СОВРЕМЕННЫЕ МЕТОДЫ АУТЕНТИФИКАЦИИ И АВТОРИЗАЦИИ ВЕБ-ПРИЛОЖЕНИЙ: ОТ МНОГОФАКТОРНОЙ АУТЕНТИФИКАЦИИ ДО БИОМЕТРИЧЕСКИХ ДАННЫХ complex user authentication schemes based on sophisticated encryption methodology. However, many

Сигнатуры конечных полей для систем контроля утечек данных защищенности алгоритмов.Schemes of information security and algorithm coding in finite fields for data leakage

Схема групповой аутентификации на основе доказательства с нулевым разглашениемGroup authentication scheme based on zero-knowledge proof

Применимость сканеров глаз в технологии биометрической аутентификацииApplicability of eye scanners in biometric authentication technology

Biometric authentication in software are upcoming threats, the traditional methods of authentication like passwords and PINs don’t provide adequate

A Novel Secure Steganographic Method Based on Zero Tree Method and integer wavelet transform through lifting scheme is performed for each block. In order to find proper

Страница 1 из 868