Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 1654

Страница 1 из 166

Biometric authentication in software are upcoming threats, the traditional methods of authentication like passwords and PINs don’t provide adequate

Voice User Authentication SystemVoice User Authentication System

ESP STUDENTS' TAKE ON AUTHENTIC AND ADAPTED TEXTS is particularly important for English for Specific Purposes - use of authentic texts. However, this time

Cross-application authentication-application requests protocol based on authentication framework “oAuth 2.0”.

Information security with message authentication codeThis article describes three Message authentication code algorithms. These algorithms ensure

Blockchain Fog-based scheme for identity authentication in smart buildingThis paper presents a proposal for an authentication scheme for smart building systems

Multi-factor Authentication: A Survey and Challenges in V2X Applications of the enablers to keep this process secure is the authentication. It touches many different areas

Blockchain Based Cloud Authentication Framework for Digital Identity Management in Smart City providers need user data in order to be able to authenticate him in order to be able to access and access

EHE: nonce misuse-resistant message authenticationWe propose a nonce misuse-resistant message authentication scheme called EHE (Encrypt

Препятствия аудирования аутентичных информационных радиопередачIn this article is talking about problem of features of listening of authentic information

Страница 1 из 166