scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "e-Authentication"

1 - 10 of 27 results for
 "e-Authentication"
Results per page:
Intelligent Circuits and Systems

Intelligent Circuits and Systems

Publication Type: eBook

Abstract: ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fi...

Law and Justice in a Globalized World : Proceedings of the Asia-Pacific Research in Social Sciences and Humanities, Depok, Indonesia, November 7-9, 2016: Topics in Law and Justice

Law and Justice in a Globalized World : Proceedings of the Asia-Pacific Research in Social Sciences and Humanities, Depok, Indonesia, November 7-9, 2016: Topics in Law and Justice

Publication Type: eBook

Abstract: The book consists of a selection of papers presented at the Asia-Pacific Research Conference on Social Sciences and Humanities. It contains essays on current legal issues in law and justice, and their role and transformation in a globalizing world. Top...

Propolis: An update on its chemistry and pharmacological applications.

Publication Type: Academic Journal

Source(s): Chinese Medicine; 8/26/2022, Vol. 17 Issue 1, p1-60, 60p

Abstract: Copyright of Chinese Medicine is the property of BioMed Central and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or ema...

TDAS: a touch dynamics based multi-factor authentication solution for mobile devices.

Publication Type: Academic Journal

Source(s): International Journal of Pervasive Computing & Communications; 2016, Vol. 12 Issue 1, p127-153, 27p

Abstract: Copyright of International Journal of Pervasive Computing & Communications is the property of Emerald Publishing Limited and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express writt...

Transcriptomic profiling of pemphigus lesion infiltrating mononuclear cells reveals a distinct local immune microenvironment and novel lncRNA regulators.

Publication Type: Academic Journal

Source(s): Journal of Translational Medicine; 4/21/2022, Vol. 20 Issue 1, p1-13, 13p

Abstract: Copyright of Journal of Translational Medicine is the property of BioMed Central and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print,...

Robustness against fraudulent activities of a blockchain-based online review system.

Publication Type: Academic Journal

Source(s): Peer-to-Peer Networking & Applications; Jan2022, Vol. 15 Issue 1, p92-106, 15p

Abstract: Copyright of Peer-to-Peer Networking & Applications is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may ...

Research on ultrasonic-based long-distance and sub-millimeter real-time ranging system.

Publication Type: Conference

Source(s): Proceedings of SPIE; 10/1/2022, Vol. 12306, p123060A-123060A-11, 1p

A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems.

Publication Type: Academic Journal

Source(s): ACM Computing Surveys; Mar2020, Vol. 52 Issue 2, p1-36, 36p, 6 Diagrams, 3 Charts

Abstract: Copyright of ACM Computing Surveys is the property of Association for Computing Machinery and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users m...

A Model for Optimising Security in Public Key Infrastructure Solutions for eGovernment.

Publication Type: Academic Journal

Source(s): International Journal of Information Security Science. Mar2016, Vol. 5 Issue 1, p8-20. 13p.

Abstract: Public Key Infrastructure (PKI) quality attributes like security, availability, integrity, interoperability etc. are latent in nature meaning they cannot be measured or observed directly. This presents a problem on how they can be optimized since as Dr...

A Mobile Computing Method Using CNN and SR for Signature Authentication with Contour Damage and Light Distortion.

Publication Type: Academic Journal

Source(s): Wireless Communications & Mobile Computing. 6/25/2018, p1-10. 10p.

Abstract: A signature is a useful human feature in our society, and determining the genuineness of a signature is very important. A signature image is typically analyzed for its genuineness classification; however, increasing classification accuracy while decrea...

sponsored