Advanced Search Results For "e-Authentication"
Your filters
Intelligent Circuits and Systems
Publication Type: eBook
Abstract: ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fi...
Law and Justice in a Globalized World : Proceedings of the Asia-Pacific Research in Social Sciences and Humanities, Depok, Indonesia, November 7-9, 2016: Topics in Law and Justice
Publication Type: eBook
Abstract: The book consists of a selection of papers presented at the Asia-Pacific Research Conference on Social Sciences and Humanities. It contains essays on current legal issues in law and justice, and their role and transformation in a globalizing world. Top...
Propolis: An update on its chemistry and pharmacological applications.
Publication Type: Academic Journal
Source(s): Chinese Medicine; 8/26/2022, Vol. 17 Issue 1, p1-60, 60p
Abstract: Copyright of Chinese Medicine is the property of BioMed Central and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or ema...
TDAS: a touch dynamics based multi-factor authentication solution for mobile devices.
Publication Type: Academic Journal
Source(s): International Journal of Pervasive Computing & Communications; 2016, Vol. 12 Issue 1, p127-153, 27p
Abstract: Copyright of International Journal of Pervasive Computing & Communications is the property of Emerald Publishing Limited and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express writt...
Transcriptomic profiling of pemphigus lesion infiltrating mononuclear cells reveals a distinct local immune microenvironment and novel lncRNA regulators.
Publication Type: Academic Journal
Source(s): Journal of Translational Medicine; 4/21/2022, Vol. 20 Issue 1, p1-13, 13p
Abstract: Copyright of Journal of Translational Medicine is the property of BioMed Central and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print,...
Robustness against fraudulent activities of a blockchain-based online review system.
Publication Type: Academic Journal
Source(s): Peer-to-Peer Networking & Applications; Jan2022, Vol. 15 Issue 1, p92-106, 15p
Abstract: Copyright of Peer-to-Peer Networking & Applications is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may ...
Research on ultrasonic-based long-distance and sub-millimeter real-time ranging system.
Publication Type: Conference
Source(s): Proceedings of SPIE; 10/1/2022, Vol. 12306, p123060A-123060A-11, 1p
A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems.
Publication Type: Academic Journal
Source(s): ACM Computing Surveys; Mar2020, Vol. 52 Issue 2, p1-36, 36p, 6 Diagrams, 3 Charts
Abstract: Copyright of ACM Computing Surveys is the property of Association for Computing Machinery and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users m...
A Model for Optimising Security in Public Key Infrastructure Solutions for eGovernment.
Publication Type: Academic Journal
Source(s): International Journal of Information Security Science. Mar2016, Vol. 5 Issue 1, p8-20. 13p.
Abstract: Public Key Infrastructure (PKI) quality attributes like security, availability, integrity, interoperability etc. are latent in nature meaning they cannot be measured or observed directly. This presents a problem on how they can be optimized since as Dr...
A Mobile Computing Method Using CNN and SR for Signature Authentication with Contour Damage and Light Distortion.
Publication Type: Academic Journal
Source(s): Wireless Communications & Mobile Computing. 6/25/2018, p1-10. 10p.
Abstract: A signature is a useful human feature in our society, and determining the genuineness of a signature is very important. A signature image is typically analyzed for its genuineness classification; however, increasing classification accuracy while decrea...