Search

Showing total 7,274 results

Search Constraints

Start Over You searched for: Topic authentication Remove constraint Topic: authentication Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
7,274 results

Search Results

2. New insights into paper—Chemical paper analysis using Raman microscopy.

3. Incidences of problematic cell lines are lower in papers that use RRIDs to identify cell lines.

4. The scientific examination of works of art on paper

5. Programmable Organic Chipless RFID Tags Inkjet Printed on Paper Substrates

7. Incidences of problematic cell lines are lower in papers that use RRIDs to identify cell lines

8. Securing Information Systems in an Uncertain World Enterprise Level Security (Invited Paper)

9. On Microstructure Estimation Using Flatbed Scanners for Paper Surface-Based Authentication.

10. The Intrinsic Value of Valuable Paper: On the Infrastructural Work of Authentication Devices.

12. 纸质照片真实性检验方法.....

15. Counterfeit Detection Based on Unclonable Feature of Paper Using Mobile Camera.

18. A reply to the Letter to the Editor of Moškrič et al. entitled "A comment on the paper from Utzeri et al. (2022) "Entomological authentication of honey based on a DNA method that distinguishes Apis mellifera mitochondrial C mitotypes: Application to honey produced by A. m. ligustica and A. m. carnica, Food control, Volume 121, March 2021, 107626"

20. 基于区块链的智能家居认证与访问控制方案.

23. Programmable Organic Chipless RFID Tags Inkjet Printed on Paper Substrates.

24. Understanding visual lip-based biometric authentication for mobile devices.

26. Encryption and optical authentication of confidential cellulosic papers by ecofriendly multi-color photoluminescent inks.

28. Retaining hardcopy papers still important in digital age.

33. A blockchain authentication scheme for UAV-aided fog computing.

36. Stabilized Performance Maximization for GAN-based Real-Time Authentication Image Generation over Internet.

37. The Future Risk of Biometric Data Theft in Cybersecurity.

38. An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain.

39. Implementation of two-factor user authentication in computer systems.

43. Digital Friend-or-Foe Authentication.

44. Enhancing Data Security of Cloud Based LMS.

45. New Heart Features for More Effective Human Identification.