Search

Your search keyword '"*COMPUTER access control"' showing total 2,033 results

Search Constraints

Start Over You searched for: Descriptor "*COMPUTER access control" Remove constraint Descriptor: "*COMPUTER access control"
2,033 results on '"*COMPUTER access control"'

Search Results

1. The Security Jawbreaker.

2. Extending Rucio with modern cloud storage support.

3. GPS Spoofing-Resilient Filtering Using Self-Contained Sensors and Chimera Signal Enhancement.

4. EFFICIENT FRAMEWORK OF SECURITY FOR INTERNET OF THINGS.

5. Implementation of two-factor user authentication in computer systems.

6. Blockchain-Based Secure Authentication Solution for Web Applications.

7. Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms.

8. IoT-based door access using three security-layers.

9. Siamese Neural Network for Keystroke Dynamics-Based Authentication on Partial Passwords.

10. Attacking Windows Hello for Business: Is It What We Were Promised?

11. Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions.

12. A novel quantum identity authentication protocol without entanglement and preserving pre-shared key information.

13. Hardware Implementation of an Enhanced Securityand Authentication-Related Automotive CAN Bus Prototype.

14. Examining User Verification Schemes, Safety and Secrecy Issues Affecting M-Banking: Systematic Literature Review.

15. Doble autenticación utilizando software móvil de lectura de código QR.

16. TOKEN-BASED AUTHENTICATION: NAVIGATING ACCESS SCENARIOS FOR SECURE USER VERIFICATION.

17. Physical Visitor Access Control and Authentication Using Blockchain, Smart Contracts and Internet of Things.

18. Process Authentication through Blockchain: Three Case Studies.

19. Effective 2-D cursor control system using hybrid SSVEP + P300 visual brain computer interface.

20. Data Democratization for Value Creation: Despite the risks and challenges, data democratization has the potential to unleash the full power of company data.

21. Hybrid Biometric Based Person Identification Using Machine Learning.

22. Light Weight Authentication Scheme for Smart Home IoT Devices.

23. A combined authentication strategy for public cloud using attribute based encryption.

24. Auth4App: Streamlining authentication for integrated cyber–physical environments.

25. A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage.

26. QS-Auth: A Quantum-secure mutual authentication protocol based on PUF and Post-Quantum Signature for Heterogeneous Delay-Tolerant Networks.

27. A provably secure multi-server authentication scheme based on Chebyshev chaotic map.

28. A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application.

29. A Novel ES-RwCNN Based Finger Vein Recognition System with Effective L12 DTP Descriptor and AWM-WOA Selection.

30. LEOBAT: Lightweight encryption and OTP based authentication technique for securing IoT networks.

31. Framework for implementing a big data ecosystem in organizations.

32. Signal Extenders.

33. A hybrid system for monitoring and automated recovery at the Glasgow Tier-2 cluster.

34. Secure Command Line Solution for Token-based Authentication.

35. WLCG Token Usage and Discovery.

36. LHC Data Storage: Preparing for the Challenges of Run-3.

37. Accounting in the CloudVeneto private cloud.

38. Archival, anonymization and presentation of HTCondor logs with GlideinMonitor.

39. The new (and improved!) CERN Single-Sign-On.

40. The evolution of the CMS monitoring infrastructure.

41. The Challenges of Open Source Software Alternatives.

42. 基于生物特征识别的门限身份认证方案.

43. A Novel Framework for Open-Set Authentication of Internet of Things Using Limited Devices.

44. ARE YOU WHO YOU SAY YOU ARE? COMPUTER SCIENCE AND THE PROBLEM OF DIVINE SELF‐AUTHENTICATION.

45. Evaluation of Machine Learning Algorithms for the Detection of Fake Bank Currency.

46. Modelling an Intrusion Detection system using ensemble approach based on voting to improve accuracy of base classifiers.

47. Dynamic Image Capturing System for CCTV Managing.

48. Recursive Equation Approach of Information Hiding for Authentication of Digital Data.

50. Secret image sharing in the encrypted domain.

Catalog

Books, media, physical & digital resources