Search

Your search keyword '"IMPERSONATION"' showing total 1,815 results

Search Constraints

Start Over You searched for: Descriptor "IMPERSONATION" Remove constraint Descriptor: "IMPERSONATION"
1,815 results on '"IMPERSONATION"'

Search Results

1. Constructing identities in institutional impersonation fraud: self-styling and other-styling practices through stances.

2. REPACA: Robust ECC based privacy-controlled mutual authentication and session key sharing protocol in coalmines application with provable security.

3. A Blockchain-assisted lightweight privacy preserving authentication protocol for peer-to-peer communication in vehicular ad-hoc network.

4. Cryptanalysis of an RFID-Enabled Authentication Protocol for Healthcare.

5. Stolen Valor: The Legal Story Behind Impersonating Military Personnel.

6. 論身分竊盜與身分冒用之刑事處罰.

7. TOPAS2-pass key exchange with full perfect forward secrecy and optimal communication complexity.

8. If Social Media Won’t Protect You, Maybe the Law Should.

9. A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication.

10. An Improved blockchain-based secure medical record sharing scheme.

11. Spectrum of Darkness: George Herbert's Ventriloquism of an African Woman in "Aethiopissa ambit Cestum Diversi Coloris Virum".

12. Authenticated Multicast in Tiny Networks via an Extremely Low-Bandwidth Medium.

13. AN IMPROVED AND EFFICIENT RSA-BASED AUTHENTICATION SCHEME FOR HEALTHCARE SYSTEMS.

14. IHKM: an improved hierarchical key management scheme for wireless sensor network.

15. Secure PUF-Based Authentication Systems.

16. Toward designing a lightweight RFID authentication protocol for constrained environments.

17. Designing a Robust Quantum Signature Protocol Based on Quantum Key Distribution for E-Voting Applications.

18. A quantum designated multi-verifiers signature scheme based on LIOP states.

19. A Higher Performance Data Backup Scheme Based on Multi-Factor Authentication †.

20. Vedantam vs. Venus: Drag, Impersonation, and the Limitations of Gender Trouble.

21. An improved feature extraction for Hindi language audio impersonation attack detection.

22. A deep learning-driven fingerprint verification model for enhancing exam integrity in Moroccan higher education.

23. Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication.

24. ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS.

25. Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies.

26. Verification of Peruvian Identity Document Fraud Through OCR, Hash Algorithm, and Simulated Blockchain Database

27. A Federated Learning Framework with Blockchain-Based Auditable Participant Selection.

28. Fraudulent participation in psychological research using virtual synchronous interviews: ethical challenges and potential solutions.

29. Religious Masking and the Rhetorical Strategies of Digital Anti-Vaccination Churches.

30. A LIGHTWEIGHT SYMMETRIC CRYPTOGRAPHY BASED USER AUTHENTICATION PROTOCOL FOR IOT BASED APPLICATIONS.

31. Blockchain-Enabled Secure and Interoperable Authentication Scheme for Metaverse Environments.

32. Suplantación de identidad a través de las empresas de telecomunicaciones en Colombia.

33. An investigation of cyberbullying incidents among learners in institutions of higher learning in Gaborone, Botswana.

34. REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare.

35. Decentralised Global Service Discovery for the Internet of Things.

36. 'KULTURKRIEG' BEHIND BARBED WIRE: GERMAN THEATRE IN AN AUSTRALIAN FIRST‐WORLD‐WAR INTERNMENT CAMP.

37. Marius Victorinus on the Stigmata of the Apostle Paul (Gal 6:17).

38. Criminalizing Impersonation via Social Media Platforms.

39. Eight poor copies (electric speech).

40. Blues Headlines.

42. A lightweight and secure protocol for teleworking environment.

43. A Lightweight Chaotic Map-Based Key Agreement Scheme for the Advanced Metering Infrastructure.

44. On the security of a novel privacy‐preserving authentication scheme for V2G networks.

45. An identity‐based secure VANET communication system.

46. Hecha la cuota, hecha la trampa: La implementación de las medidas afirmativas para personas con discapacidad, afrodescendientes y lgbtiq+ en el estado de Morelos en el proceso electoral 2020-2021.

47. A three-factor mutual authentication scheme for telecare medical information system based on ECC.

48. La personificación de ˀAhkan en el Dintel 3 del Templo IV de Tikal.

49. A Lightweight Symmetric Cryptography based User Authentication Protocol for IoT based Applications.

50. Marius Victorinus on the Stigmata of the Apostle Paul (Gal 6:17)

Catalog

Books, media, physical & digital resources