Found: 181
Select item for more details and to access through your institution.
Collaborative tensor–topic factorization model for personalized activity recommendation.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 12, p. 16923, doi. 10.1007/s11042-018-7019-9
- By:
- Publication type:
- Article
A Novel framework of EEG-based user identification by analyzing music-listening behavior.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 24, p. 25581, doi. 10.1007/s11042-016-4232-2
- By:
- Publication type:
- Article
A lightweight authentication and key agreement protocol preserving user anonymity.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 11, p. 13401, doi. 10.1007/s11042-016-3704-8
- By:
- Publication type:
- Article
A secure smart card authentication and authorization framework using in multimedia cloud.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 9, p. 11715, doi. 10.1007/s11042-016-3506-z
- By:
- Publication type:
- Article
Integrating appearance features and soft biometrics for person re-identification.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 9, p. 12117, doi. 10.1007/s11042-016-4070-2
- By:
- Publication type:
- Article
Design and implementation of a same-user identification system in invoked reality space.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 9, p. 11429, doi. 10.1007/s11042-016-4117-4
- By:
- Publication type:
- Article
Multi-resolution time frequency feature and complementary combination for short utterance speaker recognition.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 3, p. 937, doi. 10.1007/s11042-013-1705-4
- By:
- Publication type:
- Article
Do multispectral palmprint images be reliable for person identification?
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 3, p. 955, doi. 10.1007/s11042-013-1706-3
- By:
- Publication type:
- Article
User identification approach based on simple gestures.
- Published in:
- Multimedia Tools & Applications, 2014, v. 71, n. 1, p. 179, doi. 10.1007/s11042-013-1635-1
- By:
- Publication type:
- Article
A safe authentication system for distance education.
- Published in:
- Computer Applications in Engineering Education, 2014, v. 22, n. 4, p. 593, doi. 10.1002/cae.20583
- By:
- Publication type:
- Article
ONLINE NATIONAL CITIZEN'S ID RENEWAL SYSTEM.
- Published in:
- i-Manager's Journal on Computer Science, 2023, v. 11, n. 2, p. 12, doi. 10.26634/jcom.11.2.20060
- By:
- Publication type:
- Article
Comparison of the cohort selection performance of Australian Medicines Terminology to Anatomical Therapeutic Chemical mappings.
- Published in:
- 2019
- By:
- Publication type:
- journal article
USA: Limits of Authorized Access.
- Published in:
- Computer Law Review International, 2021, v. 22, n. 6, p. 170, doi. 10.9785/cri-2021-220604
- Publication type:
- Article
Modeling of the User's Identification Security System of on the 2FA Base.
- Published in:
- International Journal of Electronics & Telecommunications, 2021, v. 67, n. 2, p. 235, doi. 10.24425/ijet.2021.135970
- By:
- Publication type:
- Article
Legal Aspects of the Security Concerns Surrounding Radio Frequency Identification (RFID) Technology.
- Published in:
- ASA University Review, 2013, v. 7, n. 2, p. 91
- By:
- Publication type:
- Article
Semi-supervised auto-encoder for facial attributes recognition.
- Published in:
- Telkomnika, 2020, v. 18, n. 4, p. 2169, doi. 10.12928/TELKOMNIKA.v18i4.14836
- By:
- Publication type:
- Article
Data Re-Identification—A Case of Retrieving Masked Data from Electronic Toll Collection.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 4, p. 550, doi. 10.3390/sym11040550
- By:
- Publication type:
- Article
Smartphone User Identity Verification Using Gait Characteristics.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 10, p. 100, doi. 10.3390/sym8100100
- By:
- Publication type:
- Article
Enhancing University Services by Extending the eIDAS European Specification with Academic Attributes †.
- Published in:
- Sustainability (2071-1050), 2020, v. 12, n. 3, p. 770, doi. 10.3390/su12030770
- By:
- Publication type:
- Article
IDENTIFYING OPEN INNOVATION PARTNERS: A METHODOLOGY FOR STRATEGIC PARTNER SELECTION.
- Published in:
- International Journal of Innovation Management, 2016, v. 20, n. 5, p. -1, doi. 10.1142/S1363919616400119
- By:
- Publication type:
- Article
Drivers for precision livestock technology adoption: A study of factors associated with adoption of electronic identification technology by commercial sheep farmers in England and Wales.
- Published in:
- PLoS ONE, 2018, v. 13, n. 1, p. 1, doi. 10.1371/journal.pone.0190489
- By:
- Publication type:
- Article
Anomaly-based user comments detection in social news websites using troll user comments as normality representation.
- Published in:
- Logic Journal of the IGPL, 2016, v. 24, n. 6, p. 883, doi. 10.1093/jigpal/jzw043
- By:
- Publication type:
- Article
WHY TAIWANESE PEOPLE DO NOT COMPLY WITH FACEBOOK'S REAL NAME POLICY.
- Published in:
- Social Behavior & Personality: an international journal, 2016, v. 44, n. 8, p. 1371, doi. 10.2224/sbp.2016.44.8.1371
- By:
- Publication type:
- Article
User Identity Protection in Wireless Local Area Networks.
- Published in:
- Gazi University Journal of Science, 2013, v. 26, n. 4, p. 563
- By:
- Publication type:
- Article
Study on the User Density Identification via Improved Whale Optimization Algorithm in Device-to-Device Communication.
- Published in:
- Complexity, 2019, p. 1, doi. 10.1155/2019/8147289
- By:
- Publication type:
- Article
Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2022, v. 11, n. 2, p. 157, doi. 10.1049/bme2.12065
- By:
- Publication type:
- Article
Anonymous Query Mechanism Construction of Timed-Release Encryption.
- Published in:
- Advanced Engineering Science / Gongcheng Kexue Yu Jishu, 2022, v. 54, n. 3, p. 64, doi. 10.15961/j.jsuese.202100985
- By:
- Publication type:
- Article
The Security System in Information Technology Detects Fake Accounts on The Youtube Platform.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2023, v. 16, n. 1, p. 518, doi. 10.22266/ijies2023.0228.45
- By:
- Publication type:
- Article
Genetic modeling of feed intake.
- Published in:
- Journal of Animal Science, 2015, v. 93, n. 3, p. 965, doi. 10.2527/jas.2014-8507
- By:
- Publication type:
- Article
Identification in an On-line Learning Environment.
- Published in:
- SEFBIS Journal, 2013, n. 8, p. 81
- By:
- Publication type:
- Article
A Rough Set Approach for User Identification Based on EEG Signals.
- Published in:
- Egyptian Computer Science Journal, 2014, v. 38, n. 3, p. 43
- By:
- Publication type:
- Article
Sci-Hub Project, its Legality, and its Impact on Access to Scientific Journals in Pakistan.
- Published in:
- Journal of the Pakistan Dental Association, 2023, v. 32, n. 1, p. 1, doi. 10.25301/JPDA.321.1
- By:
- Publication type:
- Article
Effects of Password Type and Memory Techniques on User Password Memory.
- Published in:
- Psi Chi Journal of Psychological Research, 2016, v. 21, n. 4, p. 269, doi. 10.24839/b21.4.269
- By:
- Publication type:
- Article
Make It Short and Easy: Username Complexity Determines Trustworthiness Above and Beyond Objective Reputation.
- Published in:
- Frontiers in Psychology, 2017, p. 1, doi. 10.3389/fpsyg.2017.02200
- By:
- Publication type:
- Article
Commencement of and Retention in Web-Based Interventions and Response to Prompts and Reminders: Longitudinal Observational Study Based on Two Randomized Controlled Trials.
- Published in:
- 2021
- By:
- Publication type:
- journal article
Promoting Identification and Use of Aid Resources by Caregivers of Seniors: Co-Design of an Electronic Health Tool.
- Published in:
- Journal of Medical Internet Research, 2019, v. 21, n. 8, p. N.PAG, doi. 10.2196/12314
- By:
- Publication type:
- Article
ACTIVE AUTHENTICATION: THE PANACEA OF ACCESS CONTROL.
- Published in:
- Journal of Information System Security, 2015, v. 11, n. 3, p. 185
- By:
- Publication type:
- Article
User Reputation computation Method +Based on Implicit Ratings on Social Media.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 3, p. 1570, doi. 10.3837/tiis.2017.03.018
- By:
- Publication type:
- Article
Keystroke biometrics in the encrypted domain: a first study on search suggestion functions of web search engines.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13635-020-0100-8
- By:
- Publication type:
- Article
Mining Key Users of Microblog Topics based on Trust Model.
- Published in:
- International Journal of Performability Engineering, 2019, n. 11, p. 3024, doi. 10.23940/ijpe.19.11.p22.30243030
- By:
- Publication type:
- Article
Activity-Free User Identification Using Wearables Based on Vision Techniques.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 19, p. 7368, doi. 10.3390/s22197368
- By:
- Publication type:
- Article
Development of a Low-Cost Portable Electronic Nose for Cigarette Brands Identification.
- Published in:
- 2020
- By:
- Publication type:
- Letter
Compressed-Domain ECG-Based Biometric User Identification Using Compressive Analysis.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 11, p. 3279, doi. 10.3390/s20113279
- By:
- Publication type:
- Article
Data Improvement Model Based on ECG Biometric for User Authentication and Identification.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 10, p. 2920, doi. 10.3390/s20102920
- By:
- Publication type:
- Article
BioMove: Biometric User Identification from Human Kinesiological Movements for Virtual Reality Systems.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 10, p. 2944, doi. 10.3390/s20102944
- By:
- Publication type:
- Article
Biometric Identification from Human Aesthetic Preferences.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 4, p. 1133, doi. 10.3390/s20041133
- By:
- Publication type:
- Article
Hierarchical Identifier: Application to User Privacy Eavesdropping on Mobile Payment App.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 14, p. 3052, doi. 10.3390/s19143052
- By:
- Publication type:
- Article
Real-Time User Identification and Behavior Prediction Based on Foot-Pad Recognition.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 13, p. 2899, doi. 10.3390/s19132899
- By:
- Publication type:
- Article
User Identification across Asynchronous Mobility Trajectories.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 9, p. 2102, doi. 10.3390/s19092102
- By:
- Publication type:
- Article
Directional Paging for 5G Communications Based on Partitioned User ID.
- Published in:
- Sensors (14248220), 2018, v. 18, n. 6, p. 1845, doi. 10.3390/s18061845
- By:
- Publication type:
- Article