Works matching IS 09565515 AND DT 2014 AND VI 25 AND IP 2
Results: 15
Construction of a secure two-factor user authentication system using fingerprint information and password.
- Published in:
- Journal of Intelligent Manufacturing, 2014, v. 25, n. 2, p. 217, doi. 10.1007/s10845-012-0669-y
- By:
- Publication type:
- Article
IT convergence security.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
A practical implementation of fuzzy fingerprint vault for smart cards.
- Published in:
- Journal of Intelligent Manufacturing, 2014, v. 25, n. 2, p. 293, doi. 10.1007/s10845-012-0656-3
- By:
- Publication type:
- Article
Information security strategies: towards an organizational multi-strategy perspective.
- Published in:
- Journal of Intelligent Manufacturing, 2014, v. 25, n. 2, p. 357, doi. 10.1007/s10845-012-0683-0
- By:
- Publication type:
- Article
Test-driven forensic analysis of satellite automotive navigation systems.
- Published in:
- Journal of Intelligent Manufacturing, 2014, v. 25, n. 2, p. 329, doi. 10.1007/s10845-012-0653-6
- By:
- Publication type:
- Article
Content-based control of HTTPs mail for implementation of IT-convergence security environment.
- Published in:
- Journal of Intelligent Manufacturing, 2014, v. 25, n. 2, p. 231, doi. 10.1007/s10845-012-0666-1
- By:
- Publication type:
- Article
Analyzing and comparing the AES architectures for their power consumption.
- Published in:
- Journal of Intelligent Manufacturing, 2014, v. 25, n. 2, p. 263, doi. 10.1007/s10845-012-0671-4
- By:
- Publication type:
- Article
A secret sharing scheme for EBTC using steganography.
- Published in:
- Journal of Intelligent Manufacturing, 2014, v. 25, n. 2, p. 241, doi. 10.1007/s10845-012-0660-7
- By:
- Publication type:
- Article
Ubiquitous-City Integrated Authentication System (UCIAS).
- Published in:
- Journal of Intelligent Manufacturing, 2014, v. 25, n. 2, p. 347, doi. 10.1007/s10845-014-0877-8
- By:
- Publication type:
- Article
The industrial security management model for SMBs in smart work.
- Published in:
- Journal of Intelligent Manufacturing, 2014, v. 25, n. 2, p. 319, doi. 10.1007/s10845-012-0651-8
- By:
- Publication type:
- Article
Image contrast enhancement for intelligent surveillance systems using multi-local histogram transformation.
- Published in:
- Journal of Intelligent Manufacturing, 2014, v. 25, n. 2, p. 303, doi. 10.1007/s10845-012-0663-4
- By:
- Publication type:
- Article
Study on two privacy-oriented protocols for information communication systems.
- Published in:
- Journal of Intelligent Manufacturing, 2014, v. 25, n. 2, p. 339, doi. 10.1007/s10845-012-0654-5
- By:
- Publication type:
- Article
Unbalanced states violates RFID privacy.
- Published in:
- Journal of Intelligent Manufacturing, 2014, v. 25, n. 2, p. 273, doi. 10.1007/s10845-012-0655-4
- By:
- Publication type:
- Article
Fast password recovery attack: application to APOP.
- Published in:
- Journal of Intelligent Manufacturing, 2014, v. 25, n. 2, p. 251, doi. 10.1007/s10845-012-0670-5
- By:
- Publication type:
- Article
Towards an accurate evaluation of quality of cloud service in service-oriented cloud computing.
- Published in:
- Journal of Intelligent Manufacturing, 2014, v. 25, n. 2, p. 283, doi. 10.1007/s10845-012-0661-6
- By:
- Publication type:
- Article