Works matching DE "COMPUTER user identification"
Results: 185
High‐Resolution Monolithic Integrated Tribotronic InGaZnO Thin‐Film Transistor Array for Tactile Detection.
- Published in:
- Advanced Functional Materials, 2020, v. 30, n. 35, p. 1, doi. 10.1002/adfm.202002613
- By:
- Publication type:
- Article
VIC-PRO: Vicinity Protection by Concealing Location Coordinates Using Geometrical Transformations in Location Based Services.
- Published in:
- Wireless Personal Communications, 2019, v. 107, n. 2, p. 1041, doi. 10.1007/s11277-019-06316-y
- By:
- Publication type:
- Article
An Improve Three Factor Remote User Authentication Scheme Using Smart Card.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 1, p. 227, doi. 10.1007/s11277-017-5055-9
- By:
- Publication type:
- Article
Secure Data Access and Sharing Scheme for Cloud Storage.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 4, p. 5295, doi. 10.1007/s11277-016-3742-6
- By:
- Publication type:
- Article
Resource Allocation with Limited Feedback and Joint Coding Scheme for Wireless Multi-antenna Multicast System.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 3, p. 819, doi. 10.1007/s11277-013-1219-4
- By:
- Publication type:
- Article
Two Factor Authentications of Automatic Teller Machine (ATM) Users via Radio Frequency and Face Identification.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, p. 179
- By:
- Publication type:
- Article
Continuous Authentication in the Digital Age: An Analysis of Reinforcement Learning and Behavioral Biometrics.
- Published in:
- Computers (2073-431X), 2024, v. 13, n. 4, p. 103, doi. 10.3390/computers13040103
- By:
- Publication type:
- Article
Effects of Password Type and Memory Techniques on User Password Memory.
- Published in:
- Psi Chi Journal of Psychological Research, 2016, v. 21, n. 4, p. 269, doi. 10.24839/b21.4.269
- By:
- Publication type:
- Article
EFICIÊNCIA DAS TECNOLOGIAS REMOTAS NA ABORDAGEM DO CONTEÚDO DE UM CURSO DE MATEMÁTICA E-LEARNING USANDO O SISTEMA MOODLE: ESTUDO DE CASO.
- Published in:
- Periódico Tchê Química, 2020, v. 17, n. 35, p. 1159, doi. 10.52571/ptq.v17.n35.2020.95_sozontova_pgs_1159_1174.pdf
- By:
- Publication type:
- Article
USING KERBEROS PROTOCOL FOR SINGLE SIGN-ON IN IDENTITY MANAGEMENT SYSTEMS.
- Published in:
- Journal of Information Technology & Applications, 2013, v. 3, n. 1, p. 27, doi. 10.7251/JIT1301027M
- By:
- Publication type:
- Article
Caught between the users and the firm: How does identity conflict affect employees' innovative behavior.
- Published in:
- Creativity & Innovation Management, 2020, v. 29, n. 3, p. 380, doi. 10.1111/caim.12380
- By:
- Publication type:
- Article
A proposed approach for Digital Identity management using Self Sovereign Identity.
- Published in:
- International Journal of Next-Generation Computing, 2021, v. 12, n. 2, p. 158
- By:
- Publication type:
- Article
Malicious Cognitive User Identification Algorithm in Centralized Spectrum Sensing System.
- Published in:
- Future Internet, 2017, v. 9, n. 4, p. 79, doi. 10.3390/fi9040079
- By:
- Publication type:
- Article
Smartphone User Identity Verification Using Gait Characteristics.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 10, p. 100, doi. 10.3390/sym8100100
- By:
- Publication type:
- Article
ACTIVE AUTHENTICATION: THE PANACEA OF ACCESS CONTROL.
- Published in:
- Journal of Information System Security, 2015, v. 11, n. 3, p. 185
- By:
- Publication type:
- Article
Feedback Big Data-Based Lie Robot.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2018, v. 32, n. 2, p. -1, doi. 10.1142/S0218001418590024
- By:
- Publication type:
- Article
Fusion-Based Hand Geometry Recognition Using Dempster-Shafer Theory.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2015, v. 29, n. 5, p. -1, doi. 10.1142/S0218001415560054
- By:
- Publication type:
- Article
Development of Methods for Navigational Referencing of Circumlunar Spacecrafts to the Selenocentric Dynamic Coordinate System.
- Published in:
- Astronomy Reports, 2020, v. 64, n. 9, p. 795, doi. 10.1134/S1063772920100017
- By:
- Publication type:
- Article
A Rough Set Approach for User Identification Based on EEG Signals.
- Published in:
- Egyptian Computer Science Journal, 2014, v. 38, n. 3, p. 43
- By:
- Publication type:
- Article
USA: Limits of Authorized Access.
- Published in:
- Computer Law Review International, 2021, v. 22, n. 6, p. 170, doi. 10.9785/cri-2021-220604
- Publication type:
- Article
Context Matters! Looking Beyond Platform Structure to Understand Citizen Deliberation on Brazil's Portal e‐Democracia.
- Published in:
- Policy & Internet, 2019, v. 11, n. 3, p. 370, doi. 10.1002/poi3.196
- By:
- Publication type:
- Article
User identification via neural network based language models.
- Published in:
- International Journal of Network Management, 2019, v. 29, n. 3, p. N.PAG, doi. 10.1002/nem.2049
- By:
- Publication type:
- Article
Reduced Overhead Frequent User Authentication in EAP-Dependent Broadband Wireless Networks.
- Published in:
- Mobile Networks & Applications, 2016, v. 21, n. 3, p. 523, doi. 10.1007/s11036-015-0642-z
- By:
- Publication type:
- Article
Dynamic ID authentication scheme using chaotic map.
- Published in:
- Wireless Networks (10220038), 2018, v. 24, n. 3, p. 769, doi. 10.1007/s11276-016-1370-4
- By:
- Publication type:
- Article
Measuring Privacy Disclosures in URL Query Strings.
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 6, p. 52, doi. 10.1109/MIC.2014.104
- By:
- Publication type:
- Article
Google as a de facto privacy regulator: analysing the Privacy Sandbox from an antitrust perspective.
- Published in:
- European Competition Journal, 2021, v. 17, n. 3, p. 617, doi. 10.1080/17441056.2021.1930450
- By:
- Publication type:
- Article
A CONCEPTUAL DESIGN OF A LOW COST IDENTIFICATION MANAGEMENT SYSTEM FOR NIGERIA.
- Published in:
- Computer Science & Telecommunications, 2013, v. 40, n. 4, p. 24
- By:
- Publication type:
- Article
Multivariate process parameter change identification by neural network.
- Published in:
- International Journal of Advanced Manufacturing Technology, 2013, v. 69, n. 9-12, p. 2261, doi. 10.1007/s00170-013-5200-x
- By:
- Publication type:
- Article
Skyline Query Optimization for Preferable Product Selection and Recommendation System.
- Published in:
- Wireless Personal Communications, 2021, v. 117, n. 4, p. 3091, doi. 10.1007/s11277-020-07592-9
- By:
- Publication type:
- Article
A Novel Privacy Protection Scheme for Iris Identification.
- Published in:
- Wireless Personal Communications, 2019, v. 109, n. 4, p. 2411, doi. 10.1007/s11277-019-06688-1
- By:
- Publication type:
- Article
Critical node identification in active distribution network using resilience and risk theory.
- Published in:
- IET Generation, Transmission & Distribution (Wiley-Blackwell), 2020, v. 14, n. 14, p. 2771, doi. 10.1049/iet-gtd.2019.1781
- By:
- Publication type:
- Article
Identification in an On-line Learning Environment.
- Published in:
- SEFBIS Journal, 2013, n. 8, p. 81
- By:
- Publication type:
- Article
FedCrow: Federated-Learning-Based Data Privacy Preservation in Crowd Sensing.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 11, p. 4788, doi. 10.3390/app14114788
- By:
- Publication type:
- Article
IoT Privacy and Security: Challenges and Solutions.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 12, p. 4102, doi. 10.3390/app10124102
- By:
- Publication type:
- Article
Enhancing the Security of Pattern Unlock with Surface EMG-Based Biometrics.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 2, p. 541, doi. 10.3390/app10020541
- By:
- Publication type:
- Article
Innovation in Search of a Context: The Early History of Lexis.
- Published in:
- Information & Culture, 2019, v. 54, n. 2, p. 220, doi. 10.7560/ic54204
- By:
- Publication type:
- Article
Electronic Identification for Universities: Building Cross-Border Services Based on the eIDAS Infrastructure †.
- Published in:
- Information (2078-2489), 2019, v. 10, n. 6, p. 210, doi. 10.3390/info10060210
- By:
- Publication type:
- Article
An Interaction Methodology to Collect and Assess User-Driven Requirements to Define Potential Opportunities of Future Hyperspectral Imaging Sentinel Mission.
- Published in:
- Remote Sensing, 2020, v. 12, n. 8, p. 1286, doi. 10.3390/rs12081286
- By:
- Publication type:
- Article
Enhancing University Services by Extending the eIDAS European Specification with Academic Attributes †.
- Published in:
- Sustainability (2071-1050), 2020, v. 12, n. 3, p. 770, doi. 10.3390/su12030770
- By:
- Publication type:
- Article
User Identification Model Based on Mouse Behaviors.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2018, v. 28, n. 2, p. 175, doi. 10.1142/S0218194018400028
- By:
- Publication type:
- Article
User Identification Using Real Environmental Human Computer Interaction Behavior.
- Published in:
- KSII Transactions on Internet & Information Systems, 2019, v. 13, n. 6, p. 3055, doi. 10.3837/tiis.2019.06.016
- By:
- Publication type:
- Article
User Reputation computation Method +Based on Implicit Ratings on Social Media.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 3, p. 1570, doi. 10.3837/tiis.2017.03.018
- By:
- Publication type:
- Article
Keystroke biometrics in the encrypted domain: a first study on search suggestion functions of web search engines.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13635-020-0100-8
- By:
- Publication type:
- Article
WHY TAIWANESE PEOPLE DO NOT COMPLY WITH FACEBOOK'S REAL NAME POLICY.
- Published in:
- Social Behavior & Personality: an international journal, 2016, v. 44, n. 8, p. 1371, doi. 10.2224/sbp.2016.44.8.1371
- By:
- Publication type:
- Article
Sorry, we don't recognize that user ID. Please try again.
- Published in:
- 2016
- By:
- Publication type:
- Letter to the Editor
Measuring time-sensitive user influence in Twitter.
- Published in:
- Knowledge & Information Systems, 2020, v. 62, n. 9, p. 3481, doi. 10.1007/s10115-020-01459-y
- By:
- Publication type:
- Article
Properties of information sets and information processing with an application to face recognition.
- Published in:
- Knowledge & Information Systems, 2017, v. 52, n. 2, p. 485, doi. 10.1007/s10115-016-1017-x
- By:
- Publication type:
- Article
Hand geometry based user identification using minimal edge connected hand image graph.
- Published in:
- IET Computer Vision (Wiley-Blackwell), 2018, v. 12, n. 5, p. 744, doi. 10.1049/iet-cvi.2017.0053
- By:
- Publication type:
- Article
A Practical Privacy-Preserving Recommender System.
- Published in:
- Data Science & Engineering, 2016, v. 1, n. 3, p. 161, doi. 10.1007/s41019-016-0020-2
- By:
- Publication type:
- Article
Genetic modeling of feed intake.
- Published in:
- Journal of Animal Science, 2015, v. 93, n. 3, p. 965, doi. 10.2527/jas.2014-8507
- By:
- Publication type:
- Article