Works about ELECTRONIC authentication
1
- IET Computer Vision (Wiley-Blackwell), 2018, v. 12, n. 5, p. 744, doi. 10.1049/iet-cvi.2017.0053
- Angadi, Shanmukhappa;
- Hatture, Sanjeevakumar
- Article
2
- International Journal of Smart Security Technologies (IJSST), 2022, v. 9, n. 1, p. 1, doi. 10.4018/IJSST.299038
- Sharma, Abhishek;
- Sharma, Shilpi;
- Gulati, Saksham
- Article
3
- ISSA Journal, 2020, v. 18, n. 3, p. 23
- Article
4
- Electronics (2079-9292), 2022, v. 11, n. 13, p. N.PAG, doi. 10.3390/electronics11132039
- Maksymovych, Volodymyr;
- Nyemkova, Elena;
- Justice, Connie;
- Shabatura, Mariia;
- Harasymchuk, Oleh;
- Lakh, Yuriy;
- Rusynko, Morika
- Article
5
- Electronics (2079-9292), 2022, v. 11, n. 1, p. 4, doi. 10.3390/electronics11010004
- Hassan, Md Arif;
- Shukur, Zarina
- Article
6
- Romanian Case Law Review / Revista Română de Jurisprudenţă, 2020, n. 5, p. 454
- Article
7
- Právník, 2021, v. 160, n. 12, p. 1038
- Loutocký, Pavel;
- Kasl, František
- Article
8
- IUP Journal of Telecommunications, 2017, v. 9, n. 3, p. 54
- Brahmaraju, M.;
- Jagadeesh, S.;
- Sridevi, G.
- Article
9
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 1177, doi. 10.14569/ijacsa.2024.01503117
- Alqurashi, Fahad;
- Ahmad, Istiak
- Article
10
- Law, Innovation & Technology, 2015, v. 7, n. 1, p. 83, doi. 10.1080/17579961.2015.1052646
- Article
11
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/635890
- Lu, Yanrong;
- Li, Lixiang;
- Peng, Haipeng;
- Yang, Xing;
- Yang, Yixian
- Article
12
- ITNOW, 2015, v. 57, n. 3, p. 23, doi. 10.1093/itnow/bwv066
- Article
13
- European Data Protection Law Review (EDPL), 2024, v. 10, n. 2, p. 178, doi. 10.21552/edpl/2024/2/8
- Article
14
- European Data Protection Law Review (EDPL), 2018, v. 4, n. 1, p. 118, doi. 10.21552/edpl/2018/1/18
- Article
15
- Cogent Engineering, 2022, v. 9, n. 1, p. 1, doi. 10.1080/23311916.2022.2035134
- Manoj, T.;
- Makkithaya, Krishnamoorthi;
- V. G., Narendra
- Article
16
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2022, v. 39, n. 8, p. 2474, doi. 10.19734/j.issn.1001-3695.2021.12.0703
- Article
17
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 641, doi. 10.3969/j.issn.1001-3695.2014.03.001
- HAN Ji-zhong;
- LI Feng-hua;
- XUE Xiao-yun;
- WAN Sheng
- Article
18
- Scientific Research & Education in the Air Force - AFASES, 2014, v. 1, p. 361
- Article
19
- Mobile Networks & Applications, 2019, v. 24, n. 3, p. 890, doi. 10.1007/s11036-018-1145-5
- Hassan, Alzubair;
- Omala, Anyembe Andrew;
- Li, Fagen;
- Ali, Mohamed;
- Jin, Chunhua
- Article
20
- Mobile Networks & Applications, 2019, v. 24, n. 3, p. 1104, doi. 10.1007/s11036-018-1104-1
- Anitha Kumari, K.;
- Sudha Sadasivam, G.
- Article
21
- Mobile Networks & Applications, 2019, v. 24, n. 3, p. 1046, doi. 10.1007/s11036-018-1061-8
- Karuppiah, Marimuthu;
- Niranchana, R.;
- Das, Ashok Kumar;
- Li, Xiong;
- Kumari, Saru;
- Wu, Fan;
- Chaudhry, Shehzad Ashraf
- Article
22
- Symmetry (20738994), 2018, v. 10, n. 1, p. 13, doi. 10.3390/sym10010013
- Chang, Chin-Chen;
- Lu, Tzu-Chuen;
- Zhu, Zhao-Hua;
- Tian, Hui
- Article
23
- Journal of Mathematical Cryptology, 2016, v. 10, n. 1, p. 35, doi. 10.1515/jmc-2016-0002
- Swanson, Colleen M.;
- Stinson, Douglas R.
- Article
24
- Journal of Mathematical Cryptology, 2013, v. 7, n. 3, p. 225, doi. 10.1515/jmc-2013-5004
- Koblitz, Neal;
- Menezes, Alfred
- Article
25
- International Journal of Distributed Sensor Networks, 2020, v. 16, n. 7, p. 1, doi. 10.1177/1550147720944025
- Ahmad, Masood;
- Rehman, Ateeq Ur;
- Ayub, Nighat;
- Alshehri, MD;
- Khan, Muazzam A;
- Hameed, Abdul;
- Yetgin, Halil
- Article
26
- International Journal of Distributed Sensor Networks, 2017, v. 13, n. 3, p. 1, doi. 10.1177/1550147717697321
- Article
27
- Global Jurist, 2020, v. 20, n. 1, p. N.PAG, doi. 10.1515/gj-2019-0025
- Article
28
- Nonlinear Dynamics, 2015, v. 82, n. 1/2, p. 835, doi. 10.1007/s11071-015-2198-7
- Article
29
- Personal & Ubiquitous Computing, 2018, v. 22, n. 1, p. 3, doi. 10.1007/s00779-017-1017-1
- Park, Namje;
- Lee, Donghyeok
- Article
30
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2023, v. 27, n. 10, p. 6033, doi. 10.1007/s00500-023-07889-4
- Yupapin, Preecha;
- Meshram, Chandrashekhar;
- Barve, Sharad Kumar;
- Ibrahim, Rabha W.;
- Akbar, Muhammad Azeem
- Article
31
- Review of Policy Research, 2024, v. 41, n. 3, p. 471, doi. 10.1111/ropr.12537
- Shirazi, Hossein;
- Vahdaninia, Valiallah;
- Maleki, Ali
- Article
32
- International Journal of Engineering Research & Development (IJERAD), 2023, v. 15, n. 2, p. 840, doi. 10.29137/umagd.1288835
- Kartal, Yunus;
- Doğan, Deniz;
- Daş, M. Taylan;
- Metin, Ayşegül Ülkü
- Article
33
- Journal of Social Sciences & Philosophy, 2019, v. 31, n. 2, p. 187
- Article
34
- Information Society / Információs Társadalom (InfTars), 2019, v. 19, n. 2, p. 52
- Article
35
- Information Systems Management, 2015, v. 32, n. 1, p. 72, doi. 10.1080/10580530.2015.983025
- Goodstadt, Leo F.;
- Connolly, Regina;
- Bannister, Frank
- Article
36
- Computers (2073-431X), 2018, v. 7, n. 3, p. 40, doi. 10.3390/computers7030040
- Article
37
- Ingeniería (0121-750X), 2023, v. 28, p. 1, doi. 10.14483/23448393.19656
- Pava Díaz, Roberto Albeiro;
- Páez Méndez, Rafael Vicente;
- Niño Vásquez, Luis Fernando
- Article
38
- Fiat Iustitia, 2019, n. 1, p. 264
- Article
39
- Human Factors & Ergonomics in Manufacturing & Service Industries, 2025, v. 35, n. 3, p. 1, doi. 10.1002/hfm.70007
- Merdanoğlu, Nur;
- Onay Durdu, Pınar
- Article
40
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 197
- Losavio, Michael;
- Keeling, Deborah
- Article
41
- DESIDOC Journal of Library & Information Technology, 2018, v. 38, n. 5, p. 354, doi. 10.14429/djlit.38.5.13114
- Article
43
- International Journal of Interactive Mobile Technologies, 2017, v. 11, n. 1, p. 133, doi. 10.3991/ijim.v11i1.6368
- Article
44
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 612, doi. 10.1007/s12083-013-0220-8
- Shin, Soobok;
- Shon, Taeshik;
- Yeh, Hongjin;
- Kim, Kangseok
- Article
46
- Ilkogretim Online, 2021, v. 20, n. 5, p. 1766, doi. 10.17051/ilkonline.2021.05.194
- Ameer, Ajina Mohamed;
- Jose, M. Victor
- Article
47
- European Journal of Open, Distance & E-Learning, 2021, v. 23, n. 2, p. 99, doi. 10.2478/eurodl-2020-0013
- Uotinen, Sanna;
- Ladonlahti, Tarja;
- Laamanen, Merja
- Article
48
- Journal of Information Science & Engineering, 2018, v. 34, n. 1, p. 155, doi. 10.6688/JISE.2018.34.1.10
- CHUN-TA LI;
- CHENG-CHI LEE;
- CHI-YAO WENG
- Article
49
- Journal of Information Science & Engineering, 2018, v. 34, n. 1, p. 135, doi. 10.6688/JISE.2018.34.1.9
- SHIN-YAN CHIOU;
- JIUN-MING CHEN
- Article
50
- Frontiers in Health Informatics, 2022, v. 11, p. 1, doi. 10.30699/fhi.v11i1.374
- Aval, Reyhane Norouzi;
- Mousavi Baigi, Seyyedeh Fatemeh;
- Sarbaz, Masoumeh;
- Kimiafar, Khalil
- Article