Found: 82
Select item for more details and to access through your institution.
Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 2, p. 13706, doi. 10.48084/etasr.7002
- By:
- Publication type:
- Article
detection of political deepfakes.
- Published in:
- Journal of Computer-Mediated Communication, 2022, v. 27, n. 4, p. 1, doi. 10.1093/jcmc/zmac008
- By:
- Publication type:
- Article
Scams Against Lawyers, Professionals, and Other Ordinary People.
- Published in:
- Judges' Journal, 2022, v. 61, n. 3, p. 37
- By:
- Publication type:
- Article
"CATFISHING": A COMPARATIVE ANALYSIS OF U.S. V. CANADIAN CATFISHING LAWS & THEIR LIMITATIONS.
- Published in:
- Southern Illinois University Law Journal, 2019, v. 44, n. 1, p. 75
- By:
- Publication type:
- Article
THE DARK SIDE OF SOCIAL MEDIA ROMANCE: CIVIL RECOURSE FOR CATFISH VICTIMS.
- Published in:
- Loyola of Los Angeles Law Review, 2019, v. 50, n. 4, p. 741
- By:
- Publication type:
- Article
Ethical dilemmas posed by unethical behaviour by persons of concern.
- Published in:
- Revista Migraciones Forzadas, 2019, n. 61, p. 39
- By:
- Publication type:
- Article
Enhanced Tacit Secrets: System-assigned passwords you can't write down, but don't need to.
- Published in:
- International Journal of Information Security, 2019, v. 18, n. 2, p. 239, doi. 10.1007/s10207-018-0408-2
- By:
- Publication type:
- Article
Imposter identification in low prevalence environments.
- Published in:
- Legal & Criminological Psychology, 2019, v. 24, n. 1, p. 179, doi. 10.1111/lcrp.12138
- By:
- Publication type:
- Article
"Fake Vets" and Viral Lies: Personal Narrative in a Post-Truth Era.
- Published in:
- Journal of American Folklore, 2018, v. 131, n. 522, p. 500, doi. 10.5406/jamerfolk.131.522.0500
- By:
- Publication type:
- Article
Forgery and Impersonation in Imperial China: Popular Deceptions and the High Qing State. By Mark McNicholas, 2016.
- Published in:
- 2018
- By:
- Publication type:
- Book Review
Identifying Fake Accounts on Social Networks Based on Graph Analysis and Classification Algorithms.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/5923156
- By:
- Publication type:
- Article
ELAKA: Energy-Efficient and Lightweight Multi-Server Authentication and Key Agreement Protocol Based on Dynamic Biometrics.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 3, p. 767, doi. 10.1007/s11277-018-5348-7
- By:
- Publication type:
- Article
An improved low-cost yoking proof protocol based on Kazahaya’s flaws.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 5, p. 1934, doi. 10.1007/s11227-017-2200-x
- By:
- Publication type:
- Article
Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments.
- Published in:
- PLoS ONE, 2018, v. 13, n. 3, p. 1, doi. 10.1371/journal.pone.0194093
- By:
- Publication type:
- Article
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 1, p. 509, doi. 10.1007/s11227-017-2139-y
- By:
- Publication type:
- Article
Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things.
- Published in:
- Sensors (14248220), 2017, v. 17, n. 10, p. 2348, doi. 10.3390/s17102348
- By:
- Publication type:
- Article
La usurpación de la identidad con fines paródicos en la red social Twitter: ¿manifestaciones de descortesía verbal?
- Published in:
- RILCE. Revista de Filología Hispánica, 2017, v. 33, n. 2, p. 537, doi. 10.15581/008.33.2.537-65
- By:
- Publication type:
- Article
La falsification d'identité en France, du règne personnel de Louis XIV à la veille de la Révolution.
- Published in:
- French Historical Studies, 2016, v. 39, n. 3, p. 471, doi. 10.1215/00161071-3500285
- By:
- Publication type:
- Article
An empirical study of authentication methods to secure e-learning system activities against impersonation fraud.
- Published in:
- Online Journal of Applied Knowledge Management, 2016, v. 4, n. 1, p. 42, doi. 10.36965/ojakm.2016.4(1)42-61
- By:
- Publication type:
- Article
WHO ARE WE?: THE QUEST FOR IDENTITY IN LAW.
- Published in:
- Dalhousie Law Journal, 2015, v. 38, n. 2, p. 311
- By:
- Publication type:
- Article
A Study on Electronic-Money Technology Using Near Field Communication.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 1, p. 1, doi. 10.3390/sym7010001
- By:
- Publication type:
- Article
Identifying Identity Theft.
- Published in:
- 2014
- By:
- Publication type:
- Opinion
Authenticated key exchange with synchronized state.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 12, p. 2373, doi. 10.1002/sec.948
- By:
- Publication type:
- Article
DETECTING AND RESOLVING IDENTITY CRIMES BY USING SECURE MECHANISM.
- Published in:
- Computer Science & Telecommunications, 2013, v. 40, n. 4, p. 33
- By:
- Publication type:
- Article
Tax Refund Scams Can Involve Costly Employer Identity Theft.
- Published in:
- Journal of Tax Practice & Procedure, 2013, v. 15, n. 2, p. 31
- By:
- Publication type:
- Article
Is impersonalization of personal data of parties in civil proceedings necessary and lawful?
- Published in:
- Current Issues of Business & Law / Verslo ir Teisės Aktualijos, 2012, v. 7, n. 2, p. 263, doi. 10.5200/1822-9530.2012.17
- By:
- Publication type:
- Article
'You can't change names and feel the same': The Kindertransport Experience of Susi Bechhöfer in W. G. Sebald's Austerlitz.
- Published in:
- Yearbook of the Research Centre for German & Austrian Exile Studies, 2012, v. 13, p. 219
- By:
- Publication type:
- Article
Physician Medical Identity Theft.
- Published in:
- 2012
- By:
- Publication type:
- Opinion
Do pre-admonition suggestions moderate the effect of unbiased lineup instructions?
- Published in:
- Legal & Criminological Psychology, 2012, v. 17, n. 1, p. 165, doi. 10.1348/135532510X533554
- By:
- Publication type:
- Article
Comparison of two Bayesian methods to detect mode effects between paper-based and computerized adaptive assessments: a preliminary Monte Carlo study.
- Published in:
- BMC Medical Research Methodology, 2012, v. 12, n. 1, p. 124, doi. 10.1186/1471-2288-12-124
- By:
- Publication type:
- Article
DELIMITĂRI DINTRE INFRACŢIUNILE DE ÎNŞELĂCIUNE ŞI ABUZ ÎN SERVICIU CONTRA INTERESELOR PERSOANELOR.
- Published in:
- Dreptul, 2011, n. 12, p. 231
- By:
- Publication type:
- Article
Fraud and Freedom: Gender, Identity and Narratives of Deception among the Female Convicts in Colonial America.
- Published in:
- 2011
- By:
- Publication type:
- Case Study
Can I See Your I.D.?: True Stories of False Identities.
- Published in:
- 2011
- By:
- Publication type:
- Book Review
THE TRUE IDENTITY OF AUSTRALIAN IDENTITY THEFT OFFENCES: A MEASURED RESPONSE OR AN UNJUSTIFIED STATUS OFFENCE?
- Published in:
- University of New South Wales Law Journal, 2010, v. 33, n. 2, p. 503
- By:
- Publication type:
- Article
Examining the Role of Applicant Faking in Hiring Decisions: Percentage of Fakers Hired and Hiring Discrepancies in Single- and Multiple-Predictor Selection.
- Published in:
- Journal of Business & Psychology, 2009, v. 24, n. 4, p. 373, doi. 10.1007/s10869-009-9121-5
- By:
- Publication type:
- Article
Letter to the editor.
- Published in:
- 2009
- Publication type:
- Letter
Exploring Medical Identity Theft.
- Published in:
- Perspectives in Health Information Management, 2009, v. 6, n. 5, p. 1
- By:
- Publication type:
- Article
UNKNOWING THIEVES: REFORMING THE LEGAL LINK BETWEEN IMMIGRATION AND IDENTITY THEFT.
- Published in:
- Rutgers Law Journal, 2009, v. 41, n. 1/2, p. 403
- By:
- Publication type:
- Article
Combating ID Theft: The Identity Theft Red Flags Rule.
- Published in:
- Podiatry Management, 2009, v. 28, n. 5, p. 55
- By:
- Publication type:
- Article
Editor's Introduction.
- Published in:
- Social Research, 2008, v. 75, n. 4, p. 1035
- By:
- Publication type:
- Article
Beyond Capital High: On Dual Citizenship and the Strange Career of “Acting White”.
- Published in:
- Anthropology & Education Quarterly, 2008, v. 39, n. 3, p. 227, doi. 10.1111/j.1548-1492.2008.00019.x
- By:
- Publication type:
- Article
Women charged for hospital thefts.
- Published in:
- Lamp, 2008, v. 65, n. 8, p. 13
- Publication type:
- Article
Identifying the Identity Thief: Is it time for a (smart) Australia Card?#.
- Published in:
- International Journal of Law & Information Technology, 2008, v. 16, n. 2, p. 125, doi. 10.1093/ijlit/eam008
- By:
- Publication type:
- Article
The New Challenges of Cybercrime.
- Published in:
- Federal Sentencing Reporter, 2008, v. 20, n. 5, p. 356, doi. 10.1525/fsr.2008.20.5.356
- By:
- Publication type:
- Article
Student and Non-Student Perceptions and Awareness of Identity Theft.
- Published in:
- Canadian Journal of Criminology & Criminal Justice, 2008, v. 50, n. 2, p. 153, doi. 10.3138/cjccj.50.2.153
- By:
- Publication type:
- Article
Identity Theft Issues in China.
- Published in:
- Issues in Innovation, 2008, v. 2, n. 1, p. 28
- By:
- Publication type:
- Article
Risks of Identity Theft: Can the Market Protect the Payment System?
- Published in:
- Economic Review (01612387), 2007, v. 92, n. 4, p. 5
- By:
- Publication type:
- Article
A New Breed of Identity Theft.
- Published in:
- Podiatry Management, 2007, v. 26, n. 9, p. 279
- By:
- Publication type:
- Article
IDENTITY THEFT: MAKING THE KNOWN UNKNOWNS KNOWN.
- Published in:
- Harvard Journal of Law & Technology, 2007, v. 21, n. 1, p. 97
- By:
- Publication type:
- Article
IDENTITY CRISIS.
- Published in:
- Government Technology, 2007, v. 20, n. 6, p. 20
- By:
- Publication type:
- Article