Works matching DE "LEGAL authentication software"
Results: 30
DECENTRALIZED TRUST MANAGEMENT FOR SECURING COMMUNITY NETWORKS.
- Published in:
- Intel Technology Journal, 2009, v. 13, n. 2, p. 148
- By:
- Publication type:
- Article
THE DARK CLOUD: UNDERSTANDING AND DEFENDING AGAINST BOTNETS AND STEALTHY MALWARE.
- Published in:
- Intel Technology Journal, 2009, v. 13, n. 2, p. 130
- By:
- Publication type:
- Article
NETWORK SECURITY: CHALLENGES AND SOLUTIONS.
- Published in:
- Intel Technology Journal, 2009, v. 13, n. 2, p. 112
- By:
- Publication type:
- Article
ENHANCED PRIVACY ID: A REMOTE ANONYMOUS ATTESTATION SCHEME FOR HARDWARE DEVICES.
- Published in:
- Intel Technology Journal, 2009, v. 13, n. 2, p. 96
- By:
- Publication type:
- Article
NEW PROCESSOR INSTRUCTIONS FOR ACCELERATING ENCRYPTION AND AUTHENTICATION ALGORITHMS.
- Published in:
- Intel Technology Journal, 2009, v. 13, n. 2, p. 52
- By:
- Publication type:
- Article
Facial Recognition in Uncontrolled Conditions for Information Security.
- Published in:
- EURASIP Journal on Advances in Signal Processing, 2010, p. 1, doi. 10.1155/2010/345743
- By:
- Publication type:
- Article
A New User Dependent Iris Recognition System Based on an Area Preserving Pointwise Level Set Segmentation Approach.
- Published in:
- EURASIP Journal on Advances in Signal Processing, 2009, p. 1, doi. 10.1155/2009/980159
- By:
- Publication type:
- Article
AUTHENTICATION SOFTWARE.
- Published in:
- Financial Executive, 2008, v. 24, n. 1, p. 60
- Publication type:
- Article
Technology TOOLS.
- Published in:
- 2006
- Publication type:
- Product Review
Analysis and Detection Of Errors In Implementation Of SHA-512 Algorithms On FPGAs.
- Published in:
- Computer Journal, 2007, v. 50, n. 6, p. 728, doi. 10.1093/comjnl/bxm023
- By:
- Publication type:
- Article
Improved security analysis for OMAC as a pseudorandom function.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 2, p. 133, doi. 10.1515/JMC.2009.006
- By:
- Publication type:
- Article
Secure Cyberspace: Answering the Call for Intelligent Action.
- Published in:
- IT Professional, 2009, v. 11, n. 3, p. 60, doi. 10.1109/MITP.2009.60
- By:
- Publication type:
- Article
The Rise of Web Service Ecosystems.
- Published in:
- IT Professional, 2006, v. 8, n. 5, p. 31, doi. 10.1109/MITP.2006.123
- By:
- Publication type:
- Article
Parallel and Concurrent Security of the HB and HB<sup>+</sup> Protocols.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 3, p. 402, doi. 10.1007/s00145-010-9061-2
- By:
- Publication type:
- Article
SYSTEMC-BASED HARDWARE/SOFTWARE CO-DESIGN OF ELLIPTIC CURVE CRYPTOGRAPHIC SYSTEM FOR NETWORK MUTUAL AUTHENTICATION.
- Published in:
- Malaysian Journal of Computer Science, 2011, v. 24, n. 2, p. 111
- By:
- Publication type:
- Article
Practical authentication scheme for SIP.
- Published in:
- Peer-to-Peer Networking & Applications, 2013, v. 6, n. 1, p. 61, doi. 10.1007/s12083-012-0129-7
- By:
- Publication type:
- Article
A Novel Scheme for Face Recognition and Authentication Against Pose, Illumination and Expression Changes.
- Published in:
- Journal of Information Science & Engineering, 2011, v. 27, n. 1, p. 369
- By:
- Publication type:
- Article
Authentication and Copyright Protection Scheme for H.264/AVC and SVC.
- Published in:
- Journal of Information Science & Engineering, 2011, v. 27, n. 1, p. 129
- By:
- Publication type:
- Article
Implementing Zero-Knowledge Authentication with Zero Knowledge (ZKAwzk).
- Published in:
- Python Papers, 2010, v. 5, n. 3, p. 1
- Publication type:
- Article
Toward Secure Vehicular Ad-hoc Networks: A Survey.
- Published in:
- IETE Technical Review, 2012, v. 29, n. 1, p. 80, doi. 10.4103/0256-4602.93141
- By:
- Publication type:
- Article
Fighting Phishing with Discriminative Keypoint Features.
- Published in:
- IEEE Internet Computing, 2009, v. 13, n. 3, p. 56, doi. 10.1109/MIC.2009.59
- By:
- Publication type:
- Article
A new perceptual video fingerprinting system.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 6, p. 6713, doi. 10.1007/s11042-017-4595-z
- By:
- Publication type:
- Article
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2011, v. 11, n. 5, p. 5020, doi. 10.3390/s110505020
- By:
- Publication type:
- Article
Password Authentication Scheme with Secured Login Interface.
- Published in:
- Computer Science & Telecommunications, 2010, v. 24, n. 1, p. 48
- By:
- Publication type:
- Article
Perl∷Critic.
- Published in:
- Perl Review, 2006, v. 2, n. 3, p. 24
- By:
- Publication type:
- Article
Authentication and ID-Based Key Management Protocol in Pervasive Environment.
- Published in:
- Wireless Personal Communications, 2010, v. 55, n. 1, p. 91, doi. 10.1007/s11277-009-9788-y
- By:
- Publication type:
- Article
Sharing Data and Analytical Resources Securely in a Biomedical Research Grid Environment.
- Published in:
- Journal of the American Medical Informatics Association, 2008, v. 15, n. 3, p. 363, doi. 10.1197/jamia.M2662
- By:
- Publication type:
- Article
Low Complexity Speaker Identification Approach.
- Published in:
- Carpathian Journal of Electronic & Computer Engineering, 2010, v. 3, n. 1, p. 61
- By:
- Publication type:
- Article
Another kind of ethics: from corrections to retractions Editorial.
- Published in:
- 2010
- By:
- Publication type:
- Editorial
Delivering CAC/PIV Authentication on IronKey Enterprise Devices for Mobile Workers.
- Published in:
- International Journal of Micrographics & Optical Technology, 2009, v. 27, n. 6, p. 14
- Publication type:
- Article