Works matching DE "MULTI-factor authentication"
1
- Revista de Stiinte Politice / Revue des Sciences Politiques, 2025, n. 86, p. 332
- Nioață (Chireac), Roxana-Mihaela;
- Filip, Robert Dorin;
- Lupu (Filip), Gabriela Ana-Maria;
- Mărgăritescu, Ștefan
- Article
2
- Strategic Finance, 2025, p. 1
- Janvrin, Diane;
- Heeren, Grace;
- Pedersen, Jacob;
- Vegiraju, Vrindha
- Article
3
- i-Manager's Journal on Information Technology, 2025, v. 14, n. 1, p. 44, doi. 10.26634/jit.14.1.21663
- BALACHANDRAN S.;
- JAYAKUMAR, C.
- Article
4
- International Journal of Interactive Mobile Technologies, 2025, v. 19, n. 11, p. 227, doi. 10.3991/ijim.v19i11.54519
- Domb, Menachem;
- Balaji C. G.;
- Menaka S.;
- Gayathri A.;
- Joshi, Sujata
- Article
5
- Information (2078-2489), 2025, v. 16, n. 5, p. 404, doi. 10.3390/info16050404
- Article
6
- Decision Analysis, 2023, v. 20, n. 2, p. 166, doi. 10.1287/deca.2023.0467
- Hwang, Iny;
- Kim, Youngsoo;
- Lim, Michael K.
- Article
7
- Government Technology, 2025, v. 38, n. 1, p. 7
- RAY, SCOTTIE;
- CAIMI, STEVE
- Article
8
- Government Technology, 2022, v. 35, n. 3, p. 7
- Article
9
- Government Technology, 2021, v. 34, n. 4, p. 50
- Article
10
- Government Technology, 2021, v. 34, n. 2, p. 38
- Article
11
- Bioinformatics, 2016, v. 32, n. 17, p. i605, doi. 10.1093/bioinformatics/btw424
- Wenbao Yu;
- Seungyeoun Lee;
- Taesung Park
- Article
12
- Journal of Cybersecurity & Privacy, 2025, v. 5, n. 1, p. 2, doi. 10.3390/jcp5010002
- Dakić, Vedran;
- Morić, Zlatan;
- Kapulica, Ana;
- Regvart, Damir
- Article
13
- i-Manager's Journal on Image Processing, 2020, v. 7, n. 4, p. 10, doi. 10.26634/jip.7.4.17819
- YERRAMSETTI, MEGHANA;
- GHOSH, SIDDHARTHA;
- YADAV, ARPIT
- Article
14
- Bioengineering (Basel), 2023, v. 10, n. 7, p. 839, doi. 10.3390/bioengineering10070839
- Article
15
- Cogent Engineering, 2020, v. 7, n. 1, p. 1, doi. 10.1080/23311916.2020.1724597
- Yenlik, Begimbayeva;
- Оlga, Ussatova;
- Rustem, Biyashev;
- Saule, Nyssanbayeva;
- Pham, Duc
- Article
16
- Journal of Network & Information Security, 2023, v. 11, n. 1, p. 20
- Article
17
- Journal of Applied Information Science, 2024, v. 12, n. 2, p. 44
- Article
18
- Journal of Applied Information Science, 2022, v. 10, n. 1, p. 44
- Amudhavalli, P.;
- Rajesh, Sudha;
- J. N., Naseeruddin
- Article
19
- International Journal of System & Software Engineering, 2017, v. 5, n. 1, p. 11
- Shaji, Neenu Ann;
- Soman, Sumitha
- Article
20
- Ingénierie des Systèmes d'Information, 2023, v. 28, n. 6, p. 1467, doi. 10.18280/isi.280604
- Gadde, Swetha;
- Rao, Gutta Srinivasa;
- Veesam, Venkata Srinivasu;
- Yarlagadda, Madhulika;
- Patibandla, R. S. M. Lakshmi
- Article
21
- Applied Nanoscience, 2023, v. 13, n. 2, p. 1655, doi. 10.1007/s13204-021-02021-0
- Subbarao, D.;
- Raju, Bhagya;
- Anjum, Farha;
- Rao, Ch venkateswara;
- Reddy, B. Mahender
- Article
22
- Journal of Medical Internet Research, 2023, v. 25, n. 1, p. 1, doi. 10.2196/44114
- Suleski, Tance;
- Ahmed, Mohiuddin
- Article
23
- International Journal of Network Management, 2017, v. 27, n. 3, p. n/a, doi. 10.1002/nem.1937
- Jiang, Qi;
- Kumar, Neeraj;
- Ma, Jianfeng;
- Shen, Jian;
- He, Debiao;
- Chilamkurti, Naveen
- Article
24
- IUP Journal of Telecommunications, 2019, v. 11, n. 3, p. 26
- Bokade, Gayatri U.;
- Kanphade, Rajendra D.
- Article
25
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/8543894
- Chen, Chien-Ming;
- Liu, Shuangshuang;
- Li, Xuanang;
- Kumari, Saru;
- Li, Long
- Article
26
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/9896689
- Fang, Letian;
- Wu, Chunshang;
- Kang, Yukun;
- Ou, Wei;
- Zhou, Donghao;
- Ye, Jun
- Article
27
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/3658402
- Guo, Zhenyang;
- Zhang, Yueyu;
- Cao, Jin;
- Ren, Xiongpeng;
- Zhao, Xingwen;
- Li, Hui
- Article
28
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/7540891
- kaur, Sandeep;
- kaur, Gaganpreet;
- Shabaz, Mohammad
- Article
29
- Information (2078-2489), 2023, v. 14, n. 7, p. 386, doi. 10.3390/info14070386
- Papaspirou, Vassilis;
- Papathanasaki, Maria;
- Maglaras, Leandros;
- Kantzavelou, Ioanna;
- Douligeris, Christos;
- Ferrag, Mohamed Amine;
- Janicke, Helge
- Article
30
- Information (2078-2489), 2020, v. 11, n. 6, p. 308, doi. 10.3390/info11060308
- Singh, Bhanu;
- Singh, Nirvisha
- Article
31
- Military Technical Courier / Vojnotehnicki Glasnik, 2024, v. 72, n. 1, p. 170, doi. 10.5937/vojtehg72-48081
- Tomić, Mihailo D.;
- Radojević, Olivera M.
- Article
32
- International Journal of Computing & ICT Research, 2017, v. 11, n. 1, p. 84
- Abikoye, Oluwakemi C.;
- Sanni, Bilikis T.
- Article
33
- Neural Computing & Applications, 2023, v. 35, n. 7, p. 5055, doi. 10.1007/s00521-021-06152-x
- Gupta, B. B.;
- Prajapati, Varun;
- Nedjah, Nadia;
- Vijayakumar, P.;
- El-Latif, Ahmed A. Abd;
- Chang, Xiaojun
- Article
34
- Public Services Quarterly, 2025, v. 21, n. 2, p. 133, doi. 10.1080/15228959.2025.2477481
- Article
35
- Reviews in Aquaculture, 2022, v. 14, n. 4, p. 2023, doi. 10.1111/raq.12686
- Han, Cui;
- Li, Li;
- Dong, Xuan;
- Gao, Qinfeng;
- Dong, Shuanglin
- Article
36
- Peer-to-Peer Networking & Applications, 2023, v. 16, n. 4, p. 1975, doi. 10.1007/s12083-023-01509-6
- Kumar Chaudhary, Ravi Raushan;
- Chatterjee, Kakali
- Article
37
- Peer-to-Peer Networking & Applications, 2023, v. 16, n. 1, p. 260, doi. 10.1007/s12083-022-01391-8
- Tyagi, Gaurav;
- Kumar, Rahul
- Article
38
- Peer-to-Peer Networking & Applications, 2023, v. 16, n. 1, p. 245, doi. 10.1007/s12083-022-01386-5
- Liu, Xin;
- Wang, Miao;
- Wang, Tanyang;
- Zhang, Ruisheng
- Article
39
- Peer-to-Peer Networking & Applications, 2022, v. 15, n. 1, p. 516, doi. 10.1007/s12083-021-01260-w
- Chen, Yulei;
- Chen, Jianhua
- Article
40
- Peer-to-Peer Networking & Applications, 2018, v. 11, n. 1, p. 63, doi. 10.1007/s12083-016-0499-3
- Han, Lidong;
- Tan, Xiao;
- Wang, Shengbao;
- Liang, Xikun
- Article
41
- Peer-to-Peer Networking & Applications, 2018, v. 11, n. 1, p. 1, doi. 10.1007/s12083-016-0485-9
- Wu, Fan;
- Xu, Lili;
- Kumari, Saru;
- Li, Xiong
- Article
42
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 2, p. 368, doi. 10.1007/s12083-016-0443-6
- Fan, Kai;
- Ge, Nan;
- Gong, Yuanyuan;
- Li, Hui;
- Su, Ruidan;
- Yang, Yintang
- Article
43
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 1, p. 16, doi. 10.1007/s12083-015-0404-5
- Wu, Fan;
- Xu, Lili;
- Kumari, Saru;
- Li, Xiong
- Article
44
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 1, p. 253, doi. 10.1007/s12083-015-0423-2
- Article
45
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 6, p. 1070, doi. 10.1007/s12083-014-0285-z
- Jiang, Qi;
- Ma, Jianfeng;
- Lu, Xiang;
- Tian, Youliang
- Article
46
- Jurimetrics: The Journal of Law, Science & Technology, 2023, v. 63, n. 3, p. 263
- Reitinger, Nathan;
- Deshpande, Amol
- Article
47
- Australasian Journal of Information Systems, 2018, v. 22, p. 1
- Palekar, Shailesh;
- Sedera, Darshana
- Article
48
- Bench & Bar of Minnesota, 2024, v. 81, n. 5, p. 8
- Article
49
- Bench & Bar of Minnesota, 2023, v. 80, n. 9, p. 10
- Article
50
- Information -- Wissenschaft und Praxis, 2022, v. 73, n. 2/3, p. 138, doi. 10.1515/iwp-2022-2216
- Article