Works matching Electronic authentication
Results: 329
Robust Intra-Body Communication Using SHA1-CRC Inversion-Based Protection and Error Correction for Securing Electronic Authentication.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 21, p. 6056, doi. 10.3390/s20216056
- By:
- Publication type:
- Article
Security, usability, and biometric authentication scheme for electronic voting using multiple keys.
- Published in:
- International Journal of Distributed Sensor Networks, 2020, v. 16, n. 7, p. 1, doi. 10.1177/1550147720944025
- By:
- Publication type:
- Article
Authentication of Electronic Evidence; A Journey from Electronic Discovery to Digital Forensic Experts in Western Law-Recommendations for Pakistan.
- Published in:
- Journal of Social Sciences & Humanities (1994-7046), 2020, v. 28, n. 1, p. 209
- By:
- Publication type:
- Article
BIOMETRIC BASED THREE-FACTOR MUTUAL AUTHENTICATION SCHEME FOR ELECTRONIC PAYMENT SYSTEM USING ELLIPTIC CURVE CRYPTOGRAPHY.
- Published in:
- Malaysian Journal of Computer Science, 2020, p. 39
- By:
- Publication type:
- Article
Electronic User Authentication Key for Access to HMI/SCADA via Unsecured Internet Networks.
- Published in:
- Computational Intelligence & Neuroscience, 2022, p. 1, doi. 10.1155/2022/5866922
- By:
- Publication type:
- Article
Simulation of Authentication in Information-Processing Electronic Devices Based on Poisson Pulse Sequence Generators.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 13, p. N.PAG, doi. 10.3390/electronics11132039
- By:
- Publication type:
- Article
Design and develop authentication in electronic payment systems based on IoT and biometric.
- Published in:
- Telkomnika, 2022, v. 20, n. 6, p. 1297, doi. 10.12928/TELKOMNIKA.v20i6.22157
- By:
- Publication type:
- Article
COVID‐19 as an opportunity window for policy change; insights from electronic authentication case study in Iran.
- Published in:
- Review of Policy Research, 2024, v. 41, n. 3, p. 471, doi. 10.1111/ropr.12537
- By:
- Publication type:
- Article
An improved user authentication scheme for electronic medical record systems.
- Published in:
- Multimedia Tools & Applications, 2020, v. 79, n. 29/30, p. 22007, doi. 10.1007/s11042-020-08983-7
- By:
- Publication type:
- Article
An Electronic and Web-Based Authentication, Identification, and Logging Management System.
- Published in:
- Journal of Engineering (17264073), 2024, v. 30, n. 1, p. 1, doi. 10.31026/j.eng.2024.01.01
- By:
- Publication type:
- Article
Device Identity-Based User Authentication on Electronic Payment System for Secure E-Wallet Apps.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 1, p. 4, doi. 10.3390/electronics11010004
- By:
- Publication type:
- Article
A Blockchain Based Decentralized Identifiers for Entity Authentication in Electronic Health Records.
- Published in:
- Cogent Engineering, 2022, v. 9, n. 1, p. 1, doi. 10.1080/23311916.2022.2035134
- By:
- Publication type:
- Article
Secure Electronic Healthcare Record Using Robust Authentication Scheme.
- Published in:
- IAENG International Journal of Computer Science, 2023, v. 50, n. 2, p. 468
- By:
- Publication type:
- Article
التوثيق اإللترووي لعـقـود التجارة اإللتروونية.
- Published in:
- Journal of Economic Administrative & Legal Sciences, 2021, v. 5, n. 10, p. 19, doi. 10.26389/AJSRP.D171020
- By:
- Publication type:
- Article
The Balance Point - Authentication Issues and Updates.
- Published in:
- Serials Review, 2020, v. 46, n. 1, p. 37, doi. 10.1080/00987913.2020.1720896
- By:
- Publication type:
- Article
The company contract, from ordinary writing to electronic writing (A study in comparative Algerian law).
- Published in:
- Journal of Law (1985-8000), 2021, v. 18, n. 1, p. 214
- By:
- Publication type:
- Article
A Bibliometric Study of Scientific Production on Self-Sovereign Identity.
- Published in:
- Ingeniería (0121-750X), 2023, v. 28, p. 1, doi. 10.14483/23448393.19656
- By:
- Publication type:
- Article
VERIFICATION OF ELECTRONIC IDENTITY IN FEDERATED SYSTEMS USING MULTI-FACTOR AUTHENTICATION.
- Published in:
- Journal of Applied Sciences - SUT (JAS-SUT), 2022, v. 8, n. 15/16, p. 241
- By:
- Publication type:
- Article
Achieving Payoffs from an Industry Cloud Ecosystem at BankID.
- Published in:
- MIS Quarterly Executive, 2014, v. 13, n. 4, p. 223
- By:
- Publication type:
- Article
Hiding patient information in medical images : an encrypted dual image reversible and secure patient data hiding algorithm for E-healthcare.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 1, p. 1125, doi. 10.1007/s11042-021-11445-3
- By:
- Publication type:
- Article
An efficient reversible and secure patient data hiding algorithm for E-healthcare.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 21-23, p. 31687, doi. 10.1007/s11042-021-10892-2
- By:
- Publication type:
- Article
Authentication of Electronic Records: Limitations of Indian Legal Approach.
- Published in:
- Journal of International Commercial Law & Technology, 2012, v. 7, n. 3, p. 223
- By:
- Publication type:
- Article
Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. Triangle.
- Published in:
- Journal of Medical Systems, 2016, v. 40, n. 4, p. 1, doi. 10.1007/s10916-016-0465-x
- By:
- Publication type:
- Article
An Enhanced Computational Fusion Technique for Security of Authentication of Electronic Voting System.
- Published in:
- International Journal of Smart Security Technologies (IJSST), 2020, v. 7, n. 2, p. 1, doi. 10.4018/IJSST.2020070102
- By:
- Publication type:
- Article
MUTUAL RECOGNITION OF ELECTRONIC IDENTIFICATION MEANS UNDER THE EIDAS REGULATION AND ITS APPLICATION ISSUES.
- Published in:
- Ad Alta: Journal of Interdisciplinary Research, 2017, v. 7, n. 2, p. 9
- By:
- Publication type:
- Article
基于SecOC的车载网络通信安全模型研究.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2022, v. 39, n. 8, p. 2474, doi. 10.19734/j.issn.1001-3695.2021.12.0703
- By:
- Publication type:
- Article
Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 16, p. 5951, doi. 10.3390/s22165951
- By:
- Publication type:
- Article
Blind multi-signature scheme based on factoring and discrete logarithm problem.
- Published in:
- Telkomnika, 2019, v. 17, n. 5, p. 2327, doi. 10.12928/TELKOMNIKA.v17i5.10525
- By:
- Publication type:
- Article
Okoseszközök mint a személyi hitelesítésre alkalmas interface-technológia biztonsági vetületei.
- Published in:
- Military Engineer / Hadmérnök, 2023, v. 18, n. 1, p. 109, doi. 10.32567/hm.2023.1.8
- By:
- Publication type:
- Article
Electronic access to doctoral dissertations in Hungary.
- Published in:
- Library Review / Konyvtari Figyelo, 2015, v. 25, n. 2, p. 154
- By:
- Publication type:
- Article
Privacy protection and authentication of electronic patient information using hashing and multi watermarking technique.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 42, p. 89893, doi. 10.1007/s11042-024-18960-z
- By:
- Publication type:
- Article
There Will Always Be Forgeries: Situating Forgery Culture in the Chinese Antiques Market.
- Published in:
- Journal of Social Sciences & Philosophy, 2019, v. 31, n. 2, p. 187
- By:
- Publication type:
- Article
A Novel and Efficient Multilayered Approach to CAPTCHA: Design, Performance and Usability Evaluation.
- Published in:
- International Journal of Computer Information Systems & Industrial Management Applications, 2023, v. 15, p. 438
- By:
- Publication type:
- Article
An Overview of Voice Authentication.
- Published in:
- ISSA Journal, 2020, v. 18, n. 3, p. 23
- By:
- Publication type:
- Article
Dynamic ID-based remote user authentication scheme using ElGamal encryption system.
- Published in:
- Nova Scientia, 2016, v. 8, n. 17, p. 263, doi. 10.21640/ns.v8i17.673
- By:
- Publication type:
- Article
An Effective Authentication Scheme Using DCT for Mobile Devices.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 1, p. 13, doi. 10.3390/sym10010013
- By:
- Publication type:
- Article
The Uniform Electronic Legal Material Act Comes to Idaho.
- Published in:
- Advocate (05154987), 2015, v. 58, n. 1, p. 48
- By:
- Publication type:
- Article
A Study on Designing Video Tutorials for Promoting Security Features: A Case Study in the Context of Two-Factor Authentication (2FA).
- Published in:
- International Journal of Human-Computer Interaction, 2017, v. 33, n. 11, p. 927, doi. 10.1080/10447318.2017.1306765
- By:
- Publication type:
- Article
ELECTRONIC SIGNATURES AND LAWYERS: POTENTIAL NOT REACHED?
- Published in:
- Adelaide Law Review, 2023, v. 44, n. 2, p. 571
- By:
- Publication type:
- Article
IMPS 2018 Meeting of Members Minutes.
- Published in:
- Psychometrika, 2018, v. 83, n. 4, p. 1014, doi. 10.1007/s11336-018-9640-y
- Publication type:
- Article
Tripartite Cooperation in Assigning ETDs with DOIs - A Practical Experience of National Taiwan Normal University Library.
- Published in:
- Cadernos de Biblioteconomia, Arquivística e Documentação, 2019, n. 1, p. 114
- By:
- Publication type:
- Article
Analysis of Lard's Aroma by an Electronic Nose for Rapid Halal Authentication.
- Published in:
- Journal of the American Oil Chemists' Society (JAOCS), 2011, v. 88, n. 1, p. 75, doi. 10.1007/s11746-010-1655-1
- By:
- Publication type:
- Article
Security, privacy, and confidentiality in electronic prescribing systems: A review study.
- Published in:
- Frontiers in Health Informatics, 2022, v. 11, p. 1, doi. 10.30699/fhi.v11i1.374
- By:
- Publication type:
- Article
Hand geometry based user identification using minimal edge connected hand image graph.
- Published in:
- IET Computer Vision (Wiley-Blackwell), 2018, v. 12, n. 5, p. 744, doi. 10.1049/iet-cvi.2017.0053
- By:
- Publication type:
- Article
központosított felhasználó azonosítás jelene és jövője: biztonságos infrastruktúra vagy időzített bomba?
- Published in:
- Information Society / Információs Társadalom (InfTars), 2019, v. 19, n. 2, p. 52
- By:
- Publication type:
- Article
Verification in biometric systems: problems and modern methods of their solution.
- Published in:
- Journal of Applied Statistics, 2018, v. 45, n. 1, p. 43, doi. 10.1080/02664763.2016.1267122
- By:
- Publication type:
- Article
A Secure Cloud Password and Secure Authentication Protocol for Electronic NFC Payment Between ATM and Smartphone.
- Published in:
- Ingénierie des Systèmes d'Information, 2020, v. 25, n. 2, p. 139, doi. 10.18280/isi.250201
- By:
- Publication type:
- Article
CONSENT AS "FEELING-WITH": EVERYDAY AUTOMATION AND ONTOLOGIES OF CONSENT IN A COMMUNITY TECHNOLOGY CENTRE.
- Published in:
- Digital Culture & Education, 2023, v. 14, n. 5, p. 64
- By:
- Publication type:
- Article
Anonymous Proxy Signature with Hierarchical Traceability.
- Published in:
- Computer Journal, 2016, v. 59, n. 4, p. 559, doi. 10.1093/comjnl/bxv080
- By:
- Publication type:
- Article
Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity.
- Published in:
- Mobile Networks & Applications, 2019, v. 24, n. 3, p. 890, doi. 10.1007/s11036-018-1145-5
- By:
- Publication type:
- Article