Auswahl der wissenschaftlichen Literatur zum Thema „Identification and Authentication Techniques“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Identification and Authentication Techniques" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Identification and Authentication Techniques"
Warda Hassan und Nosheen Sabahat. „Towards Secure Identification: A Comparative Analysis of Biometric Authentication Techniques“. VFAST Transactions on Software Engineering 12, Nr. 1 (31.03.2024): 105–20. http://dx.doi.org/10.21015/vtse.v12i1.1745.
Der volle Inhalt der QuelleDara, Suresh, Sri Kavya, A. Naga Varalakshmi Devi, B. Krishna Priya, R. Indira Priyadarsini und I, Triveni. „An Improved Quality Enhancement Fingerprint Analysis“. International Journal of Innovative Research in Computer Science and Technology 11, Nr. 3 (Mai 2023): 110–13. http://dx.doi.org/10.55524/ijircst.2023.11.3.22.
Der volle Inhalt der QuelleSureshbabu, P., und M. Sakthivadivu. „A Review on Biometrics Authentication System Using Fingerprint“. Asian Journal of Computer Science and Technology 8, S1 (05.02.2019): 4–6. http://dx.doi.org/10.51983/ajcst-2019.8.s1.2016.
Der volle Inhalt der QuelleB S, Shruthi, und Manasa K B. „USER AUTHENTICATION USING EYE-BLINK PASSWORD“. International Journal of Computer Science and Mobile Computing 12, Nr. 4 (30.04.2023): 42–46. http://dx.doi.org/10.47760/ijcsmc.2023.v12i04.004.
Der volle Inhalt der QuelleJoshi, V. C., und I. A. Khan. „MICROSCOPY TECHNIQUES FOR THE IDENTIFICATION AND AUTHENTICATION OF BOTANICALS“. Acta Horticulturae, Nr. 720 (Oktober 2006): 73–80. http://dx.doi.org/10.17660/actahortic.2006.720.7.
Der volle Inhalt der QuelleDan, Man Kan, und Dr T. Meyappan. „WATERMARKING TECHNIQUES“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, Nr. 3 (30.06.2012): 122–24. http://dx.doi.org/10.24297/ijct.v2i3c.2709.
Der volle Inhalt der QuelleDivya, C. D., und Dr A. B. Rajendra. „An investigation of IRIS Recognition Techniques: A Literature Survey“. Applied and Computational Engineering 2, Nr. 1 (22.03.2023): 663–69. http://dx.doi.org/10.54254/2755-2721/2/20220642.
Der volle Inhalt der QuelleYaseen Khudhur, Doaa, Belal Al-Khateeb und Hadeel Amjed Saeed. „Secure login technique for online banking“. International Journal of Engineering & Technology 7, Nr. 4 (03.04.2019): 5434–37. http://dx.doi.org/10.14419/ijet.v7i4.23802.
Der volle Inhalt der QuelleSingh, Preet Amol, Neha Bajwa, Subh Naman und Ashish Baldi. „A Review on Robust Computational Approaches Based Identification and Authentication of Herbal Raw Drugs“. Letters in Drug Design & Discovery 17, Nr. 9 (11.09.2020): 1066–83. http://dx.doi.org/10.2174/1570180817666200304125520.
Der volle Inhalt der QuelleGupta, Myra. „Biometric Authentication using Gait Recognition“. Universal Research Reports 10, Nr. 4 (2023): 1–9. http://dx.doi.org/10.36676/urr.2023-v10i4-001.
Der volle Inhalt der QuelleDissertationen zum Thema "Identification and Authentication Techniques"
Bhamra, Sukvinder. „Investigating the use and identity of traditional herbal remedies amongst South Asian communities using surveys and biomolecular techniques“. Thesis, De Montfort University, 2016. http://hdl.handle.net/2086/12392.
Der volle Inhalt der QuelleBrandão, Luís T. A. N. „The Forge-and-Lose Technique and Other Contributions to Secure Two-Party Computation with Commitments“. Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/1001.
Der volle Inhalt der QuelleGe, He. „Flexible Digital Authentication Techniques“. Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5277/.
Der volle Inhalt der QuelleNastasiu, Dragos-Florin. „Développement de solutions pour l’identification (THID) et l’authentification par des approches non intrusives dans le domaine THz“. Electronic Thesis or Diss., Chambéry, 2024. http://www.theses.fr/2024CHAMA007.
Der volle Inhalt der QuelleTHz imaging is an emerging field since the technological advances in terms of THz radiation emission and detection equipment. The main objective of the thesis is to contribute and to improve THz imaging systems, from image reconstruction and analysis to image classification tasks. In the first part of the thesis, we tackle the amplitude estimation challenge under ideal and multiplicative noise conditions. The multiplicative noise deforms the phase and introduces complex artefacts, such as contour information loss and contrast degradation, that cannot be eliminated using state-of-the-art image reconstruction techniques. In this regard, we introduce five novel reconstruction methods which exploit the phase diagram representation of signals. Two of the methods are based on phase-diagram match filtering to estimate the amplitude in both conditions. Another two methods use the concept of dynamic time warping (DTW) to increase the capability to model the multiplicative type of noise. Lastly, we exploit the dynamic of the phase trajectory described by the curvatures to reconstruct the image. From the large pool of methods, we evaluate throughout the thesis that the curvature-based method efficiently reconstructs the image in both ideal and noisy contexts. After an efficient image reconstruction, the second part of the thesis, we study image analysis and classification methods considering the instabilities of real-world imaging systems, such as translations and rotations. In this sense, we propose to use translation and rotation invariant wavelet packet decompositions, that provide a unique and optimal representation of an image, regardless if the image is translated or rotated. Based on the invariant image representations, novel feature extraction techniques are introduced such as vertical, horizontal, N-directional and N-zonal frameworks. Additionally, two feature structures are introduced and that consider the frequency partitioning of the wavelet decomposition and are adapted to work with Graph Neural Networks (GNNs) and classic ML classifiers such as k-nearest neighbors (k-NN), support vector machine (SVM), etc. Overall, our proposed approaches increase the accuracy of all classifiers
Wong, Chin Man. „Personal identification/authentication by using hand geometry /“. View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20WONG.
Der volle Inhalt der QuelleIncludes bibliographical references (leaves 104-109). Also available in electronic version. Access restricted to campus users.
Jiang, Feng. „Efficient Public-Key Watermark Techniques for Authentication“. Thesis, Purdue University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10618833.
Der volle Inhalt der QuelleThe security of digital media content has received significant attention as the usage of multimediahas increased in today's society. Digital watermarking is widely applied for digital image copyright protection and authentication. The extraction and verification of the watermark can be used for many applications, for example, authenticating the image. In some situations, the authentication should be accessible to all, thus public-key watermarking would be necessary.
In addition, many essential image-embedded documents are kept in a physical format and used widely for authentication purposes. These documents include the personal ID, license, passport, immigration document, commercial ticket with identity information, personal medical report, etc.
A digital watermarking system with high embedding capacity, robust to various attacks, high extraction efficiency is needed for such practical use. A public-key watermarking system is proposed for such applications. The embedded watermark/message can be extracted and verified publicly using a public-key. The watermark extraction process is efficient and blind. The watermark can be only embedded by the document issuer. The watermark embedded is robust against not only common digital signal processing attacks, geometric attacks but also the print-scan process. Differing from existing watermarking approaches, the watermark is embedded according to the result of proposed object weight map detection and automatic object segmentation. Higher watermark robustness and embedding capacity are achieved. Our simulation results demonstrate that the proposed approach is effective and is able to be applied to various applications.
Balisane, Hewa. „Human gait analysis for biometric identification and authentication“. Thesis, Manchester Metropolitan University, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.539385.
Der volle Inhalt der QuelleJiang, Weina. „Multi-level image authentication techniques in printing-and-scanning“. Thesis, University of Surrey, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.576163.
Der volle Inhalt der QuelleParker, William A. „Evaluation of data processing techniques for unobtrusive gait authentication“. Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/41429.
Der volle Inhalt der QuelleThe growth in smartphone usage has led to increased storage of sensitive data on these easily lost or stolen devices. In order to mitigate the effects of users who ignore, disable, or circumvent authentication measures like passwords, we evaluate a method employing gait as a source of identifying information. This research is based on previously reported methods with a goal of evaluating gait signal processing and classification techniques. This thesis evaluates the performance of four signal normalization techniques (raw signal, zero-scaled, gravity-rotated, and gravity rotated with zero-scaling). Additionally, we evaluate the effect of carrying position on classification. Data was captured from 23 subjects carrying the device in the front pocket, back pocket, and on the hip. Unlike previous research, we analyzed classifier performance on data collected from multiple positions and tested on each individual location, which would be necessary in a robust, deployable system. Our results indicate that restricting device position can achieve the best overall performance using zero-scaling with 6.13% total error rate (TER) on the XY-axis but with a high variance across different axes. Using data from all positions with gravity rotation can achieve 12.6% TER with a low statistical variance.
Bhide, Priyanka. „Design and Evaluation of Aceelerometer Based Mobile Authentication Techniques“. Thesis, Linköpings universitet, Datorteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-133968.
Der volle Inhalt der QuelleBücher zum Thema "Identification and Authentication Techniques"
Zhang, David D. Palmprint authentication. Norwell, Mass: Kluwer Academic Publishers, 2004.
Den vollen Inhalt der Quelle finden(Firm), Knovel, Hrsg. Modern techniques for food authentication. Amsterdam: Elsevier/Academic Press, 2008.
Den vollen Inhalt der Quelle findenW, Mak M., und Lin Shang-Hung 1968-, Hrsg. Biometric authentication: A machine learning approach. Upper Saddle River, N.J: Prentice Hall Professional Technical Reference, 2005.
Den vollen Inhalt der Quelle findenBorivoje, Furht, und Kirovski Darko, Hrsg. Multimedia encryption and authentication techniques and applications. Boca Raton, Fla: Auerbach Publications, 2006.
Den vollen Inhalt der Quelle findenZviran, Moshe. A comparison of password techniques for multilevel authentication mechanisms. Monterey, Calif: Naval Postgraduate School, 1990.
Den vollen Inhalt der Quelle finden1953-, Budowle Bruce, Hrsg. Protein staining and identification techniques. [Natick, MA]: BioTechniques Books, 1999.
Den vollen Inhalt der Quelle findenNational Computer Security Center (U.S.), Hrsg. A Guide to understanding identification and authentication in trusted systems. [Ft. George G. Meade, MD]: National Computer Security Center, 1991.
Den vollen Inhalt der Quelle findenSchuckers, Michael E. Computational methods in biometric authentication: Statistical methods for performance evaluation. London: Springer, 2010.
Den vollen Inhalt der Quelle findenECCV 2004 International Workshop (2004 Prague, Czech Republic). Biometric authentication: ECCV 2004 International Workshop, BioAW 2004, Prague, Czech Republic, May 15th, 2004 : proceedings. Berlin: Springer, 2004.
Den vollen Inhalt der Quelle findenPhēsatchasāt, Mahāwitthayālai Mahidon Khana, Hrsg. A Guide to the identification and authentication of some Thai medicinal plants. Bangkok, Thailand: Faculty of Pharmacy, Mahidol University, 1986.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Identification and Authentication Techniques"
Lehtonen, Mikko, Thorsten Staake und Florian Michahelles. „From Identification to Authentication – A Review of RFID Product Authentication Techniques“. In Networked RFID Systems and Lightweight Cryptography, 169–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-71641-9_9.
Der volle Inhalt der QuelleSpenger, Gabriele. „Authentication, Identification Techniques, and Secure Containers – Baseline Technologies“. In Lecture Notes in Computer Science, 62–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/10941270_5.
Der volle Inhalt der QuelleOrun, A. B. „Metrological remote identification of a human body by stereoscopic camera techniques“. In Audio- and Video-based Biometric Person Authentication, 119–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0015987.
Der volle Inhalt der QuelleFu, Zhonghua, und Rongchun Zhao. „Speaker Modeling Technique Based on Regression Class for Speaker Identification with Sparse Training“. In Advances in Biometric Person Authentication, 610–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30548-4_70.
Der volle Inhalt der QuelleHsieh, Yun-Hwa Peggy, und Jack Appiah Ofori. „Immunological Techniques“. In Food Authentication, 355–75. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781118810224.ch10.
Der volle Inhalt der QuellePrice, T. Douglas, und James H. Burton. „Identification and Authentication“. In An Introduction to Archaeological Chemistry, 127–54. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-6376-5_5.
Der volle Inhalt der QuelleSchneier, Bruce. „Identification and Authentication“. In Secrets and Lies, 135–50. Indianapolis, Indiana: Wiley Publishing, Inc., 2015. http://dx.doi.org/10.1002/9781119183631.ch9.
Der volle Inhalt der QuelleSandhu, Ravi, Jennifer Hadley, Steven Lovaas und Nicholas Takacs. „Identification and Authentication“. In Computer Security Handbook, 28.1–28.21. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch28.
Der volle Inhalt der QuelleWu, Xiangqian, Kuanquan Wang und David Zhang. „HMMs Based Palmprint Identification“. In Biometric Authentication, 775–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_105.
Der volle Inhalt der QuelleYu, Kun, Yunhong Wang und Tieniu Tan. „Writer Identification Using Dynamic Features“. In Biometric Authentication, 512–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_70.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Identification and Authentication Techniques"
Elbendary, Tarek A., Hossam El-Din Moustafa und Shaimaa Ahmed Elsaid. „Palmprint Authentication Techniques: A Comparative Study“. In 2024 International Telecommunications Conference (ITC-Egypt), 386–93. IEEE, 2024. http://dx.doi.org/10.1109/itc-egypt61547.2024.10620503.
Der volle Inhalt der QuelleSathiaseelan, Mukhil Azhagan Mallaiyan, Olivia P. Paradis, Rajat Rai, Suryaprakash Vasudev Pandurangi, Manoj Yasaswi Vutukuru, Shayan Taheri und Navid Asadizanjani. „Logo Classification and Data Augmentation Techniques for PCB Assurance and Counterfeit Detection“. In ISTFA 2021. ASM International, 2021. http://dx.doi.org/10.31399/asm.cp.istfa2021p0012.
Der volle Inhalt der QuelleNokovic, Bojan. „Authentication Technique based on Image Recognition: Example of Quantitative Evaluation by Probabilistic Model Checker“. In 8th International Conference on Software Engineering. Academy & Industry Research Collaboration, 2023. http://dx.doi.org/10.5121/csit.2023.131206.
Der volle Inhalt der QuelleTherese, S. Shanthi, und Chelpa Lingam. „Speaker Identification and Authentication System using Energy based Cepstral Data Technique“. In the Second International Conference. New York, New York, USA: ACM Press, 2016. http://dx.doi.org/10.1145/2905055.2905139.
Der volle Inhalt der QuelleR. S, Bala Kumar, und Sujitha R. „Efficient Privacy-Preserving Biometric Identification in Cloud Computing“. In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/ieko8866/ngcesi23p5.
Der volle Inhalt der QuelleLopes, Kelvin S., Davi O. Lopes, Wesley G. P. Pavanello, César L. C. Mattos, Jarelio G. da S. Filho, José D. C. Neto, Rafael L. Gomes, Nicksson C. A. de Freitas und Emanuel B. Rodrigues. „Behavioral Biometrics for Continuous Authentication on Mobile Devices: Anomaly Detection through Keystroke Dynamics with Machine Learning“. In Encontro Nacional de Inteligência Artificial e Computacional. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/eniac.2023.234623.
Der volle Inhalt der QuelleGhoshal, Dibyendu. „A proposed technique of online face authentication to be used for the user identification“. In 2012 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2012. http://dx.doi.org/10.1109/iccci.2012.6158786.
Der volle Inhalt der QuelleM, Anand, und Anuja S. B. „Load Distribution in Software Defined Networks for Enabling Big Data Tasks Scheduling“. In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/jppl8547/ngcesi23p34.
Der volle Inhalt der QuelleKhandre, Abhijeet Anil, und Sudhir Shikalpure. „WAAM Web & Android Authentication Model using Improvised User Identification and Verification Technique using Biometric and Digital Certificate“. In 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 2018. http://dx.doi.org/10.1109/i-smac.2018.8653703.
Der volle Inhalt der QuelleMarcillo, Pablo, Ángel Leonardo Valdivieso Caraguay und Myriam Hernandez-Alvarez. „Security in Vehicle-to-Infrastructure Communications“. In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002210.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Identification and Authentication Techniques"
SECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Identification and Authentication. Fort Belvoir, VA: Defense Technical Information Center, Juni 1998. http://dx.doi.org/10.21236/ada404983.
Der volle Inhalt der QuelleFridrich, Jessica. Secure Oblivious Hiding, Authentication, Tamper Proofing, and Verification Techniques. Fort Belvoir, VA: Defense Technical Information Center, August 2002. http://dx.doi.org/10.21236/ada408266.
Der volle Inhalt der QuelleKalman, Rudolf E. Mathematical Techniques for System Realization and Identification. Fort Belvoir, VA: Defense Technical Information Center, Juni 1988. http://dx.doi.org/10.21236/ada207927.
Der volle Inhalt der QuelleKalman, R. E. Mathematical Techniques for System Realization and Identification. Fort Belvoir, VA: Defense Technical Information Center, Juni 1989. http://dx.doi.org/10.21236/ada212088.
Der volle Inhalt der QuelleKalman, R. E. Mathematical Techniques for System Realization and Identification. Fort Belvoir, VA: Defense Technical Information Center, Februar 1986. http://dx.doi.org/10.21236/ada174487.
Der volle Inhalt der QuelleGoodman, D. M. Deconvolution/identification techniques for 1-D transient signals. Office of Scientific and Technical Information (OSTI), Oktober 1990. http://dx.doi.org/10.2172/6350478.
Der volle Inhalt der QuelleCard, S., und R. Moskowitz. DRIP Entity Tag (DET) Authentication Formats and Protocols for Broadcast Remote Identification (RID). Herausgegeben von A. Wiethuechter. RFC Editor, Juni 2024. http://dx.doi.org/10.17487/rfc9575.
Der volle Inhalt der QuelleKlyde, David, Chuck Harris, Peter M. Thompson und Edward N. Bachelder. System Identification Methods for Improving Flutter Flight Test Techniques. Fort Belvoir, VA: Defense Technical Information Center, August 2004. http://dx.doi.org/10.21236/ada426452.
Der volle Inhalt der QuelleSteele, L. L., J. R. Grant, Harrold Jr., Erhart D. P., Anex J. J. und R. P. Application of System Identification Techniques to Combustor Poststall Dynamics. Fort Belvoir, VA: Defense Technical Information Center, September 1987. http://dx.doi.org/10.21236/ada187898.
Der volle Inhalt der QuellePierre, John W., Richard Wies und Daniel Trudnowski. Advanced Techniques for Power System Identification from Measured Data. Office of Scientific and Technical Information (OSTI), November 2008. http://dx.doi.org/10.2172/943294.
Der volle Inhalt der Quelle