Books on the topic 'Identification and Authentication Techniques'

To see the other types of publications on this topic, follow the link: Identification and Authentication Techniques.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Identification and Authentication Techniques.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Zhang, David D. Palmprint authentication. Norwell, Mass: Kluwer Academic Publishers, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

(Firm), Knovel, ed. Modern techniques for food authentication. Amsterdam: Elsevier/Academic Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

W, Mak M., and Lin Shang-Hung 1968-, eds. Biometric authentication: A machine learning approach. Upper Saddle River, N.J: Prentice Hall Professional Technical Reference, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Borivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Boca Raton, Fla: Auerbach Publications, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zviran, Moshe. A comparison of password techniques for multilevel authentication mechanisms. Monterey, Calif: Naval Postgraduate School, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1953-, Budowle Bruce, ed. Protein staining and identification techniques. [Natick, MA]: BioTechniques Books, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

National Computer Security Center (U.S.), ed. A Guide to understanding identification and authentication in trusted systems. [Ft. George G. Meade, MD]: National Computer Security Center, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schuckers, Michael E. Computational methods in biometric authentication: Statistical methods for performance evaluation. London: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

ECCV 2004 International Workshop (2004 Prague, Czech Republic). Biometric authentication: ECCV 2004 International Workshop, BioAW 2004, Prague, Czech Republic, May 15th, 2004 : proceedings. Berlin: Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Phēsatchasāt, Mahāwitthayālai Mahidon Khana, ed. A Guide to the identification and authentication of some Thai medicinal plants. Bangkok, Thailand: Faculty of Pharmacy, Mahidol University, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Alonso-Salces, M. Rosa. Authentication of virgin olive oil using NMR and isotopic fingerprinting. Hauppauge, N.Y: Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Xin-Qun, Zhu, ed. Moving loads: Dynamic analysis and identification techniques. London: CRC Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Kussmaul, Wes. The future needs you: Why and how paralegals and notaries (not technologists) will fix the Internet. 2nd ed. Waltham, Mass: PKI Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Kussmaul, Wes. The future needs you: The notary public in the digital age. Waltham, Mass: PKI Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Tallitsch, Robert B. Histology: An identification manual. Philadelphia, PA: Mosby / Elsevier, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Martin, Keith M. Entity Authentication. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0008.

Full text
Abstract:
This chapter considers mechanisms for providing entity authentication. We begin with a discussion on randomness and why it is important in cryptography. We compare several different techniques for generating randomness. We then consider the related issue of freshness and why it is important for entity authentication. We compare several different techniques for providing freshness. We then identify various different categories of identification information which can be used in an entity authentication mechanism. We look at the role cryptography plays in supporting basic entity authentication mechanisms such as passwords. We close by examining how cryptography can be used to provide more sophisticated forms of entity authentication through the use of dynamic passwords.
APA, Harvard, Vancouver, ISO, and other styles
17

Feng, Guocan, Tieniu Tan, Stan Z. Li, Yunhong Wang, and Jianhuang Lai. Advances in Biometric Person Authentication: 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004, Proceedings. Springer London, Limited, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Pankanti, Sharath, Tieniu Tan, Stan Z. Li, Gérard Chollet, and Zhenan Sun. Advances in Biometric Person Authentication: International Workshop on Biometric Recognition Systems, IWBRS 2005, Beijing, China, October 22 - 23, 2005, Proceedings. Springer London, Limited, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Modern Techniques for Food Authentication. Elsevier, 2018. http://dx.doi.org/10.1016/c2017-0-01345-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Modern Techniques for Food Authentication. Academic Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Sun, Da-Wen. Modern Techniques for Food Authentication. Elsevier Science & Technology Books, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

AuthTech'16: Authentication Techniques CANCELLED. Association for Computing Machinery, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Todorov, Dobromir. Mechanics of User Identification and Authentication. Auerbach Publications, 2007. http://dx.doi.org/10.1201/9781420052206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Mechanics of User Identification and Authentication. London: Taylor and Francis, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Lin, S. H., M. W. Mak, and S. Y. Kung. Biometric Authentication: A Machine Learning Approach. Pearson Education, Limited, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Analysis of Food Spices: Identification and Authentication. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Analysis of Food Spices: Identification and Authentication. CRC Press LLC, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Analysis of Food Spices: Identification and Authentication. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Analysis of Food Spices: Identification and Authentication. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Siddiqi, K. S., and Leo M. L. Nollet, eds. Fingerprinting Techniques in Food Authentication and Traceability. CRC Press, 2018. http://dx.doi.org/10.1201/b21931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Furht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Edited by Borko Furht and Darko Kirovski. Auerbach Publications, 2006. http://dx.doi.org/10.1201/9781420013450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Furht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Nollet, Leo M. L., and K. S. Siddiqi. Fingerprinting Techniques in Food Authentication and Traceability. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Nollet, Leo M. L., and K. S. Siddiqi. Fingerprinting Techniques in Food Authentication and Traceability. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Furht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Nollet, Leo M. L., and K. S. Siddiqi. Fingerprinting Techniques in Food Authentication and Traceability. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Furht, Borivoje, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Taylor & Francis Group, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Furht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Furht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Fingerprinting Techniques in Food Authentication and Traceability. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Fingerprinting Techniques in Food Authentication and Traceability. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Cichna-Markl, Margit, and Isabel Mafra, eds. Techniques for Food Authentication: Trends and Emerging Approaches. MDPI, 2023. http://dx.doi.org/10.3390/books978-3-0365-7655-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Anderson, James, and Rayford Vaughn. Guide to Understanding Identification and Authentication in Trusted Systems. Diane Pub Co, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Services, BPI Information. Guide to Understanding Identification and Authentication in Trusted Systems. Bpi Information Services, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Song, Ong Thian, Tee Connie, and Mohd Shohel Sayeed. Security and Authentication: Perspectives, Management and Challenges. Nova Science Publishers, Incorporated, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Nanda, Vikas, Jalal Uddin, and Gulzar Ahmad Nayik. Advanced Techniques of Honey Analysis: Characterization, Authentication, and Adulteration. Elsevier Science & Technology Books, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Advanced Techniques of Honey Analysis: Characterization, Authentication, and Adulteration. Elsevier Science & Technology, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

González-Domínguez, Raúl, ed. Food Authentication: Techniques, Trends and Emerging Approaches (Second Issue). MDPI, 2023. http://dx.doi.org/10.3390/books978-3-0365-8921-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Cozzolino, Daniel, ed. Advances of Spectrometric Techniques in Food Analysis and Authentication. MDPI, 2023. http://dx.doi.org/10.3390/books978-3-0365-6669-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Gupta, Phalguni, Dakshina Ranjan Kisku, and Jamuna Kanta Sing. Advances in Biometrics for Secure Human Authentication and Recognition. Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography