Статті в журналах з теми "Authentication method"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Authentication method".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Nahtigal, Tomaž, and Andrej Žemva. "Block–wise authentication method for digital images." Journal of Electrical Engineering 63, no. 5 (November 1, 2012): 289–95. http://dx.doi.org/10.2478/v10187-012-0042-6.
Повний текст джерелаPark, Hosung, Seungsoo Nam, and Daeseon Choi. "Address Authentication Method for Sustainable Social Qualification." Sustainability 12, no. 5 (February 25, 2020): 1700. http://dx.doi.org/10.3390/su12051700.
Повний текст джерелаLoginovskiy, O. V., M. E. Koval, and A. A. Shinkarev. "Using the ideal point method to search the best authentication method in corporate information systems." Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control & Radioelectronics 22, no. 3 (2022): 5–18. http://dx.doi.org/10.14529/ctcr220301.
Повний текст джерелаYakovlev, V. "Method for Authentication of Diffie ‒ Hellman Values Based on Pre-Distributed Random Sequences and Wegman ‒ Carter One-Time Pad Algorithm." Proceedings of Telecommunication Universities 7, no. 3 (October 6, 2021): 79–90. http://dx.doi.org/10.31854/1813-324x-2021-7-3-79-90.
Повний текст джерелаPagnin, Elena, and Aikaterini Mitrokotsa. "Privacy-Preserving Biometric Authentication: Challenges and Directions." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/7129505.
Повний текст джерелаSong, Yubo, Bing Chen, Tianqi Wu, Tianyu Zheng, Hongyuan Chen, and Junbo Wang. "Enhancing Packet-Level Wi-Fi Device Authentication Protocol Leveraging Channel State Information." Wireless Communications and Mobile Computing 2021 (November 17, 2021): 1–12. http://dx.doi.org/10.1155/2021/2993019.
Повний текст джерелаLiu, Jing, Rongchao Liu, and Yingxu Lai. "Risk-Based Dynamic Identity Authentication Method Based on the UCON Model." Security and Communication Networks 2022 (March 31, 2022): 1–13. http://dx.doi.org/10.1155/2022/2509267.
Повний текст джерелаPutri, Marsha Chikita Intania, Parman Sukarno, and Aulia Arif Wardana. "Two factor authentication framework based on ethereum blockchain with dApp as token generation system instead of third-party on web application." Register: Jurnal Ilmiah Teknologi Sistem Informasi 6, no. 2 (June 3, 2020): 74. http://dx.doi.org/10.26594/register.v6i2.1932.
Повний текст джерелаLipton, David. "Logical authentication method." ACM SIGSAC Review 4, no. 2 (April 1986): 9–20. http://dx.doi.org/10.1145/15842.15845.
Повний текст джерелаHwang, Ho Bin, Hyeokchan Kwon, Byungho Chung, Jongshill Lee, and In Young Kim. "ECG Authentication Based on Non-Linear Normalization under Various Physiological Conditions." Sensors 21, no. 21 (October 20, 2021): 6966. http://dx.doi.org/10.3390/s21216966.
Повний текст джерелаPutra, Kurnia Prima, Marwan Ramdhany Edy, M. Syahid Nur Wahid, Muhammad Fajar B, and Fadhlirrahman Baso. "FEATURES SIMPLIFICATION USING CUBIC BEZIER PROPERTIES FOR GAIT RECOGNITION ON SMARTPHONE." Journal of Embedded Systems, Security and Intelligent Systems 3, no. 1 (June 1, 2022): 11. http://dx.doi.org/10.26858/jessi.v3i1.33716.
Повний текст джерелаGupta, Brij B., and Shaifali Narayan. "A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server." Journal of Organizational and End User Computing 33, no. 2 (July 2021): 1–16. http://dx.doi.org/10.4018/joeuc.20210301.oa1.
Повний текст джерелаAriyama, Hirotaka. "A Personal Authentication Method." IEEJ Transactions on Electronics, Information and Systems 107, no. 1 (1987): 62–66. http://dx.doi.org/10.1541/ieejeiss1987.107.1_62.
Повний текст джерелаYakovlev, Viktor. "Authentication of Keys Distributed by the Diffie-Hellman Method for Mobile Devices based on Authentication Codes and Magnetometric Data." SPIIRAS Proceedings 18, no. 3 (June 5, 2019): 706–41. http://dx.doi.org/10.15622/sp.2019.18.3.705-740.
Повний текст джерелаHirakawa, Yutaka, Fumiya Hirose, and Isao Sasano. "PVRotate: An Improved Vibration-Based User Authentication Method." International Journal of Future Computer and Communication 8, no. 2 (June 2019): 50–54. http://dx.doi.org/10.18178/ijfcc.2019.8.2.539.
Повний текст джерелаWu, Miqi, Lin You, Gengran Hu, Liang Li, and Chengtang Cao. "A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture." Security and Communication Networks 2021 (April 22, 2021): 1–20. http://dx.doi.org/10.1155/2021/5592119.
Повний текст джерелаShtennikov, Dmitry Gennadevich, Kirill Sergeevich Kuzmin, and Nikolay Evgenevich Letov. "DEVELOPMENT AND ANALYSIS OF AUTHENTICATION METHOD FOR IOT DEVICES SOFTWARE ON THE NETWORK USING BLOCKCHAIN TECHNOLOGIES." ENVIRONMENT. TECHNOLOGIES. RESOURCES. Proceedings of the International Scientific and Practical Conference 2 (June 20, 2019): 126. http://dx.doi.org/10.17770/etr2019vol2.4066.
Повний текст джерелаPranata, Sunderi, Hargyo Tri Nugroho, and Hirofumi Yamaki. "Analisis dan Implementasi Protokol Otentikasi FIDO U2F." Jurnal ULTIMA Computing 9, no. 1 (June 16, 2017): 30–35. http://dx.doi.org/10.31937/sk.v9i1.571.
Повний текст джерелаInoue, Minori, and Takefumi Ogawa. "TapOnce: a novel authentication method on smartphones." International Journal of Pervasive Computing and Communications 14, no. 1 (April 3, 2018): 33–48. http://dx.doi.org/10.1108/ijpcc-d-18-00006.
Повний текст джерелаYein, Alan Dahgwo, Chih-Hsueh Lin, Yu-Hsiu Huang, Wen-Shyong Hsieh, Chung-Nan Lee, and Pin-Chun Kuo. "A novel message authentication method for VANET without RSU." Engineering Computations 33, no. 8 (November 7, 2016): 2288–301. http://dx.doi.org/10.1108/ec-08-2015-0255.
Повний текст джерелаJia, Li. "Unified Login Authentication Method Based on Cloud Computing." Advanced Materials Research 926-930 (May 2014): 2245–48. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2245.
Повний текст джерелаViddin, Irsandy Maulana Satya, Antonius Cahya Prihandoko, and Diksy Media Firmansyah. "An authentication alternative using histogram shifting steganography method." Jurnal Teknologi dan Sistem Komputer 9, no. 2 (February 26, 2021): 106–12. http://dx.doi.org/10.14710/jtsiskom.2021.13931.
Повний текст джерелаWu, Da-Chun, and Yu-Tsung Hsu. "Authentication of LINE Chat History Files by Information Hiding." ACM Transactions on Multimedia Computing, Communications, and Applications 18, no. 1 (January 31, 2022): 1–23. http://dx.doi.org/10.1145/3474225.
Повний текст джерелаKang, Hyeok, Keun-Ho Lee, and Gui-Jung Kim. "Safe and convenient personal authentication method using Moiré 3D authentication based on biometric authentication." Cluster Computing 22, S1 (November 22, 2017): 2017–26. http://dx.doi.org/10.1007/s10586-017-1234-4.
Повний текст джерелаMalenko, Dmytro. "Comparison of the NFC authentication method with the methods available in Android." Journal of Computer Sciences Institute 15 (June 30, 2020): 121–25. http://dx.doi.org/10.35784/jcsi.2041.
Повний текст джерелаLee, Min-Gu, Dong-Wan Kim, and Jin-Soo Sohn. "Active Authentication Method using NFC." Journal of Korea Information and Communications Society 37, no. 2C (February 29, 2012): 140–56. http://dx.doi.org/10.7840/kics.2012.37c.2.140.
Повний текст джерелаKONISHI, Kazuya, and Akihiro UMEMURA. "Authentication method for document images." Journal of Information Processing and Management 41, no. 9 (1998): 667–77. http://dx.doi.org/10.1241/johokanri.41.667.
Повний текст джерелаQingqin Fu, Qingqin Fu, Zhengquan Ang Qingqin Fu, Ling Yi Zhengquan Ang, Pingjiang Xu Ling Yi, Jia Liu Pingjiang Xu, Zhaoqing Liang Jia Liu, Lili Fu Zhaoqing Liang, Chaobin Yang Lili Fu, and Gaolin Fan Chaobin Yang. "A New Terminal and Electric Meter Legality Authentication Method." 電腦學刊 32, no. 6 (December 2021): 176–82. http://dx.doi.org/10.53106/199115992021123206015.
Повний текст джерелаRajasingh, J. Paul, and D. Sai Yaswanth. "Fingerprint Authentication." International Journal of Engineering and Advanced Technology 10, no. 5 (June 30, 2021): 87–89. http://dx.doi.org/10.35940/ijeat.e2651.0610521.
Повний текст джерелаShdefat, Ahmed Younes, Moon-Il Joo, Sung-Hoon Choi, and Hee-Cheol Kim. "Utilizing ECG Waveform Features as New Biometric Authentication Method." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 2 (April 1, 2018): 658. http://dx.doi.org/10.11591/ijece.v8i2.pp658-665.
Повний текст джерелаChen, Wen, Wu, Xu, Jiang, Song, and Chen. "Radio Frequency Fingerprint-Based Intelligent Mobile Edge Computing for Internet of Things Authentication." Sensors 19, no. 16 (August 19, 2019): 3610. http://dx.doi.org/10.3390/s19163610.
Повний текст джерелаLi, Min Song. "A Kind of Copyright Protection Method Based on Computer Fingerprint." Advanced Materials Research 181-182 (January 2011): 825–29. http://dx.doi.org/10.4028/www.scientific.net/amr.181-182.825.
Повний текст джерелаLavanya, D. L., R. Ramaprabha, and K. Gunaseelan. "Privacy Preserving Physical Layer Authentication Scheme for LBS based Wireless Networks." Defence Science Journal 71, no. 2 (March 10, 2021): 241–47. http://dx.doi.org/10.14429/dsj.71.15355.
Повний текст джерелаPark, Hyun, and TaeGuen Kim. "User Authentication Method via Speaker Recognition and Speech Synthesis Detection." Security and Communication Networks 2022 (January 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/5755785.
Повний текст джерелаShrivastava, Khusboo, and Harish Sahu. "To Survey Graphical Password Verification Method." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 247–51. http://dx.doi.org/10.22214/ijraset.2022.47855.
Повний текст джерелаGuo, Wen Zhuo. "An Optimized RFID Unidirectional Authentication Method." Applied Mechanics and Materials 490-491 (January 2014): 1734–38. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1734.
Повний текст джерелаZhang, LiMing, and XinGang Zhang. "New Authentication Method for Vector Geographic Data Based on Perceptual Hash." Abstracts of the ICA 1 (July 15, 2019): 1–2. http://dx.doi.org/10.5194/ica-abs-1-431-2019.
Повний текст джерелаLi, Qiang, Wenlong Su, Peng Zhang, Xinzhou Cheng, Mingxin Li, and Yuanni Liu. "Blockchain-Based Method for Pre-Authentication and Handover Authentication of IoV Vehicles." Electronics 12, no. 1 (December 28, 2022): 139. http://dx.doi.org/10.3390/electronics12010139.
Повний текст джерелаGerami Moghaddam, Saman, Amin Nasiri, and Mohsen Sharifi. "ECCO Mnemonic Authentication—Two-Factor Authentication Method with Ease-of-Use." International Journal of Computer Network and Information Security 6, no. 7 (June 8, 2014): 11–18. http://dx.doi.org/10.5815/ijcnis.2014.07.02.
Повний текст джерелаNoratiqah Md Ariffin, Siti, Mohd Fadzil Abdul Kadir, Ahmad Nazari Mohd Rose, Mohamad Afendee Mohamed, and Abd Rasid Mamat. "User Authentication Using Grid Based Method." International Journal of Engineering & Technology 7, no. 2.14 (April 6, 2018): 97. http://dx.doi.org/10.14419/ijet.v7i2.14.11442.
Повний текст джерелаEvwiekpaefe, A. E., and V. O. Eyinla. "Implementing fingerprint authentication in computer-based tests." Nigerian Journal of Technology 40, no. 2 (October 18, 2021): 284–91. http://dx.doi.org/10.4314/njt.v40i2.14.
Повний текст джерелаBao, Song De. "A Security Authentication Method of Mobile RFID." Advanced Materials Research 268-270 (July 2011): 1077–81. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1077.
Повний текст джерелаDivakaran, J., S. K. Prashanth, Gouse Baig Mohammad, Dr Shitharth, Sachi Nandan Mohanty, C. Arvind, K. Srihari, Yasir Abdullah R., and Venkatesa Prabhu Sundramurthy. "Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications." Journal of Healthcare Engineering 2022 (January 7, 2022): 1–8. http://dx.doi.org/10.1155/2022/2500377.
Повний текст джерелаPatel, Subhash Chandra, Sumit Jaiswal, Ravi Shankar Singh, and Jyoti Chauhan. "Access Control Framework Using Multi-Factor Authentication in Cloud Computing." International Journal of Green Computing 9, no. 2 (July 2018): 1–15. http://dx.doi.org/10.4018/ijgc.2018070101.
Повний текст джерелаMoon, Soo Young, and Tae Ho Cho. "A Routing Path Construction Method for Key Dissemination Messages in Sensor Networks." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/185156.
Повний текст джерелаkumar, N. Shantha, and Dr Hareesh K. "A Primitive Proposal of an Algorithm for IP and Mac Based Data Aggregation and message authentication in Wireless Sensor Networks." International Journal of Soft Computing and Engineering 9, no. 4 (November 5, 2019): 14–17. http://dx.doi.org/10.35940/ijsce.c3322.109119.
Повний текст джерелаVasin, N. N., and R. W. Chigir. "Devices authentication method for sensor networks." Infokommunikacionnye tehnologii 15, no. 3 (September 2017): 268–73. http://dx.doi.org/10.18469/ikt.2017.15.3.09.
Повний текст джерелаHirakawa, Yutaka, Ayaka Shimoda, Isao Sasano, and Kazuo Ohzeki. "Improvements in a Puzzle Authentication Method." Journal of Computer and Communications 06, no. 01 (2018): 12–20. http://dx.doi.org/10.4236/jcc.2018.61002.
Повний текст джерелаSeo, Hwa-Jeong, and Ho-Won Kim. "User Authentication Method on VANET Environment." Journal of Korean Institute of Communications and Information Sciences 37, no. 7C (July 31, 2012): 576–83. http://dx.doi.org/10.7840/kics.2012.37.7c.576.
Повний текст джерелаNAKANO, Ken, Jun HYODO, and Tomoya TATEISHI. "Biometric Authentication Method using Tactile Information." Transactions of the Japan Society of Mechanical Engineers Series C 71, no. 709 (2005): 2769–75. http://dx.doi.org/10.1299/kikaic.71.2769.
Повний текст джерела