Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

A Multifactor Multilevel and Interaction Based (M2I) Authentication Framework for Internet of Things (IoT) Applications

Subjects: Internet of Things (IoT); interaction based authentication; level of assurance (LoA)

  • Source: AlJanah , S , Zhang , N & Tay , S W 2022 , ' A Multifactor Multilevel and Interaction Based (M2I) Authentication Framework for Internet of Things (IoT) Applications ' ,

Record details

×
Academic Journal

A Survey on Smart Home Authentication:Toward Secure, Multi-Level and Interaction-based Identification

Subjects: Authentication; Internet of Things (IoT); security

  • Source: AlJanah , S , Zhang , N & Tay , S W 2021 , ' A Survey on Smart Home Authentication : Toward Secure, Multi-Level and Interaction-based Identification ' , IEEE Access ,

Record details

×
Academic Journal

Portable through Bottle SORS for the Authentication of Extra Virgin Olive Oil

Subjects: Chemometrics; Food adulteration; Food security

  • Source: Varnasseri , M , Muhamadali , H , Xu , Y , Richardson , P I C , Byrd , N , Ellis , D I , Matousek , P & Goodacre , R 2021 , ' Portable through Bottle SORS for the

Record details

×
Academic Journal

Use of information dependent acquisition mass spectra and sequential window acquisition of all theoretical fragment-ion mass spectra for fruit juices metabolomics and authentication

Subjects: DD-SIMCA; IDA-MS; Juice authenticity

  • Source: Xu , L , Xu , Z , Strashnov , I & Liao , X 2020 , ' Use of information dependent acquisition mass spectra and sequential window acquisition of all theoretical fragment-ion mass spectra for fruit

Record details

×
Academic Journal

Collaborative Authentication using Threshold Cryptography

Subjects: Collaborative authentication; Fuzzy extractors; Secret sharing

  • Source: Abidin , A , Aly , A & Mustafa , M A 2020 , Collaborative Authentication using Threshold Cryptography . in A Saracino & P Mori (eds) , Emerging Technologies for

Record details

×
Academic Journal

Communication Pattern based Data Authentication (CPDA) Designed for Big Data Processing in a Multiple Public Cloud Environment

Subjects: Big data; MapReduce; cloud

  • Source: Sirapaisan , S , Zhang , N & He , Q 2020 , ' Communication Pattern based Data Authentication (CPDA) Designed for Big Data Processing in a Multiple Public Cloud

Record details

×
Academic Journal

Strengthen user authentication on mobile devices by using user’s touch dynamics pattern

Subjects: Mobile computing; user authentication; behavioural biometrics

  • Source: Teh , P S , Zhang , N , Tan , S , Shi , Q , Khoh , W H & Nawaz , R 2020 , ' Strengthen user authentication on mobile devices by using user’s touch dynamics pattern ' ,

Record details

×
Academic Journal

Author Correction:Authentication and characterisation of a new oesophageal adenocarcinoma cell line: MFD-1 (Scientific Reports, (2016), 6, 1, (32417), 10.1038/srep32417)

  • Source: Oesophageal Cancer Clinical and Molecular Stratification (OCCAMS) Consortium & Ang , Y 2019 , ' Author Correction : Authentication and characterisation of a new

Record details

×
Academic Journal

Secret Key Exchange and Authentication via Randomized Spatial Modulation and Phase Shifting

  • Source: Alsusa , E & Taha , H 2018 , ' Secret Key Exchange and Authentication via Randomized Spatial Modulation and Phase Shifting ' , IEEE Transactions on Vehicular Technology

Record details

×
Academic Journal

Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities

Subjects: cs.CR

  • Source: hamme , T V , Rimmer , V , Preuveneers , D , Joosen , W , Mustafa , M A , Abidin , A & Rúa , E A 2017 , ' Frictionless Authentication Systems: Emerging Trends, Research

Record details

×
  • 1-10 of  16 results for ""Authentication""