نتایج جستجو برای: wise foundations authentication
تعداد نتایج: 90938 فیلتر نتایج به سال:
Ubiquitous and real-time person authentication has become critical after the breakthrough of all kind services provided via mobile devices. In this context, face technologies can provide reliable robust user authentication, given availability cameras in these devices, as well their widespread use everyday applications. The rapid development deep Convolutional Neural Networks (CNNs) resulted man...
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
conclusions the current study showed that poorness and unreliability of “al-kafi” narratives is a vain thought. hence, it is recommended to perform clinical trial studies (at least) on accurate/authentic narratives, and also consider them as reputable and valid narratives, along with traditional medicine references. results from all narratives of the book “al-kafi” (pillars, furoo, and rouzat a...
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید