نتایج جستجو برای: authentication
تعداد نتایج: 34927 فیلتر نتایج به سال:
At present, the proposed authentication schemes can be classified into three categories. The first category is the watermarking authentication schemes in which the watermark is independent of the multimedia content. The second category is the signature-based authentication schemes in which the signature is generated by the multimedia content and is not embedded into the multimedia content. The ...
This paper presents an evolution of authentication mechanisms from textual passwords to graphical authentication mechanisms. For security concerns password must be protected from the unauthorized users. Authentication and authorization is necessary for essential data, this requires authentication mechanisms. An important goal for authentication is user has easy to memorize their passwords and r...
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
To improve the information authentication and network security one of the effective authentication mechanism is Biometric authentication System. But when this authentication system is a offline authentication system, in such case, it is required to secure this authentication information. In this work, a biometric watermarking based authentication system is defined to secure the authentication s...
چکیده ندارد.
radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید