Buscar
Mostrando ítems 1-10 de 5906
A video-based biometric authentication for e-learning web applications
(2009-06-02)
In the last years there was an exponential growth in the offering of Web-enabled distance courses and in the number of enrolments in corporate and higher education using this modality. However, the lack of efficient ...
A video-based biometric authentication for e-learning web applications
(2009-06-02)
In the last years there was an exponential growth in the offering of Web-enabled distance courses and in the number of enrolments in corporate and higher education using this modality. However, the lack of efficient ...
Clustering based physical-layer authentication in edge computing systems with asymmetric resources
(MDPI AG, 2019)
In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcome the drawback of traditional cipher-based authentication schemes that suffer from heavy costs and are limited by ...
Using principles of authentic assessment to redesign written examinations and tests.
(2019)
Tests and examinations are widely used internationally. Despite their pervasiveness, they tend to measure lower order thinking skills in a decontextualized manner at a time when the literature frequently argues for the ...
How authentic is the vocabulary dealt with in class?
(2017)
This paper presentation is based on a research project on the development of learners' lexical competence and the ability to use lexical items to communicate in a foreign language, and draws on data collected from observations ...
A practical approach for biometric authentication based on smartcards
(2010-10-18)
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on ...
A practical approach for biometric authentication based on smartcards
(2010-10-18)
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on ...