Buscar
Mostrando ítems 1-10 de 27
Clustering based physical-layer authentication in edge computing systems with asymmetric resources
(MDPI AG, 2019)
In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcome the drawback of traditional cipher-based authentication schemes that suffer from heavy costs and are limited by ...
Protecting Touch: Authenticated App-To-Server channels for mobile devices using NFC tags
(2017-07-06)
Traditional authentication methods (e.g., password, PIN) often do not scale well to the context of mobile devices in terms of security and usability. However, the adoption of Near Field Communication (NFC) on a broad range ...
User authentication through typing biometrics features
(Ieee-inst Electrical Electronics Engineers IncPiscatawayEUA, 2005)
Providing Integrity and Authenticity in DICOM Images: A Novel Approach
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2009)
The increasing adoption of information systems in healthcare has led to a scenario where patient information security is more and more being regarded as a critical issue. Allowing patient information to be in jeopardy may ...
Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks
(Oxford Univ PressOxfordInglaterra, 2012)
Adaptive positive selection for keystroke dynamics
(SpringerDordrecht, 2015-12)
Current technologies provide state of the art services but, at the same time, increase data exposure, mainly due to Internet-based applications. In view of this scenario, improved authentication mechanisms are needed. ...
Authenticity assessment of anabolic androgenic steroids in counterfeit drugs by H-1 NMR
(Royal Soc Chemistry, 2018-03-14)
Anabolic steroids are synthetic hormone derivatives of testosterone, a masculine sex hormone. Their main effects include greater muscle size, physical strength, and resistance. The need for safe and reliable quality control ...
Upgrading a TCABR data analysis and acquisition system for remote participation using Java, XML, RCP and modern client/server communication/authentication
(ELSEVIER SCIENCE SA, 2010)
The TCABR data analysis and acquisition system has been upgraded to support a joint research programme using remote participation technologies. The architecture of the new system uses Java language as programming environment. ...