Buscar
Mostrando ítems 1-10 de 629
A video-based biometric authentication for e-learning web applications
(2009-06-02)
In the last years there was an exponential growth in the offering of Web-enabled distance courses and in the number of enrolments in corporate and higher education using this modality. However, the lack of efficient ...
A video-based biometric authentication for e-learning web applications
(2009-06-02)
In the last years there was an exponential growth in the offering of Web-enabled distance courses and in the number of enrolments in corporate and higher education using this modality. However, the lack of efficient ...
Perceived organizational culture and engagement: the mediating role of authenticity
(Emerald Group Publishing Ltd, 2016)
Purpose - The idea of being authentic at work is gaining traction in both academia and organizations. The purpose of this paper is to test whether four types of perceived organizational culture (hierarchical, clan, market, ...
Estudo e implementação de autenticação no acesso para o portal do HUSM
(Universidade Federal de Santa MariaBrasilUFSMCentro de Tecnologia, 2007-03-01)
In this work is treated on-demand authentication through the web services technology,
where they have a responsible service for verifying the authenticity of the users. The
service can prove the authentication through ...
Preservation and authenticity of photographic records: steps of the same continuum
(Ibersid Network, 2016-01-01)
The significant amount and variety of information that are provided by means of images, especially photographs, incite a special concern in relation to the preservation of this kind of media, in order to ensure its ...
Implantação de servidor de autenticação tacacs + e radius em empresa de pequeno e médio porte
(Universidade Tecnológica Federal do ParanáCuritibaDepartamento Acadêmico de Eletrônica, 2013-11-21)
This paper presents both a theoretical approach as the deployment of an environment able to perform user authentication to ensure security of information, focusing on the platform provided by the American company Cisco ...
Protecting Touch: Authenticated App-To-Server channels for mobile devices using NFC tags
(2017-07-06)
Traditional authentication methods (e.g., password, PIN) often do not scale well to the context of mobile devices in terms of security and usability. However, the adoption of Near Field Communication (NFC) on a broad range ...
Ocular Recognition Using Deep Features for Identity Authentication
(Ieee, 2020-01-01)
Recently, ocular biometrics has been gaining importance in Biometrics due to the poor performance obtained in some cases by biometric systems based on characteristics of the whole face. This paper presents a new method for ...
Fayol: um sistema multi-agente de gerência e controle de acesso à plataforma Milos
(Universidade do Vale do Rio dos Sinos, 2014-08-29)
The increase use of learning objects and content platforms that perform the functions of storage, creation, modification and query of these objects on a managed and controlled manner, creates the need for mechanisms to ...