Results 11 to 20 of about 420,085 (316)

Algorithm design for grip-pattern verification in smart gun [PDF]

open access: yes, 2005
The Secure Grip project1 focuses on the development of a hand-grip pattern recognition system, as part of the smart gun. Its target customer is the police. To explore the authentication performance of this system, we collected data from a group of police
Bazen, A.M.   +3 more
core   +8 more sources

Transparent end-user authentication across heterogeneous wireless networks [PDF]

open access: yes, 2003
With the increasing number of mobile and wireless networks that are deployed, the handovers between these systems take place more often. In order to provide end-users with uninterrupted access to services, support for fast handover is essential.
Chen, Hong   +2 more
core   +2 more sources

Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality [PDF]

open access: yes, 2017
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For example, in the near future users may be able to visit virtual shopping malls and virtually join international conferences.
Alt, Florian   +6 more
core   +1 more source

Authenticity and The Authentic Enterprise [PDF]

open access: yesJournal of Communication Management, 2010
Commentary on the Arthur W. Page Society's report, The Authentic Enterprise, and its conceptualisation of authenticity.
openaire   +1 more source

Against authenticity

open access: yesInternational Journal of Heritage Studies, 2022
Authenticity has long been a lynchpin of our thinking about heritage. It is a threshold question as to whether we even consider something to be heritage. Because authenticity is a threshold question, we have often assumed it and its relevance. Scholarship on authenticity therefore focuses on how it is created and (re)negotiated, seldom scrutinising the
openaire   +2 more sources

Distributed and efficient identity authentication based on consortium blockchain

open access: yesDianzi Jishu Yingyong, 2022
In order to solve the problems of cumbersome user authentication process, insecure identity information, and vulnerability of authentication system in traditional identity authentication, a distributed identity authentication method based on alliance ...
Yao Ying   +4 more
doaj   +1 more source

The Case for Quantum Key Distribution [PDF]

open access: yes, 2009
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon   +20 more
core   +8 more sources

Authentic Interpretation [PDF]

open access: yesRatio Juris, 2020
AbstractI approach the identification of the principles of legal interpretation through a discussion of an important but largely forgotten strand in our legal heritage: the idea (and at some points in English law, the rule) that the interpretation of legislation is to be done by the lawmaker.
openaire   +2 more sources

State Authenticity [PDF]

open access: yesCurrent Directions in Psychological Science, 2017
State authenticity is the sense that one is currently in alignment with one’s true or real self. We discuss state authenticity as seen by independent raters, describe its phenomenology, outline its triggers, consider its well-being and behavioral implications, and sketch out a cross-disciplinary research agenda.
Sedikides, Constantine   +3 more
openaire   +3 more sources

Sequencing and Structural Analysis of the Complete Chloroplast Genome of the Medicinal Plant Lycium chinense Mill

open access: yesPlants, 2019
Lycium chinense Mill, an important Chinese herbal medicine, is widely used as a dietary supplement and food. Here the chloroplast (CP) genome of L. chinense was sequenced and analyzed, revealing a size of 155,756 bp and with a 37.8% GC content.
Zerui Yang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy