Results 241 to 250 of about 355,842 (292)
Some of the next articles are maybe not open access.

Authentication and Mutual Authentication

2014
In a sensitive environment, it is common to implement user authentication, possibly based on several factors, in order to ensure only authorized users have access to restricted features or information. But today more and more devices are interacting directly to perform some actions, or deliver a high level service to their user, like in smart grid and ...
Asad Ali, François Tuot, Gerald Maunier
openaire   +1 more source

Authenticity revisited: text authenticity and learner authenticity

ELT Journal, 1995
The term ‘authenticity’ has sparked off a lot of discussion in the fields of linguistics, materials design, and language learning; a consensus, however, has not been reached on a precise definition. In this article, a distinction is made between text authenticity and learner authenticity.
openaire   +1 more source

Authentic Leadership

2017
David M. Shoup was the twenty-second commandant of United States Marine Corps (1960-1963). An R.O.T.C. graduate, he began his military career in 1926, and would earn the Medal of Honor for his courageous leadership at the Battle of Tarawa during the Second World War.
Howard Jablon, Jeffrey J. Matthews
openaire   +1 more source

Food Authentication

2017
The chapter deals with the use of IR spectroscopy for food authentication, giving some guidelines for a suitable workflow, from sampling to multivariate data analysis and validation.
openaire   +2 more sources

Authentic Bodies, Authentic Selves

2016
This final, concluding chapter draws together a number of threads relating to authenticity, which have been raised in earlier chapters. I show how a view of authenticity as, variously, normative, phenomenological and socially constructed opens up further ways of understanding narratives about self-injury.
openaire   +1 more source

Biometric Authentication

2009
For ages, humans recognized themselves according to different characteristics (appearance, behavior…). Biometrics is a well known technique to identify an individual or verify its identity; as, for example, fingerprints have been used for more than 100 years to identify one criminal. With computers, this analysis can be realized very quickly and with a
Mahier, Julien   +3 more
openaire   +2 more sources

Authentic texts and authentic scripts

Scientific and Technical Information Processing, 2008
Authentic forms of scripts in China and Russia are considered for multilingual communications for countries with non-Latin alphabets in information space.
openaire   +1 more source

A Survey of Physical-Layer Authentication in Wireless Communications

IEEE Communications Surveys and Tutorials, 2021
Ning Xie, Hai-Jun Tan
exaly  

AUTHENTICATION

2010
DI PIETRO, ROBERTO, Nino V. Verde
openaire   +2 more sources

Home - About - Disclaimer - Privacy