Results 261 to 270 of about 355,842 (292)
Some of the next articles are maybe not open access.

Social Authentication Applications, Attacks, Defense Strategies and Future Research Directions: A Systematic Review

IEEE Communications Surveys and Tutorials, 2017
Noura Alomar   +2 more
exaly  

Authentic Leadership

Journal of the American College of Radiology, 2014
Gunderman, Richard B., Maas, Mario
openaire   +3 more sources

Authentic Texts

2018
Leonardo Borlini, Marina Petri
openaire   +1 more source

A taxonomy of multicast data origin authentication: Issues and solutions

IEEE Communications Surveys and Tutorials, 2004
Yacine Challal
exaly  

Authentically African, Authentically Anglican

2014
Cephas N. Omenyo, Abraham N.O. Kwakye
openaire   +1 more source

Authentic Compassion

Obstetrics & Gynecology, 2013
openaire   +2 more sources

Discriminant analysis is an inappropriate method of authentication

TrAC - Trends in Analytical Chemistry, 2016
Alexey L Pomerantsev
exaly  

Home - About - Disclaimer - Privacy