Results 281 to 290 of about 420,085 (316)
A Secure and Efficient Authentication Scheme with Privacy Protection for Internet of Medical Things. [PDF]
Xu F, Wu J, An Q, Ziaur R.
europepmc +1 more source
CryptoShield-multilayered cryptographic framework for enhanced security and robust communication systems. [PDF]
Altaf M +4 more
europepmc +1 more source
A Visual and Rapid PCR Test Strip Method for the Authentication of Sika Deer Meat (<i>Cervus nippon</i>). [PDF]
Gao L +5 more
europepmc +1 more source
ChebIoD: a Chebyshev polynomial-based lightweight authentication scheme for internet of drones environments. [PDF]
Al-Mekhlafi ZG +9 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Authentication and Mutual Authentication
2014In a sensitive environment, it is common to implement user authentication, possibly based on several factors, in order to ensure only authorized users have access to restricted features or information. But today more and more devices are interacting directly to perform some actions, or deliver a high level service to their user, like in smart grid and ...
Asad Ali, François Tuot, Gerald Maunier
openaire +1 more source
Authenticity revisited: text authenticity and learner authenticity
ELT Journal, 1995The term ‘authenticity’ has sparked off a lot of discussion in the fields of linguistics, materials design, and language learning; a consensus, however, has not been reached on a precise definition. In this article, a distinction is made between text authenticity and learner authenticity.
openaire +1 more source
2017
David M. Shoup was the twenty-second commandant of United States Marine Corps (1960-1963). An R.O.T.C. graduate, he began his military career in 1926, and would earn the Medal of Honor for his courageous leadership at the Battle of Tarawa during the Second World War.
Howard Jablon, Jeffrey J. Matthews
openaire +1 more source
David M. Shoup was the twenty-second commandant of United States Marine Corps (1960-1963). An R.O.T.C. graduate, he began his military career in 1926, and would earn the Medal of Honor for his courageous leadership at the Battle of Tarawa during the Second World War.
Howard Jablon, Jeffrey J. Matthews
openaire +1 more source
2017
The chapter deals with the use of IR spectroscopy for food authentication, giving some guidelines for a suitable workflow, from sampling to multivariate data analysis and validation.
openaire +2 more sources
The chapter deals with the use of IR spectroscopy for food authentication, giving some guidelines for a suitable workflow, from sampling to multivariate data analysis and validation.
openaire +2 more sources
Authentic Bodies, Authentic Selves
2016This final, concluding chapter draws together a number of threads relating to authenticity, which have been raised in earlier chapters. I show how a view of authenticity as, variously, normative, phenomenological and socially constructed opens up further ways of understanding narratives about self-injury.
openaire +1 more source

