Results 271 to 280 of about 3,158,126 (357)

Get law enforcement out of biospecimen authentication

open access: closedScience, 2022
Use of D NA markers in research that are used in law enforcement risks undermining public trust and ...
Debra J H, Mathews, Natalie, Ram
semanticscholar   +4 more sources

Function S-rough sets and security-authentication of hiding law

open access: closedScience in China Series F: Information Sciences, 2008
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shi, Kaiquan, Zhao, Jianli
  +4 more sources

LIAS: A Lightweight Incentive Authentication Scheme for Forensic Services in IoV

IEEE Transactions on Automation Science and Engineering, 2023
Internet of Vehicles (IoV) has become an indispensable data sensing and processing platform in Internet of Things (IoT) for intelligent transportation.
Mingyue Zhang   +5 more
semanticscholar   +1 more source

IEEE Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications Amendment 2: Enhancements for Authentication and Authorization

IEEE Std 1901b-2021 (Amendment to IEEE Std 1901-2020), 2022
State-of-the-art authentication and authorization mechanisms for networks, especially for IoT and access devices, are integrated in this amendment. Specifications for how IEEE Std 802.1X may be utilized for authentication and authorization by IEEE 1901 ...
Jean-Philippe Faure   +33 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy