Results 281 to 290 of about 3,158,126 (357)
Some of the next articles are maybe not open access.
Secure Authentication Protocols For Internet Of Things (Iot) Devices
International Conferences on Contemporary Computing and Informatics, 2023The ability to give typical gadgets an extra technique for distinguishing proof and correspondence is known as the Internet of Things (IoT). The scope of IoT application spaces is extremely wide and incorporates things like wearables, savvy urban areas ...
P. William +5 more
semanticscholar +1 more source
Continuous User Authentication for Human-Robot Collaboration
ARES, 2021Human-robot collaboration is on the increase and having a major impact on areas such as manufacturing, where the abilities of the human worker, augmented by those of the robot, bring increased flexibility and performance.
Shurook S. Almohamade +2 more
semanticscholar +1 more source
2022 International Conference on Artificial Intelligence and Data Engineering (AIDE), 2022
A variety of applications, including automated toll collection, traffic law enforcement, security monitoring of restricted locations, and unattended parking lots, rely on license plate recognition (LPR) or Vehicle Number Plate (VNP).
Manjula Gururaj Rao +3 more
semanticscholar +1 more source
A variety of applications, including automated toll collection, traffic law enforcement, security monitoring of restricted locations, and unattended parking lots, rely on license plate recognition (LPR) or Vehicle Number Plate (VNP).
Manjula Gururaj Rao +3 more
semanticscholar +1 more source
Social Science Research Network, 2021
Now a days, the biometric system is playing a significant role, especially in the banking sector, law enforcement region. In previous times the unimodal system was used for biometrics but now the trend is for multimodal biometrics which is an important ...
M. Pawar, R. D. Kokate, V. R. Gosavi
semanticscholar +1 more source
Now a days, the biometric system is playing a significant role, especially in the banking sector, law enforcement region. In previous times the unimodal system was used for biometrics but now the trend is for multimodal biometrics which is an important ...
M. Pawar, R. D. Kokate, V. R. Gosavi
semanticscholar +1 more source
Robustness for Authentication of the Human Using Face, Ear, and Gait Multimodal Biometric System
International Journal of Information System Modeling and Design, 2021Biometrics is the science that deals with personal human physiological and behavioral characteristics such as fingerprints, handprints, iris, voice, face recognition, signature recognition, ear recognition, and gait recognition.
Law Kumar Singh +3 more
semanticscholar +1 more source
Construction of Authenticity in Islamic Law
Islamic Studies, 2020Construction of authenticity in Islamic law on contentious issues including gender-related issues is an outcome of an intricate and complex process of interaction between the divine and human agency situated in a specific sociopolitical context. The divine text is not monolithic and is susceptible of various interpretations.
openaire +1 more source
Research on Consensus Algorithm for Intellectual Property Authentication Based on PBFT
ElectronicsTraditional intellectual property authentication relies on centralized intermediaries, which makes it difficult to address issues such as forgery, lack of trust, and opaque information.
Jing Wang +4 more
semanticscholar +1 more source
Forward-Secure Edge Authentication for Graphs
Computer/law journal, 2021The edge authentication of graphs has been studied in the literature because graphs are one of the most widely used data organization structures. The majority of such schemes cannot be used to authenticate general directed graphs (GDGs); other schemes ...
Fei Zhu +5 more
semanticscholar +1 more source
A Survey of Threats Against Voice Authentication and Anti-Spoofing Systems
arXiv.orgVoice authentication has undergone significant changes from traditional systems that relied on handcrafted acoustic features to deep learning models that can extract robust speaker embeddings. This advancement has expanded its applications across finance,
K. Kamel +3 more
semanticscholar +1 more source

