Results 91 to 100 of about 6,416 (199)

Applications for Logging Users Into the Linux System with RFID Cards [PDF]

open access: yes, 2014
Import 05/08/2014Cieľom tejto práce je navrhnúť a implementovať systém, ktorý umožní užívateľovi prihlásenie do systému Linux pomocou RFID karty. Práca popisuje prihlásovacie a autentifikačné techniky. Využíva pri tom PAM framework.
Fiala, František
core  

El nuevo protocolo de internet : IPv6 [PDF]

open access: yes, 2008
El Protocolo de Internet versión 6 (Internet Protocol Version 6, IPv6) es el nivel más reciente del protocolo de Internet (IP) y actualmente se incluye como parte del soporte IP en muchos productos incluyendo los principales sistemas operativos de ...
Rivera Aragón, Aura María   +1 more
core  

Application of User Behavior Thermal Maps for Identification of Information Security Incident

open access: yesТруды СПИИРАН, 2018
One of the main functions of an information security system is the identification of any access subject to be able to investigate information security incidents.
Andrey Yunusovich Iskhakov   +4 more
doaj   +1 more source

Deep learning et authentification des textes

open access: yes, 2019
Résumé. Deep Learning et authentification des textesLes problèmes de paternité ou de datation peuvent être abordés avec les moyens habituels de l’histoire littéraire, mais aussi en recourant aux ressources de la statistique et de l’informatique. Diverses mesures intertextuelles ont été proposées pour tenter de distinguer les distances intra (entre les ...
Brunet, Étienne, Vanni, Laurent
openaire   +1 more source

Mobile payments: moving towards a wallet in the cloud? [PDF]

open access: yes
This article deals with mobile payments in developed countries. Even though it only accounts for a relatively small share of the market (between 10% and 20%), mobile payment merits in-depth analysis in developed countries as there are many economic and ...
Sophie PERNET-LUBRANO
core  

Creating agent platforms to host agent-mediated services that share resources [PDF]

open access: yes, 2002
After a period where the Internet was exclusively filled with content, the present efforts are moving towards services, which handle the raw information to create value from it.
Mérida-Campos, C   +2 more
core  

High rate, long-distance quantum key distribution over 250km of ultra low loss fibres

open access: yes, 2009
We present a fully automated quantum key distribution prototype running at 625 MHz clock rate. Taking advantage of ultra low loss fibres and low-noise superconducting detectors, we can distribute 6,000 secret bits per second over 100 km and 15 bits per ...
  +25 more
core   +2 more sources

Mobile operators as banks or vice-versa? and: the challenges of Mobile channels for banks [PDF]

open access: yes
This short paper addresses the strategic challenges of deposit banks, and payment clearinghouses, posed by the growing role of mobile operators as collectors and payment agents of flow of cash for themselves and third parties.
Pau, L-F.
core   +1 more source

The Authentification of Old Bronze Coins and the Structure of the Archaeological Patina

open access: yesThe Annals of “Dunarea de Jos” University of Galati. Fascicle IX, Metallurgy and Materials Science, 2006
This paper presents comparative results concerning the chemical composition and mineralogical distribution of the main compounds from the structure of the archaeological patina of ancient bronze coins, which were determined by the corroboration of ...
Ion SANDU   +4 more
doaj  

Home - About - Disclaimer - Privacy