Applications for Logging Users Into the Linux System with RFID Cards [PDF]
Import 05/08/2014Cieľom tejto práce je navrhnúť a implementovať systém, ktorý umožní užívateľovi prihlásenie do systému Linux pomocou RFID karty. Práca popisuje prihlásovacie a autentifikačné techniky. Využíva pri tom PAM framework.
Fiala, František
core
El nuevo protocolo de internet : IPv6 [PDF]
El Protocolo de Internet versión 6 (Internet Protocol Version 6, IPv6) es el nivel más reciente del protocolo de Internet (IP) y actualmente se incluye como parte del soporte IP en muchos productos incluyendo los principales sistemas operativos de ...
Rivera Aragón, Aura María +1 more
core
Application of User Behavior Thermal Maps for Identification of Information Security Incident
One of the main functions of an information security system is the identification of any access subject to be able to investigate information security incidents.
Andrey Yunusovich Iskhakov +4 more
doaj +1 more source
Comparative analysis of chloroplast genome and new insights into phylogenetic relationships of Ajuga and common adulterants. [PDF]
Shang M +6 more
europepmc +1 more source
Deep learning et authentification des textes
Résumé. Deep Learning et authentification des textesLes problèmes de paternité ou de datation peuvent être abordés avec les moyens habituels de l’histoire littéraire, mais aussi en recourant aux ressources de la statistique et de l’informatique. Diverses mesures intertextuelles ont été proposées pour tenter de distinguer les distances intra (entre les ...
Brunet, Étienne, Vanni, Laurent
openaire +1 more source
Mobile payments: moving towards a wallet in the cloud? [PDF]
This article deals with mobile payments in developed countries. Even though it only accounts for a relatively small share of the market (between 10% and 20%), mobile payment merits in-depth analysis in developed countries as there are many economic and ...
Sophie PERNET-LUBRANO
core
Creating agent platforms to host agent-mediated services that share resources [PDF]
After a period where the Internet was exclusively filled with content, the present efforts are moving towards services, which handle the raw information to create value from it.
Mérida-Campos, C +2 more
core
High rate, long-distance quantum key distribution over 250km of ultra low loss fibres
We present a fully automated quantum key distribution prototype running at 625 MHz clock rate. Taking advantage of ultra low loss fibres and low-noise superconducting detectors, we can distribute 6,000 secret bits per second over 100 km and 15 bits per ...
+25 more
core +2 more sources
Mobile operators as banks or vice-versa? and: the challenges of Mobile channels for banks [PDF]
This short paper addresses the strategic challenges of deposit banks, and payment clearinghouses, posed by the growing role of mobile operators as collectors and payment agents of flow of cash for themselves and third parties.
Pau, L-F.
core +1 more source
The Authentification of Old Bronze Coins and the Structure of the Archaeological Patina
This paper presents comparative results concerning the chemical composition and mineralogical distribution of the main compounds from the structure of the archaeological patina of ancient bronze coins, which were determined by the corroboration of ...
Ion SANDU +4 more
doaj

