Results 121 to 130 of about 6,416 (199)

Value creation in mobile banking [PDF]

open access: yes
The convergence of the Internet and mobile networks creates new opportunities and applications. Treating mobile business as simply an extension to the traditional web could result in missing out unique differentiated qualities for new value-added ...
Achraf AYADI
core  

RFID Authentification Protocols using Symmetric Cryptography

open access: yes, 2010
Radio Frequency IDentification (RFID) is emerging in a variety of applications as an important technology for identifying and tracking goods and assets. The spread of RFID technology, however, also gives rise to significant user privacy and security issues.
openaire   +1 more source

Protocol for the Endometriosis Research Queensland Study (ERQS): an integrated cohort study approach to improve diagnosis and stratify treatment. [PDF]

open access: yesBMJ Open, 2022
Tanaka K   +16 more
europepmc   +1 more source

Contribution to 2D/3D face recognition/authentification

open access: yes, 2017
L’analyse de visages 3D y compris la reconnaissance des visages et des expressions faciales 3D est devenue un domaine actif de recherche ces dernières années. Plusieurs méthodes ont été développées en utilisant des images 2D pour traiter ces problèmes.
openaire   +1 more source

Employing DNA metabarcoding to determine the geographical origin of honey. [PDF]

open access: yesHeliyon, 2020
Khansaritoreh E   +9 more
europepmc   +1 more source

Mitochondrial genomes of Middle Pleistocene horses from the open-air site complex of Schöningen. [PDF]

open access: yesNat Ecol Evol
Weingarten A   +11 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy