Results 141 to 150 of about 220,603 (181)
Some of the next articles are maybe not open access.
2015
Cloud computing lacks control over physical and logical aspects of the system, which imposes profound changes in security and privacy procedure; hence, it needs a high level of security. Currently, many researchers and developments are being done to provide client service-level agreements regarding security issues.
Ajay Rawat, Shivani Gambhir
openaire +1 more source
Cloud computing lacks control over physical and logical aspects of the system, which imposes profound changes in security and privacy procedure; hence, it needs a high level of security. Currently, many researchers and developments are being done to provide client service-level agreements regarding security issues.
Ajay Rawat, Shivani Gambhir
openaire +1 more source
ACM SIGCAS Computers and Society, 2010
Odor detection and identification by machines is currently being done to evaluate perfumes, wine, olive, oil, and even find people buried in rubble. Extending body odor detection to authentication may seem far-fetched and unrealistic. Yet such an application is plausible, given that like a fingerprint or iris, the human body odor is unique.
openaire +2 more sources
Odor detection and identification by machines is currently being done to evaluate perfumes, wine, olive, oil, and even find people buried in rubble. Extending body odor detection to authentication may seem far-fetched and unrealistic. Yet such an application is plausible, given that like a fingerprint or iris, the human body odor is unique.
openaire +2 more sources
Behavioral biometrics & continuous user authentication on mobile devices: A survey
Information Fusion, 2021Ioannis Stylios +2 more
exaly
A survey on dorsal hand vein biometrics
Pattern Recognition, 2021Wei Jia, Bob Zhang, Yang Zhao
exaly

