X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (27830) 27830
Conference Proceeding (26504) 26504
Publication (1474) 1474
Book Chapter (1145) 1145
Dissertation (1137) 1137
Magazine Article (994) 994
Trade Publication Article (553) 553
Newspaper Article (506) 506
Book / eBook (260) 260
Book Review (156) 156
Government Document (147) 147
Paper (146) 146
Newsletter (92) 92
Reference (62) 62
Standard (56) 56
Web Resource (48) 48
Report (15) 15
Microfilm (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
authentication (42879) 42879
security (9903) 9903
cryptography (7245) 7245
protocols (5546) 5546
privacy (4484) 4484
biometrics (4169) 4169
engineering, electrical & electronic (3967) 3967
computer science, information systems (3939) 3939
telecommunications (3660) 3660
computer science (3645) 3645
servers (3637) 3637
access control (3234) 3234
computer information security (3129) 3129
internet (3093) 3093
data security (2924) 2924
encryption (2911) 2911
information security (2756) 2756
authentifizierung (2609) 2609
analysis (2425) 2425
networks (2369) 2369
watermarking (2324) 2324
public key (2229) 2229
authentication protocols (2218) 2218
computer security (2215) 2215
databases (2112) 2112
algorithms (2102) 2102
protection (2067) 2067
authorization (2002) 2002
computer science, theory & methods (1900) 1900
feature extraction (1893) 1893
cloud computing (1873) 1873
wireless networks (1810) 1810
wireless sensor networks (1736) 1736
smart cards (1680) 1680
protocol (1651) 1651
robustness (1596) 1596
communication system security (1565) 1565
computer science, software engineering (1528) 1528
mobile communication (1510) 1510
passwords (1498) 1498
methods (1473) 1473
network security (1462) 1462
food science & technology (1417) 1417
index medicus (1403) 1403
identification (1394) 1394
wireless communication (1385) 1385
digital signatures (1377) 1377
usage (1315) 1315
conferences (1291) 1291
sensors (1234) 1234
user authentication (1225) 1225
images (1215) 1215
fingerprint recognition (1206) 1206
mathematical models (1201) 1201
computer science, hardware & architecture (1199) 1199
computer networks (1193) 1193
computer communication networks (1188) 1188
studies (1170) 1170
standards (1166) 1166
rfid (1164) 1164
hardware (1132) 1132
mutual authentication (1123) 1123
smart card (1123) 1123
scheme (1109) 1109
password (1104) 1104
internet of things (1067) 1067
computer architecture (1017) 1017
ip networks (1016) 1016
safety and security measures (1002) 1002
humans (998) 998
cryptographic protocols (996) 996
management (987) 987
ad hoc networks (955) 955
messages (920) 920
public key cryptography (918) 918
computer science, artificial intelligence (909) 909
research (908) 908
software (898) 898
image authentication (857) 857
computation (856) 856
radio frequency identification (855) 855
engineering (839) 839
radiofrequency identification (833) 833
mathematical analysis (830) 830
data encryption (826) 826
mobile computing (822) 822
network servers (818) 818
information technology (810) 810
access protocols (799) 799
educational institutions (798) 798
delay (791) 791
integrity (790) 790
key agreement (778) 778
verschlüsselung (771) 771
anonymity (766) 766
elliptic curve cryptography (762) 762
costs (758) 758
computer simulation (757) 757
message authentication (747) 747
classification (743) 743
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Engineering & Comp. Sci. - Stacks (47) 47
Online Resources - Online (47) 47
Collection Dvlpm't (Acquisitions) - Vendor file (30) 30
Robarts - Stacks (21) 21
UofT at Mississauga - Stacks (18) 18
UofT at Scarborough - Stacks (17) 17
Law (Bora Laskin) - Stacks (9) 9
UTL at Downsview - May be requested (9) 9
Faculty of Information - Stacks (5) 5
Gerstein Science - Stacks (5) 5
Collection Dvlpm't (Acquisitions) - Closed Orders (2) 2
Royal Ontario Museum - Stacks (2) 2
East Asian (Cheng Yu Tung) - Stacks (1) 1
Law (Bora Laskin) - Closed Orders (1) 1
Mathematical Sciences - Stacks (1) 1
Media Commons - Microtexts (1) 1
St. Michael's College (John M. Kelly) - 2nd Floor (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (52212) 52212
Chinese (2063) 2063
Japanese (865) 865
Korean (300) 300
French (53) 53
Spanish (39) 39
Portuguese (38) 38
German (26) 26
Indonesian (15) 15
Turkish (15) 15
Russian (11) 11
Lithuanian (10) 10
Czech (8) 8
Arabic (7) 7
Polish (7) 7
Italian (5) 5
Swedish (4) 4
Croatian (3) 3
Romanian (3) 3
Hungarian (2) 2
Afrikaans (1) 1
Dutch (1) 1
Latvian (1) 1
Malay (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


by Rai, H and Yadav, A
Expert Systems with Applications, ISSN 0957-4174, 02/2014, Volume 41, Issue 2, pp. 588 - 593
Iris based authentication system is essentially a pattern recognition technique that makes use of iris patterns, which are statistically unique, for the... 
Authentication
Journal Article
Journal of Chemometrics, ISSN 0886-9383, 11/2013, Volume 27, Issue 11, pp. 379 - 379
The present paper elaborates on the design of classifiers based on cross-correlation-based principal component analysis (PCA) and Sammon's nonlinear mapping... 
Authentication
Journal Article
IET Communications, ISSN 1751-8628, 11/2012, Volume 6, Issue 16, pp. 2715 - 2715
The radio frequency identification (RFID) technology is expected to play a vital role in identifying objects and serving to prevent counterfeiting and fraud.... 
Authentication
Journal Article
Journal of Computers, ISSN 1796-203X, 11/2013, Volume 8, Issue 11, pp. 2880 - 2880
The security and privacy of the tag carrier has become the bottle neck of Radio Frequency Identification (RFID) system development further. In this paper, we... 
Authentication
Journal Article
Journal of Communications, ISSN 1796-2021, 11/2013, Volume 8, Issue 11, pp. 795 - 795
Formal verification aims at providing a rigid and thorough means of evaluating the correctness of security protocols and also establishing that the protocols... 
Authentication
Journal Article
Journal of Software (Oulu), ISSN 1796-217X, 12/2013, Volume 8, Issue 12, pp. 3206 - 3206
Recently, Islam and Biswas proposed an efficient and secure ID-based remote mutual authentication with key agreement scheme. We have analyzed the security and... 
Authentication
Journal Article
ACM Transactions on Embedded Computing Systems, ISSN 1539-9087, 03/2013, Volume 12, Issue 3, pp. 1 - 26
Recent studies have demonstrated that it is feasible to perform public key cryptographic operations on resource-constrained sensor platforms. However, the... 
Authentication
Journal Article
2016, Iwata sensho. Chiiki no chūsei, ISBN 9784866029429, Volume 17, 181 pages, 2 unnumbered pages of plates
Book
Beijing Jiaotong Daxue Xuebao (Journal of Beijing Jiaotong University), ISSN 1673-0291, 10/2013, Volume 37, Issue 5, pp. 19 - 22
According to the performance problems of traditional SDKEY hardware, a kind of scheme on SDKEY-based hardware improvement is proposed, and the authentication... 
Authentication
Journal Article
2013, 2013, ISBN 9781447152293, x, 438
Biometrics-based recognition systems offer many benefits over traditional authentication approaches. However, such systems raise new challenges related to... 
Biometric identification | Data encryption (Computer science) | Security measures | Data protection | Biometrics | Legal Aspects of Computing | Computer Appl. in Social and Behavioral Sciences | Data Encryption | Computer Science | User Interfaces and Human Computer Interaction | Privacy, Right of | Computer security
Book
International Journal of Computer Applications, ISSN 0975-8887, 01/2013, Volume 83, Issue 12
  Vehicular network security is an important field and it is agreed that digital signature certificates are becoming the main authentication technique in this... 
Authentication
Journal Article
International Journal of Computer Applications, ISSN 0975-8887, 01/2013, Volume 83, Issue 6
  In this paper we propose a multiple digital watermarking scheme using DCT and VC to achieve both image authentication and integrity. We used two watermarks... 
Authentication
Journal Article
International Journal of Computer Applications, ISSN 0975-8887, 01/2013, Volume 83, Issue 9
  The purpose of this project was to come out with a theoretical framework to standardize the solutions to the existing security challenges. The principal... 
Authentication
Journal Article
International Journal of Computer Applications, ISSN 0975-8887, 01/2013, Volume 83, Issue 12
  Cloud computing is a new trend of computing paradigm that provides a set of scalable resources on demand. However, it also being a target of cyber attacks... 
Authentication
Journal Article
International Journal of Computer Applications, ISSN 0975-8887, 01/2013, Volume 83, Issue 11
  A key establishment protocol allows entities to establish a common secret key to ensure secure communications over an insecure public network. This paper... 
Authentication
Journal Article
International Journal of Computer Applications, ISSN 0975-8887, 01/2013, Volume 83, Issue 8
  The Wireless Sensor Network (WSN) is one of the core technologies to form the future networks. As WSN consisting of several sink nodes and sensor nodes,... 
Authentication
Journal Article
International Journal of Computer Applications, ISSN 0975-8887, 01/2013, Volume 83, Issue 16
  Image authentication plays a vital role in safeguarding the originality as well as helps to retain the integrity of the data. It is also used as proof in... 
Authentication
Journal Article
Computer Engineering and Design, ISSN 1000-7024, 12/2013, Volume 34, Issue 12, pp. 4146 - 4150
In a heterogeneous network system combining a wired network adopting PKI authentication and a wireless network adopting IBE authentication, it is difficult to... 
Authentication
Journal Article
International Journal of Network Security & Its Applications, ISSN 0975-2307, 11/2013, Volume 5, Issue 6, pp. 1 - 1
The purpose of this paper is to present a comprehensive budget conscious security plan for smaller enterprises that lack security guidelines. The authors... 
Authentication
Journal Article
International Journal of Network Security & Its Applications, ISSN 0975-2307, 11/2013, Volume 5, Issue 6, pp. 31 - 31
Mobile phones are considered to be the most common devices in history of humankind. They have involved in financial transaction such as mobile banking and... 
Authentication
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.