X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (26466) 26466
Journal Article (21497) 21497
Book Chapter (4104) 4104
Magazine Article (1441) 1441
Newspaper Article (631) 631
Dissertation (530) 530
Book / eBook (310) 310
Trade Publication Article (214) 214
Government Document (145) 145
Paper (129) 129
Newsletter (80) 80
Book Review (64) 64
Standard (61) 61
Publication (39) 39
Reference (34) 34
Web Resource (26) 26
Report (15) 15
Transcript (3) 3
Streaming Video (2) 2
Microfilm (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
authentication (41902) 41902
science & technology (9974) 9974
security (9366) 9366
technology (8226) 8226
computer science (8028) 8028
cryptography (7211) 7211
protocols (5718) 5718
engineering (4635) 4635
privacy (4415) 4415
biometrics (4276) 4276
servers (3885) 3885
engineering, electrical & electronic (3782) 3782
computer science, information systems (3591) 3591
telecommunications (3478) 3478
access control (3410) 3410
authentifizierung (3042) 3042
computer information security (3004) 3004
encryption (2922) 2922
data security (2902) 2902
information security (2750) 2750
internet (2728) 2728
computer security (2360) 2360
public key (2299) 2299
authentication protocols (2277) 2277
watermarking (2117) 2117
authorization (2103) 2103
feature extraction (2065) 2065
cloud computing (2040) 2040
networks (2026) 2026
protection (2012) 2012
algorithms (1939) 1939
analysis (1858) 1858
wireless networks (1724) 1724
wireless sensor networks (1697) 1697
communication system security (1601) 1601
robustness (1598) 1598
passwords (1582) 1582
smart cards (1559) 1559
physical sciences (1545) 1545
network security (1533) 1533
mobile communication (1484) 1484
wireless communication (1421) 1421
internet of things (1409) 1409
digital signatures (1406) 1406
life sciences & biomedicine (1387) 1387
methods (1345) 1345
conferences (1338) 1338
computer science, software engineering (1307) 1307
computer science, theory & methods (1307) 1307
password (1272) 1272
fingerprint recognition (1263) 1263
sensors (1223) 1223
computer networks (1221) 1221
studies (1205) 1205
hardware (1160) 1160
usage (1145) 1145
smart card (1138) 1138
mutual authentication (1133) 1133
rfid (1124) 1124
user authentication (1122) 1122
mathematical models (1112) 1112
computer architecture (1095) 1095
protocol (1057) 1057
computer science, hardware & architecture (1055) 1055
ip networks (1032) 1032
humans (993) 993
cryptographic protocols (953) 953
safety and security measures (934) 934
software (924) 924
ad hoc networks (914) 914
public key cryptography (912) 912
messages (903) 903
chemistry (888) 888
radiofrequency identification (846) 846
mobile computing (836) 836
information technology (828) 828
network servers (821) 821
integrity (817) 817
authentication protocol (816) 816
access protocols (803) 803
elliptic curve cryptography (802) 802
management (796) 796
educational institutions (795) 795
message authentication (791) 791
research (791) 791
computation (790) 790
delay (778) 778
radio frequency identification (774) 774
verschlüsselung (769) 769
monitoring (758) 758
costs (756) 756
face recognition (756) 756
computer simulation (755) 755
mathematical analysis (755) 755
computer communication networks (753) 753
image authentication (751) 751
mobile handsets (732) 732
testing (715) 715
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (59) 59
Engineering & Comp. Sci. - Stacks (49) 49
Collection Dvlpm't (Acquisitions) - Vendor file (29) 29
Robarts - Stacks (25) 25
UofT at Mississauga - Stacks (18) 18
UofT at Scarborough - Stacks (18) 18
UTL at Downsview - May be requested (9) 9
Law (Bora Laskin) - Stacks (7) 7
Faculty of Information - Stacks (5) 5
Gerstein Science - Stacks (5) 5
Collection Dvlpm't (Acquisitions) - Closed Orders (2) 2
Royal Ontario Museum - Stacks (2) 2
East Asian (Cheng Yu Tung) - Stacks (1) 1
Law (Bora Laskin) - Closed Orders (1) 1
Mathematical Sciences - Stacks (1) 1
Media Commons - Microtexts (1) 1
St. Michael's College (John M. Kelly) - 2nd Floor (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (53289) 53289
Chinese (1613) 1613
Japanese (963) 963
Korean (321) 321
Czech (68) 68
Portuguese (60) 60
French (56) 56
German (52) 52
Spanish (39) 39
Russian (20) 20
Turkish (14) 14
Arabic (13) 13
Indonesian (12) 12
Swedish (11) 11
Lithuanian (8) 8
Polish (6) 6
Italian (5) 5
Croatian (4) 4
Persian (4) 4
Hungarian (3) 3
Romanian (3) 3
Slovak (3) 3
Norwegian (2) 2
Serbian (2) 2
Ukrainian (2) 2
Afrikaans (1) 1
Dutch (1) 1
Latvian (1) 1
Malay (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2013, ISBN 9781447152293, x, 438
Biometrics-based recognition systems offer many benefits over traditional authentication approaches. However, such systems raise new challenges related to... 
Biometric identification | Data encryption (Computer science) | Security measures | Data protection | Privacy, Right of | Computer security
Book
2016, Iwata sensho. Chiiki no chūsei, ISBN 9784866029429, Volume 17, 181 pages, 2 unnumbered pages of plates
Book
IEEE Transactions on Industrial Informatics, ISSN 1551-3203, 05/2020, Volume 16, Issue 5, pp. 3606 - 3615
The Internet of Things (IoT) or the cyber-physical system (CPS) is the network of connected devices, things, and people that collect and exchange information... 
Authorization | Protocols | self-enforcing authentication | Authentication | identity spoofing | Servers | Informatics | Next generation networking | password-based authentication | session-initiation-protocol (SIP) authentication | Password | Computer Science
Journal Article
Book
Pattern recognition letters, ISSN 0167-8655, 10/2018, Volume 113, pp. 83 - 92
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 11/2015, Volume 48, Issue 2, pp. 1 - 42
Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of an Integrated Circuit (IC). Their input-output behavior serves as a... 
Physically unclonable function | entity authentication | lightweight | Computer Science, Theory & Methods | Technology | Computer Science | Science & Technology | Data encryption | Code breaking | Authentication | Methods | Studies | Integrated circuits | Input output | Manufacturing | Authentication protocols
Journal Article
Computers & security, ISSN 0167-4048, 09/2018, Volume 78, pp. 174 - 186
This paper presents TapMeIn, an eyes-free, two-factor authentication method for smartwatches. It allows users to tap a memorable melody (tap-password) of their... 
Usable security | Biometrics | Rhythm-based authentication | Shoulder surfing | Tap-based authentication | Smartwatch | Biometry | Touch screens | Personal identification numbers | Authentication | Passwords | Authentication protocols | Smartwatches
Journal Article
Computers & security, ISSN 0167-4048, 02/2015, Volume 48, Issue C, pp. 150 - 166
User authentication over the network builds a foundation of trust within large-scale computer networks. The collection of this network authentication activity... 
Network authentication | Graph analysis | User authentication | Enterprise security | Cyber security | Intrusion detection | Studies | Computer networks | User interface | User behavior | Authentication protocols | Intrusion detection systems | Networks | Intrusion | Construction | Foundations | Authentication | Classification | Collection | Graphs | Computer information security
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 08/2012, Volume 44, Issue 4, pp. 1 - 41
Starting around 1999, a great many graphical password schemes have been proposed as alternatives to text-based password authentication. We provide a... 
graphical passwords | usable security | Authentication | Usable security | Graphical passwords | Computer Science, Theory & Methods | Technology | Computer Science | Science & Technology | Management | Research | Data security | Security management | Access control (Computers) | Studies | User interface | Research methodology | Passwords | Authentication protocols
Journal Article
International journal of electronic governance, ISSN 1742-7509, 01/2019, Volume 11, Issue 3-4, pp. 386 - 400
The eIDAS regulation on electronic identification and trust services for electronic transactions in the European single market, provides a legal framework to... 
Authentication
Journal Article