X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (27853) 27853
Conference Proceeding (26523) 26523
Publication (1476) 1476
Book Chapter (1145) 1145
Dissertation (1137) 1137
Magazine Article (994) 994
Trade Publication Article (553) 553
Newspaper Article (507) 507
Book / eBook (263) 263
Book Review (156) 156
Government Document (147) 147
Paper (147) 147
Newsletter (92) 92
Reference (62) 62
Standard (56) 56
Web Resource (48) 48
Report (15) 15
Microfilm (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
authentication (42901) 42901
security (9916) 9916
cryptography (7259) 7259
protocols (5546) 5546
privacy (4485) 4485
biometrics (4181) 4181
engineering, electrical & electronic (3963) 3963
computer science, information systems (3940) 3940
telecommunications (3658) 3658
computer science (3654) 3654
servers (3639) 3639
access control (3240) 3240
computer information security (3125) 3125
internet (3101) 3101
data security (2927) 2927
encryption (2911) 2911
information security (2762) 2762
authentifizierung (2609) 2609
analysis (2424) 2424
networks (2370) 2370
watermarking (2324) 2324
public key (2229) 2229
authentication protocols (2220) 2220
computer security (2219) 2219
databases (2113) 2113
algorithms (2105) 2105
protection (2072) 2072
authorization (2004) 2004
computer science, theory & methods (1902) 1902
feature extraction (1895) 1895
cloud computing (1878) 1878
wireless networks (1817) 1817
wireless sensor networks (1740) 1740
smart cards (1683) 1683
protocol (1655) 1655
robustness (1597) 1597
communication system security (1565) 1565
computer science, software engineering (1530) 1530
mobile communication (1511) 1511
passwords (1500) 1500
methods (1476) 1476
network security (1465) 1465
food science & technology (1419) 1419
index medicus (1412) 1412
identification (1397) 1397
wireless communication (1384) 1384
digital signatures (1381) 1381
usage (1314) 1314
conferences (1291) 1291
sensors (1235) 1235
user authentication (1226) 1226
images (1216) 1216
fingerprint recognition (1205) 1205
mathematical models (1201) 1201
computer science, hardware & architecture (1199) 1199
computer networks (1194) 1194
computer communication networks (1188) 1188
studies (1171) 1171
standards (1169) 1169
rfid (1166) 1166
hardware (1134) 1134
mutual authentication (1124) 1124
smart card (1123) 1123
scheme (1111) 1111
password (1106) 1106
internet of things (1072) 1072
computer architecture (1019) 1019
ip networks (1016) 1016
safety and security measures (1004) 1004
cryptographic protocols (998) 998
humans (997) 997
management (985) 985
ad hoc networks (957) 957
messages (920) 920
public key cryptography (918) 918
computer science, artificial intelligence (911) 911
research (907) 907
software (900) 900
image authentication (861) 861
computation (856) 856
radio frequency identification (856) 856
engineering (840) 840
radiofrequency identification (834) 834
mathematical analysis (828) 828
mobile computing (825) 825
data encryption (824) 824
network servers (820) 820
information technology (811) 811
educational institutions (801) 801
access protocols (800) 800
delay (791) 791
integrity (789) 789
key agreement (780) 780
verschlüsselung (772) 772
anonymity (767) 767
elliptic curve cryptography (762) 762
computer simulation (761) 761
costs (758) 758
classification (746) 746
message authentication (746) 746
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Engineering & Comp. Sci. - Stacks (48) 48
Online Resources - Online (47) 47
Collection Dvlpm't (Acquisitions) - Vendor file (31) 31
Robarts - Stacks (21) 21
UofT at Mississauga - Stacks (18) 18
UofT at Scarborough - Stacks (17) 17
Law (Bora Laskin) - Stacks (9) 9
UTL at Downsview - May be requested (9) 9
Faculty of Information - Stacks (5) 5
Gerstein Science - Stacks (5) 5
Collection Dvlpm't (Acquisitions) - Closed Orders (2) 2
Royal Ontario Museum - Stacks (2) 2
East Asian (Cheng Yu Tung) - Stacks (1) 1
Law (Bora Laskin) - Closed Orders (1) 1
Mathematical Sciences - Stacks (1) 1
Media Commons - Microtexts (1) 1
St. Michael's College (John M. Kelly) - 2nd Floor (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (52252) 52252
Chinese (2062) 2062
Japanese (865) 865
Korean (302) 302
French (53) 53
Spanish (39) 39
Portuguese (38) 38
German (26) 26
Indonesian (15) 15
Turkish (15) 15
Russian (11) 11
Lithuanian (10) 10
Czech (8) 8
Arabic (7) 7
Polish (7) 7
Italian (5) 5
Swedish (4) 4
Croatian (3) 3
Romanian (3) 3
Hungarian (2) 2
Afrikaans (1) 1
Dutch (1) 1
Latvian (1) 1
Malay (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


by Rai, H and Yadav, A
Expert Systems with Applications, ISSN 0957-4174, 02/2014, Volume 41, Issue 2, pp. 588 - 593
Iris based authentication system is essentially a pattern recognition technique that makes use of iris patterns, which are statistically unique, for the... 
Authentication
Journal Article
Journal of Chemometrics, ISSN 0886-9383, 11/2013, Volume 27, Issue 11, pp. 379 - 379
The present paper elaborates on the design of classifiers based on cross-correlation-based principal component analysis (PCA) and Sammon's nonlinear mapping... 
Authentication
Journal Article
IET Communications, ISSN 1751-8628, 11/2012, Volume 6, Issue 16, pp. 2715 - 2715
The radio frequency identification (RFID) technology is expected to play a vital role in identifying objects and serving to prevent counterfeiting and fraud.... 
Authentication
Journal Article
Journal of Computers, ISSN 1796-203X, 11/2013, Volume 8, Issue 11, pp. 2880 - 2880
The security and privacy of the tag carrier has become the bottle neck of Radio Frequency Identification (RFID) system development further. In this paper, we... 
Authentication
Journal Article
Journal of Communications, ISSN 1796-2021, 11/2013, Volume 8, Issue 11, pp. 795 - 795
Formal verification aims at providing a rigid and thorough means of evaluating the correctness of security protocols and also establishing that the protocols... 
Authentication
Journal Article
Journal of Software (Oulu), ISSN 1796-217X, 12/2013, Volume 8, Issue 12, pp. 3206 - 3206
Recently, Islam and Biswas proposed an efficient and secure ID-based remote mutual authentication with key agreement scheme. We have analyzed the security and... 
Authentication
Journal Article
ACM Transactions on Embedded Computing Systems, ISSN 1539-9087, 03/2013, Volume 12, Issue 3, pp. 1 - 26
Recent studies have demonstrated that it is feasible to perform public key cryptographic operations on resource-constrained sensor platforms. However, the... 
Authentication
Journal Article
2016, Iwata sensho. Chiiki no chūsei, ISBN 9784866029429, Volume 17, 181 pages, 2 unnumbered pages of plates
Book
Beijing Jiaotong Daxue Xuebao (Journal of Beijing Jiaotong University), ISSN 1673-0291, 10/2013, Volume 37, Issue 5, pp. 19 - 22
According to the performance problems of traditional SDKEY hardware, a kind of scheme on SDKEY-based hardware improvement is proposed, and the authentication... 
Authentication
Journal Article
2013, 2013, ISBN 9781447152293, x, 438
Biometrics-based recognition systems offer many benefits over traditional authentication approaches. However, such systems raise new challenges related to... 
Biometric identification | Data encryption (Computer science) | Security measures | Data protection | Biometrics | Legal Aspects of Computing | Computer Appl. in Social and Behavioral Sciences | Data Encryption | Computer Science | User Interfaces and Human Computer Interaction | Privacy, Right of | Computer security
Book
International Journal of Computer Applications, ISSN 0975-8887, 01/2013, Volume 83, Issue 16
  Image authentication plays a vital role in safeguarding the originality as well as helps to retain the integrity of the data. It is also used as proof in... 
Authentication
Journal Article
International Journal of Computer Applications, ISSN 0975-8887, 01/2013, Volume 83, Issue 12
  Cloud computing is a new trend of computing paradigm that provides a set of scalable resources on demand. However, it also being a target of cyber attacks... 
Authentication
Journal Article
International Journal of Computer Applications, ISSN 0975-8887, 01/2013, Volume 83, Issue 6
  In this paper we propose a multiple digital watermarking scheme using DCT and VC to achieve both image authentication and integrity. We used two watermarks... 
Authentication
Journal Article
International Journal of Computer Applications, ISSN 0975-8887, 01/2013, Volume 83, Issue 11
  A key establishment protocol allows entities to establish a common secret key to ensure secure communications over an insecure public network. This paper... 
Authentication
Journal Article
International Journal of Computer Applications, ISSN 0975-8887, 01/2013, Volume 83, Issue 12
  Vehicular network security is an important field and it is agreed that digital signature certificates are becoming the main authentication technique in this... 
Authentication
Journal Article
International Journal of Computer Applications, ISSN 0975-8887, 01/2013, Volume 83, Issue 8
  The Wireless Sensor Network (WSN) is one of the core technologies to form the future networks. As WSN consisting of several sink nodes and sensor nodes,... 
Authentication
Journal Article
Computer Engineering and Design, ISSN 1000-7024, 12/2013, Volume 34, Issue 12, pp. 4146 - 4150
In a heterogeneous network system combining a wired network adopting PKI authentication and a wireless network adopting IBE authentication, it is difficult to... 
Authentication
Journal Article
Computer Engineering and Design, ISSN 1000-7024, 11/2013, Volume 34, Issue 11, pp. 3740 - 3747
To solve the security problems in the existing smart home remote control protocol, a provably secure smart home remote agent control terminal protocol is... 
Authentication
Journal Article
Computer Engineering and Design, ISSN 1000-7024, 11/2013, Volume 34, Issue 11, pp. 3726 - 3730
Aiming at the new security problems of radio frequency identification system (RFID) which is combined with network, a new so-called two-factor authentication... 
Authentication
Journal Article
International Journal of Network Security & Its Applications, ISSN 0975-2307, 11/2013, Volume 5, Issue 6, pp. 31 - 31
Mobile phones are considered to be the most common devices in history of humankind. They have involved in financial transaction such as mobile banking and... 
Authentication
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.