X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (26508) 26508
Journal Article (21742) 21742
Book Chapter (3862) 3862
Magazine Article (1438) 1438
Newspaper Article (622) 622
Dissertation (530) 530
Book / eBook (307) 307
Trade Publication Article (214) 214
Government Document (145) 145
Paper (129) 129
Newsletter (80) 80
Book Review (64) 64
Standard (61) 61
Publication (39) 39
Reference (34) 34
Web Resource (26) 26
Report (15) 15
Transcript (3) 3
Streaming Video (2) 2
Microfilm (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
authentication (41816) 41816
science & technology (9884) 9884
security (9311) 9311
technology (8138) 8138
computer science (7928) 7928
cryptography (7193) 7193
protocols (5695) 5695
engineering (4621) 4621
privacy (4402) 4402
biometrics (4265) 4265
servers (3869) 3869
engineering, electrical & electronic (3770) 3770
computer science, information systems (3529) 3529
telecommunications (3468) 3468
access control (3390) 3390
authentifizierung (3004) 3004
computer information security (2986) 2986
encryption (2907) 2907
data security (2898) 2898
information security (2746) 2746
internet (2706) 2706
public key (2296) 2296
authentication protocols (2232) 2232
computer security (2223) 2223
watermarking (2113) 2113
authorization (2098) 2098
feature extraction (2053) 2053
cloud computing (2041) 2041
networks (2014) 2014
protection (2004) 2004
algorithms (1909) 1909
analysis (1833) 1833
wireless networks (1708) 1708
wireless sensor networks (1691) 1691
communication system security (1599) 1599
robustness (1592) 1592
passwords (1559) 1559
smart cards (1553) 1553
physical sciences (1542) 1542
mobile communication (1483) 1483
network security (1459) 1459
wireless communication (1417) 1417
internet of things (1399) 1399
digital signatures (1395) 1395
life sciences & biomedicine (1385) 1385
conferences (1336) 1336
methods (1326) 1326
computer science, theory & methods (1290) 1290
computer science, software engineering (1279) 1279
password (1266) 1266
fingerprint recognition (1260) 1260
sensors (1211) 1211
computer networks (1203) 1203
hardware (1150) 1150
usage (1135) 1135
smart card (1133) 1133
mutual authentication (1126) 1126
rfid (1121) 1121
user authentication (1118) 1118
mathematical models (1095) 1095
computer architecture (1081) 1081
studies (1033) 1033
ip networks (1031) 1031
computer science, hardware & architecture (1027) 1027
protocol (1018) 1018
humans (990) 990
cryptographic protocols (952) 952
safety and security measures (928) 928
public key cryptography (910) 910
ad hoc networks (907) 907
software (900) 900
messages (896) 896
chemistry (888) 888
radiofrequency identification (844) 844
mobile computing (831) 831
information technology (819) 819
network servers (819) 819
integrity (811) 811
access protocols (803) 803
elliptic curve cryptography (799) 799
authentication protocol (794) 794
educational institutions (794) 794
management (793) 793
message authentication (785) 785
computation (784) 784
radio frequency identification (783) 783
research (781) 781
delay (777) 777
verschlüsselung (761) 761
monitoring (757) 757
costs (755) 755
face recognition (755) 755
computer communication networks (752) 752
mathematical analysis (750) 750
computer simulation (747) 747
image authentication (746) 746
mobile handsets (731) 731
testing (713) 713
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (59) 59
Engineering & Comp. Sci. - Stacks (49) 49
Collection Dvlpm't (Acquisitions) - Vendor file (29) 29
Robarts - Stacks (25) 25
UofT at Mississauga - Stacks (18) 18
UofT at Scarborough - Stacks (18) 18
UTL at Downsview - May be requested (9) 9
Law (Bora Laskin) - Stacks (7) 7
Faculty of Information - Stacks (5) 5
Gerstein Science - Stacks (5) 5
Collection Dvlpm't (Acquisitions) - Closed Orders (2) 2
Royal Ontario Museum - Stacks (2) 2
East Asian (Cheng Yu Tung) - Stacks (1) 1
Law (Bora Laskin) - Closed Orders (1) 1
Mathematical Sciences - Stacks (1) 1
Media Commons - Microtexts (1) 1
St. Michael's College (John M. Kelly) - 2nd Floor (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (53311) 53311
Chinese (1604) 1604
Japanese (961) 961
Korean (320) 320
Czech (68) 68
Portuguese (60) 60
French (56) 56
German (52) 52
Spanish (39) 39
Russian (20) 20
Turkish (14) 14
Arabic (13) 13
Indonesian (12) 12
Swedish (11) 11
Lithuanian (8) 8
Polish (6) 6
Italian (5) 5
Croatian (4) 4
Persian (4) 4
Hungarian (3) 3
Romanian (3) 3
Slovak (3) 3
Norwegian (2) 2
Serbian (2) 2
Ukrainian (2) 2
Afrikaans (1) 1
Dutch (1) 1
Latvian (1) 1
Malay (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2013, ISBN 9781447152293, x, 438
Biometrics-based recognition systems offer many benefits over traditional authentication approaches. However, such systems raise new challenges related to... 
Biometric identification | Data encryption (Computer science) | Security measures | Data protection | Privacy, Right of | Computer security
Book
2016, Iwata sensho. Chiiki no chūsei, ISBN 9784866029429, Volume 17, 181 pages, 2 unnumbered pages of plates
Book
IEEE Transactions on Industrial Informatics, ISSN 1551-3203, 05/2020, Volume 16, Issue 5, pp. 3606 - 3615
The Internet of Things (IoT) or the cyber-physical system (CPS) is the network of connected devices, things, and people that collect and exchange information... 
Authorization | Protocols | self-enforcing authentication | Authentication | identity spoofing | Servers | Informatics | Next generation networking | password-based authentication | session-initiation-protocol (SIP) authentication | Password | Computer Science
Journal Article
Book
International journal of electronic governance, ISSN 1742-7509, 01/2019, Volume 11, Issue 3-4, pp. 386 - 400
The eIDAS regulation on electronic identification and trust services for electronic transactions in the European single market, provides a legal framework to... 
Authentication
Journal Article
Pattern recognition letters, ISSN 0167-8655, 10/2018, Volume 113, pp. 83 - 92
•We design a system to authenticate online students continuously and transparently.•We design a device/interaction-agnostic biometric system for student... 
Student's identity verification | Student authentication | Device/interaction-agnosticism | Multi-biometric system | Continuous authentication | Transparent authentication | Computer Science, Artificial Intelligence | Technology | Computer Science | Science & Technology | Online education
Journal Article
International journal of communication systems, ISSN 1074-5351, 03/2017, Volume 30, Issue 4, pp. e3019 - n/a
Summary Ubiquitous networks provide roaming service for mobile nodes enabling them to use the services extended by their home networks in a foreign network. A... 
roaming service | anonymity | password‐based authentication | ubiquitous networks | provable security | password-based authentication | Data security | Safety and security measures | Consumption | Networks | Lightweight | Authentication | Weight reduction | Robustness | Computational efficiency | Security
Journal Article
2017, ISBN 9781498737647, xxiv, 402 pages
Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a... 
Biometric identification | Data Preparation & Mining | Machine Learning | IT Security | Crime Prevention
Book
IEEE transactions on intelligent transportation systems, ISSN 1558-0016, 07/2018, Volume 19, Issue 7, pp. 2204 - 2220
Journal Article
17.