X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (215) 215
Conference Proceeding (109) 109
Book Chapter (44) 44
Newspaper Article (39) 39
Publication (16) 16
Standard (10) 10
Book / eBook (7) 7
Dissertation (5) 5
Magazine Article (5) 5
Government Document (2) 2
Book Review (1) 1
Journal / eJournal (1) 1
Report (1) 1
Trade Publication Article (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
authentication (82) 82
security (56) 56
algorithms (53) 53
telecommunications (52) 52
critical path (47) 47
computer science, information systems (45) 45
computer science (41) 41
engineering, electrical & electronic (41) 41
computer communication networks (39) 39
wireless networks (37) 37
cryptography (35) 35
analysis (34) 34
routing (34) 34
computer networks (28) 28
networks (28) 28
computer science, theory & methods (26) 26
engineering (25) 25
privacy (25) 25
patents (24) 24
communications engineering, networks (22) 22
software (22) 22
computer simulation (21) 21
protocol (21) 21
sensors (21) 21
market positioning (20) 20
methods (20) 20
shortest-path problems (20) 20
wireless sensor networks (20) 20
computer science, artificial intelligence (18) 18
internet (18) 18
encryption (17) 17
management (17) 17
protocols (17) 17
research (17) 17
studies (17) 17
usage (17) 17
computer security (16) 16
quality of service (16) 16
trusted path (16) 16
ad hoc networks (15) 15
computer science, software engineering (15) 15
authentifizierung (14) 14
communications networks (14) 14
computer science, hardware & architecture (14) 14
hardware (14) 14
optimization (13) 13
transistors (13) 13
confidentiality (12) 12
mac (12) 12
measurement (12) 12
qos (12) 12
access control (11) 11
data security (11) 11
delay (11) 11
index medicus (11) 11
network management (11) 11
operating systems (11) 11
physical layer (11) 11
wireless lan (11) 11
2.4 ghz (10) 10
3650 mhz (10) 10
4.9 ghz (10) 10
5 ghz (10) 10
5.9 ghz (10) 10
advanced encryption standard (10) 10
aes (10) 10
carrier sense multiple access/collision avoidance (10) 10
ccmp (10) 10
channel switching (10) 10
computation (10) 10
computer network protocols (10) 10
csma/ca (10) 10
dfs (10) 10
direct link (10) 10
dynamic frequency selection (10) 10
e911 (10) 10
emergency alert system (10) 10
emergency services (10) 10
energy consumption (10) 10
forwarding (10) 10
generic advertisement service (10) 10
high throughput (10) 10
ieee 802.11 (10) 10
ieee standards (10) 10
information security (10) 10
integrated circuits (10) 10
internet of things (10) 10
interworking (10) 10
interworking with external networks (10) 10
lan (10) 10
local area network (10) 10
mathematical analysis (10) 10
mathematical models (10) 10
media-independent handover (10) 10
medium access control (10) 10
medium access controller (10) 10
mesh (10) 10
mih (10) 10
mimo (10) 10
mimo-ofdm (10) 10
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Gerstein Science - Stacks (2) 2
Robarts - Stacks (2) 2
UofT at Scarborough - Stacks (2) 2
Baycrest Hospital - Stacks (1) 1
Collection Dvlpm't (Acquisitions) - Closed Orders (1) 1
Engineering & Comp. Sci. - Stacks (1) 1
Humber River Regional Hospital - Church Stacks (1) 1
Trinity College (John W Graham) - Stacks (1) 1
UofT at Mississauga - Stacks (1) 1
Victoria University E.J. Pratt - Stacks (1) 1
West Park Healthcare Centre - Stacks (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Pattern Recognition Letters, ISSN 0167-8655, 12/2016, Volume 84, pp. 272 - 283
•Critical survey including current challenges and future directions for using gaze analysis on biometric human authentication.•Extensive evaluation of existing... 
Performance evaluation | GANT | Eye movements | Gaze analysis | Uncontrolled settings | Active and dynamic biometrics | Gaze scan paths | HCI | Identity management | RECOGNITION | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | Surveys | Biometry
Journal Article
2014 IEEE 28th International Conference on Advanced Information Networking and Applications, ISSN 1550-445X, 05/2014, pp. 245 - 252
In an RFID-enabled supply chain, where items are outfitted with RFID tags, path authentication based on tag enables the destination checkpoints to validate the... 
Privacy | Protocols | Arithmetic circuit | Supply chains | Homomorphic MAC | Authentication | Logic gates | Path Authentication | Mutual Authentication | Polynomials
Conference Proceeding
PATTERN RECOGNITION LETTERS, ISSN 0167-8655, 12/2016, Volume 84, pp. 272 - 283
This paper addresses the active and dynamic nature of biometrics, in general, and gaze analysis, in particular, including motivation and background. The paper... 
Performance evaluation | GANT | RECOGNITION | MECHANISM | Eye movements | Gaze analysis | IDENTIFICATION | Active and dynamic biometrics | Gaze scan paths | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | HCI | Identity management | Uncontrolled settings
Journal Article
Security and Communication Networks, ISSN 1939-0114, 11/2015, Volume 8, Issue 17, pp. 3002 - 3014
Because of the lack of mechanism to verify a route's path authorization, border gateway protocol (BGP) has been disrupted by route hijacking for decades.... 
path authorization | secure routing | BGP | inter‐domain routing | Inter-domain routing | Path authorization | Secure routing | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | inter-domain routing | Aggregates | Authentication | Clusters | Computer networks | Internet | Security | Cryptography | Routing (telecommunications)
Journal Article
IEEE Access, ISSN 2169-3536, 2018, Volume 6, pp. 40735 - 40746
With the rise of crowdsourcing economies, the home delivery business is now undergoing rapid development. The authentication schemes that are currently used in... 
Crowdsourcing | Kerberos | Protocols | Authentication | cross-realm | home delivery | ordering platform | Servers | Cryptography | Business | authentication path | Home delivery | Authentication path | Cross-realm | Ordering platform | crowdsourcing | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
Journal of Near Infrared Spectroscopy, ISSN 0967-0335, 2/2019, Volume 27, Issue 1, pp. 65 - 74
In this work the feasibility of near infrared spectroscopy was evaluated combined with chemometric approaches, as a tool for the botanical origin prediction of... 
Honey | near infrared spectroscopy | botanical origin | support vector machine | variable importance in projection | canonical discriminant analysis | PROFILES | PERFORMANCE | CLASSIFICATION | QUALITY-CONTROL | MONOFLORAL HONEYS | FLORAL ORIGIN | FEATURE-SELECTION | SPECTROSCOPY | DISCRIMINATION | CHEMISTRY, APPLIED
Journal Article
IET Communications, ISSN 1751-8628, 11/2016, Volume 10, Issue 17, pp. 2308 - 2314
Journal Article
IEEE Security & Privacy, ISSN 1540-7993, 09/2014, Volume 12, Issue 5, pp. 68 - 77
Everyone is concerned about Internet security, yet most traffic isn't cryptographically protected. The typical justification is that most attackers are off... 
DNS cache poisoning | Protocols | security | challenge-response defenses | off-path attacks | Ports (Computers) | Internet | Cryptography | IP networks | TCP injections | Computer crime | Computer security | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INFORMATION SYSTEMS | Illusions | Traffic flow | TCP (protocol) | Scripts | Traffic engineering | Foils | Security
Journal Article
Computational Intelligence, ISSN 0824-7935, 05/2018, Volume 34, Issue 2, pp. 582 - 602
Journal Article
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2019, Volume 842, pp. 17 - 27
Conference Proceeding
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2019, Volume 842, pp. 28 - 37
Conference Proceeding
Journal of Computational and Theoretical Nanoscience, ISSN 1546-1955, 01/2015, Volume 12, Issue 12, pp. 5479 - 5485
Security is a major issue in ad hoc networks. Due to high mobility of nodes, the network partition occurs that leads to network unavailability. The nodes are... 
Authenticated multipath routing | Trust count value of node and path | Ad hoc network | Data integrity etc | Signature generation and verification scheme | Trust model | Networks | Three phase | Authentication | Ad hoc networks | Security | Information dissemination | Counting | Integrity
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 10060, pp. 255 - 270
Conference Proceeding
ACM Transactions on Computer Systems (TOCS), ISSN 0734-2071, 11/1992, Volume 10, Issue 4, pp. 265 - 310
Journal Article
International Review on Computers and Software, ISSN 1828-6003, 2016, Volume 11, Issue 1, pp. 56 - 63
This paper proposes reusable data-path architecture for lightweight cryptography algorithms, reusing some similar hardware components for both encryption and... 
Reusable data path architecture | FPGA | Lightweight cryptography | ETM | Algorithms | Reuse | Architecture (computers) | Photons | Hardware | Encryption | Proposals | Field programmable gate arrays
Journal Article
Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, 12/2015, Volume 6, Issue 6, pp. 721 - 731
Journal Article
International Journal of Advanced Networking and Applications, ISSN 0975-0290, 05/2018, Volume 9, Issue 6, pp. 3623 - 3631
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the cloud. Present, in every organization has... 
Shortest-path problems | Network security | Packets (communication) | Design | Embedded systems | Assaults | Wireless networks | Customer services | Third party | Utility computing | Software | Computer centers | Internet | Protocol (computers) | Protocol | Computer security
Journal Article
by Ning, HS and Liu, H and Liu, Q and Ji, GL
JOURNAL OF UNIVERSAL COMPUTER SCIENCE, ISSN 0948-695X, 2012, Volume 18, Issue 9, pp. 1112 - 1131
The Internet of Things (IoT) is emerging as an attractive paradigm, and several IoT models and related security issues have received widespread attentions. In... 
directed path | COMPUTER SCIENCE, SOFTWARE ENGINEERING | Internet of things | security | STANDARDS | COMPUTER SCIENCE, THEORY & METHODS | authentication protocol | WIRELESS SENSOR NETWORKS | ARCHITECTURES
Journal Article
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.