Search Results - Distributed face authentication
-
1
Authors: et al.
Contributors: et al.
Source: urn:tid:203547047
Subject Terms: Mobile licensing, Secure download, Secure storage, Distributed identity system, Distributed face authentication, Secure messaging
File Description: application/pdf
Availability: http://hdl.handle.net/10400.8/9519
-
2
Authors: et al.
Source: IEEE Access, Vol 13, Pp 89858-89873 (2025)
Subject Terms: Face authentication detection, ResNext50, BiLSTM, decision-aid, media integrity, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
3
Authors: et al.
Source: Journal of Supercomputing. Nov2025, Vol. 81 Issue 17, p1-42. 42p.
Subject Terms: *ELECTRONIC authentication, *FEDERATED learning, *HUMAN behavior models, *PRIVACY, *SECURITY management, *DISTRIBUTED computing, *SMART homes, *INTERNET of things
-
4
Authors: et al.
Source: Journal of Cybersecurity and Privacy, Vol 5, Iss 3, p 45 (2025)
Subject Terms: blockchain, identity management, federated learning, machine learning, pets, p-ABCs, Technology (General), T1-995
File Description: electronic resource
-
5
Authors: et al.
Source: 工程科学与技术, Vol 57, Pp 1-10 (2025)
Subject Terms: cyberspace security, blockchain, certificate-less, key management, hardware enhancement, parallel processing, identity authentication, Engineering (General). Civil engineering (General), TA1-2040, Hydraulic engineering, TC1-978
File Description: electronic resource
-
6
Authors: et al.
Source: ACM Transactions on Sensor Networks; Jan2025, Vol. 21 Issue 1, p1-23, 23p
Subject Terms: CONVOLUTIONAL neural networks, SMART homes, RADIO frequency, ERROR rates, RADIO technology
-
7
Authors: et al.
Source: Advances in Artificial Intelligence and Machine Learning. :693-711
-
8
-
9
Authors:
Source: Mathematics (2227-7390). Apr2025, Vol. 13 Issue 8, p1239. 34p.
Subject Terms: *6G networks, *EDGE computing, *NEXT generation networks, *ANOMALY detection (Computer security), *ACCESS control
-
10
Authors: et al.
Source: IEEE Transactions on Vehicular Technology. 74(12):18556-18571
File Description: print
-
11
Authors: et al.
Source: Proceedings 2024 Network and Distributed System Security Symposium.
-
12
Authors: et al.
Source: Computers, Materials & Continua; 2024, Vol. 79 Issue 2, p2609-2623, 15p
-
13
Authors: Díaz López, Daniel Orlando
Thesis Advisors: Gómez Mármol, Félix, Martínez Pérez, Gregorio, Universidad de Murcia. Departamento de Ingeniería de la Información y las Comunicaciones
Source: TDR (Tesis Doctorales en Red)
Subject Terms: Informática-Seguridad-Medidas, Ingeniería
File Description: application/pdf
Access URL: http://hdl.handle.net/10803/335281
-
14
Authors:
Source: IEEE Access, Vol 9, Pp 116427-116439 (2021)
Subject Terms: Face morphing, face synthesis, generative adversarial networks, image steganography, secret sharing, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
15
A distributed identity management and cross-domain authentication scheme for the Internet of Things.
Authors:
Source: Future Generation Computer Systems. Aug2025, Vol. 169, pN.PAG-N.PAG. 1p.
Subject Terms: *ALGORITHMS, INTERNET of things, LEAKAGE
-
16
Authors: et al.
Source: Future Internet. Jul2025, Vol. 17 Issue 7, p275. 35p.
Subject Terms: *Machine learning, *Electronic authentication, *Internet of things, Smart devices, Security management
-
17
Authors: et al.
Source: Sensors (14248220). Feb2023, Vol. 23 Issue 3, p1264. 34p.
Subject Terms: *MOBILE computing, *CLOUD computing, *ACCESS control, *TRUST, *BLOCKCHAINS, *RECORD stores
-
18
Alternate Title: Porównanie LDA i PCA z wykorzystaniem uwierzytelniania za pomocą koloru i twarzy. (Polish)
Authors:
Source: Przegląd Elektrotechniczny; 2024, Vol. 2024 Issue 9, p75-79, 5p
Subject Terms: COLOR space, FISHER discriminant analysis, PRINCIPAL components analysis, ERROR rates, RATE setting
Geographic Terms: LAUSANNE (Switzerland)
-
19
Authors: et al.
Source: IEEE Access, Vol 7, Pp 14186-14197 (2019)
Subject Terms: Face recognition, edge computing, privacy protection, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
20
Authors: et al.
Source: Mathematics (2227-7390). Jul2025, Vol. 13 Issue 13, p2130. 24p.
Subject Terms: *SCALABILITY, *IDENTITY management systems, *BLOCKCHAINS, *DRONE aircraft, *COMPUTER security vulnerabilities, *MILITARY airplanes
Nájsť tento článok vo Web of Science
Full Text Finder