Search Results - Fingerprint Hashcode
-
1
Authors:
Source: International Journal of Management, Technology, and Social Sciences. :116-126
Subject Terms: Fingerprint image, Fingerprint hashcode, Authentication, Multifactor authentication model, Euclidean distance, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 16. Peace & justice
-
2
Authors:
Source: Social Science Research Network.
Subject Terms: Fingerprint Image, Fingerprint Hashcode, Authentication, Multifactor Authentication Model, Freeman Chain Code & MD5 Algorithm, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 16. Peace & justice
-
3
Authors:
Subject Terms: Fingerprint Image, Fingerprint Hashcode, Authentication, Multifactor Authentication Model, Freeman Chain Code & MD5 Algorithm
Relation: https://zenodo.org/records/1144555; oai:zenodo.org:1144555; https://doi.org/10.5281/zenodo.1144555
-
4
Authors:
Subject Terms: Fingerprint image, Fingerprint hashcode, Authentication, Multifactor authentication model, Euclidean distance
Relation: https://zenodo.org/records/1133545; oai:zenodo.org:1133545; https://doi.org/10.5281/zenodo.1133545
-
5
Authors:
Source: EURASIP Journal on Information Security; 4/1/2025, Vol. 2025 Issue 1, p1-15, 15p
-
6
Authors:
Contributors:
Subject Terms: literature, hashcode, hash total, hash result, imprint, checksum, compression, compressed encoding, seal, authenticator, authentication tag, fingerprint, test key, condensation, Message Integrity Code (MIC, message digest, etc [21]. They are an important block
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.2317; http://www.mat.usm.my/research/onlineproc/cs07.pdf
-
7
Authors: et al.
Source: Visual Computer; Mar2022, Vol. 38 Issue 3, p821-835, 15p
Subject Terms: GENERATIVE adversarial networks, BIOMETRY, MASQUERADES, HUMAN facial recognition software
-
8
Authors:
Source: Information Security Journal: A Global Perspective; 2024, Vol. 33 Issue 3, p307-331, 25p
Subject Terms: BIOMETRIC identification, CLINICAL decision support systems, BIOMETRY, RIGHT of privacy, PRIVACY, DATA privacy
-
9
Authors: et al.
Source: 2015 World Symposium on Computer Networks & Information Security (WSCNIS); 2015, p1-4, 4p
-
10
Authors: et al.
Source: ACM Computing Surveys; Mar2026, Vol. 58 Issue 3, p1-47, 47p
Subject Terms: INTERNET of things, PENETRATION testing (Computer security), BIBLIOGRAPHY
-
11
Authors:
Source: Multimedia Tools & Applications; Sep2012, Vol. 60 Issue 2, p371-387, 17p
Subject Terms: AUDIO communication, DEMODULATION, COPYING, COMPUTER file sharing, ALGORITHMS
-
12
Authors: et al.
Source: BMC Bioinformatics; 2010, Vol. 11, p362-368, 7p
-
13
Authors:
Source: Journal of Computer-Aided Molecular Design; Sep1997, Vol. 11 Issue 5, p447-452, 6p
-
14
Authors: et al.
Source: Cybersecurity (2523-3246); 2/2/2023, Vol. 6 Issue 1, p1-20, 20p
-
15
-
16
Authors:
Source: International Journal of Electrical & Computer Engineering (2088-8708); Oct2018 (Part I), Vol. 8 Issue 5, p3221-3231, 11p
Subject Terms: REDUNDANCY in engineering, EVICTION, BINARY codes, DATA reduction, DATA warehousing, VIDEOS, TWO-dimensional bar codes
-
17
-
18
Authors: et al.
Source: Sensors (14248220); Sep2023, Vol. 23 Issue 18, p7775, 14p
Subject Terms: PERFORMANCE standards, NUMBER theory, KALMAN filtering
-
19
Authors:
Source: Altex; 2017, Vol. 34 Issue 4, p459-478, 20p
-
20
Authors: Zhao, Shushan
Source: Journal of Network & Information Security; 2023, Vol. 11 Issue 1, p20-27, 8p
Nájsť tento článok vo Web of Science
Full Text Finder