Suchergebnisse - Fingerprint Hashcode~
-
1
Autoren:
Quelle: International Journal of Management, Technology, and Social Sciences. :116-126
Schlagwörter: Fingerprint image, Fingerprint hashcode, Authentication, Multifactor authentication model, Euclidean distance, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 16. Peace & justice
-
2
Autoren:
Quelle: Social Science Research Network.
Schlagwörter: Fingerprint Image, Fingerprint Hashcode, Authentication, Multifactor Authentication Model, Freeman Chain Code & MD5 Algorithm, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 16. Peace & justice
-
3
Autoren:
Schlagwörter: Fingerprint Image, Fingerprint Hashcode, Authentication, Multifactor Authentication Model, Freeman Chain Code & MD5 Algorithm
Relation: https://zenodo.org/records/1144555; oai:zenodo.org:1144555; https://doi.org/10.5281/zenodo.1144555
-
4
Autoren:
Schlagwörter: Fingerprint image, Fingerprint hashcode, Authentication, Multifactor authentication model, Euclidean distance
Relation: https://zenodo.org/records/1133545; oai:zenodo.org:1133545; https://doi.org/10.5281/zenodo.1133545
-
5
Autoren:
Quelle: EURASIP Journal on Information Security; 4/1/2025, Vol. 2025 Issue 1, p1-15, 15p
-
6
Autoren:
Weitere Verfasser:
Schlagwörter: literature, hashcode, hash total, hash result, imprint, checksum, compression, compressed encoding, seal, authenticator, authentication tag, fingerprint, test key, condensation, Message Integrity Code (MIC, message digest, etc [21]. They are an important block
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.2317; http://www.mat.usm.my/research/onlineproc/cs07.pdf
-
7
Autoren: et al.
Quelle: Visual Computer; Mar2022, Vol. 38 Issue 3, p821-835, 15p
-
8
Autoren:
Quelle: Information Security Journal: A Global Perspective; 2024, Vol. 33 Issue 3, p307-331, 25p
-
9
Autoren: et al.
Quelle: 2015 World Symposium on Computer Networks & Information Security (WSCNIS); 2015, p1-4, 4p
-
10
Autoren: et al.
Quelle: ACM Computing Surveys; Mar2026, Vol. 58 Issue 3, p1-47, 47p
Schlagwörter: INTERNET of things, PENETRATION testing (Computer security), BIBLIOGRAPHY
-
11
Autoren:
Quelle: Multimedia Tools & Applications; Sep2012, Vol. 60 Issue 2, p371-387, 17p
Schlagwörter: AUDIO communication, DEMODULATION, COPYING, COMPUTER file sharing, ALGORITHMS
-
12
Autoren: et al.
Quelle: BMC Bioinformatics; 2010, Vol. 11, p362-368, 7p
-
13
Autoren:
Quelle: Journal of Computer-Aided Molecular Design; Sep1997, Vol. 11 Issue 5, p447-452, 6p
-
14
Autoren: et al.
Quelle: Cybersecurity (2523-3246); 2/2/2023, Vol. 6 Issue 1, p1-20, 20p
-
15
-
16
Autoren:
Quelle: International Journal of Electrical & Computer Engineering (2088-8708); Oct2018 (Part I), Vol. 8 Issue 5, p3221-3231, 11p
-
17
-
18
Autoren: et al.
Quelle: Sensors (14248220); Sep2023, Vol. 23 Issue 18, p7775, 14p
Schlagwörter: PERFORMANCE standards, NUMBER theory, KALMAN filtering
-
19
Autoren:
Quelle: Altex; 2017, Vol. 34 Issue 4, p459-478, 20p
-
20
Autoren: Zhao, Shushan
Quelle: Journal of Network & Information Security; 2023, Vol. 11 Issue 1, p20-27, 8p
Nájsť tento článok vo Web of Science
Full Text Finder