-
21
Untargeted metabolomics profiling for the geographical authentication of traditional pempek using high-resolution orbitrap mass spectrometry
Published 2025-03-01Subjects: Get full text
Article -
22
Efficient Authentication Mechanism For Defending Against Reflection-Based Attacks on Domain Name System
Published 2020-06-01Subjects: “…DNS, Reflection/Amplification attacks, Amplification factor, CHAP, Source Authentication.…”
Get full text
Article -
23
Navigating the Challenges and Opportunities of Securing Internet of Autonomous Vehicles With Lightweight Authentication
Published 2025-01-01Subjects: “…Lightweight authentication…”
Get full text
Article -
24
A Verifiable Discrete Trust Model (VDTM) Using Congruent Federated Learning (CFL) for Social Internet of Vehicles
Published 2024-01-01Subjects: Get full text
Article -
25
EXPANDING NASA FUNCTIONALITY USING ITS API AND IMPROVING INTEREST AMONG PEOPLE IN SPACE EXPLORATION
Published 2024-12-01Subjects: Get full text
Article -
26
FractalNet-based key generation for authentication in Voice over IP using Blockchain
Published 2025-03-01Subjects: Get full text
Article -
27
Biometric Fusion for Enhanced Authentication in Cloud Computing Environments
Published 2024-03-01Subjects: Get full text
Article -
28
A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments
Published 2025-01-01Subjects: Get full text
Article -
29
Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats
Published 2024-12-01Subjects: Get full text
Article -
30
Secure channel estimation model for cognitive radio network physical layer security using two-level shared key authentication
Published 2025-01-01Subjects: Get full text
Article -
31
The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database
Published 2016-03-01Subjects: Get full text
Article -
32
Until you have something to lose! Loss aversion and two-factor authentication adoption
Published 2025-01-01Subjects: “…Two-factor authentication…”
Get full text
Article -
33
A Novel Authentication Management for the Data Security of Smart Grid
Published 2024-01-01Subjects: Get full text
Article -
34
Prototype Sistem Keamanan Mobil dengan Menggunakan Quick Response Code Berbasis Android dan Arduino
Published 2019-05-01Subjects: Get full text
Article -
35
Copula-Driven Learning Techniques for Physical Layer Authentication Using Multimodal Data
Published 2025-01-01Subjects: Get full text
Article -
36
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01Subjects: “…User authentication…”
Get full text
Article -
37
Secure software development: leveraging application call graphs to detect security vulnerabilities
Published 2025-01-01Subjects: Get full text
Article -
38
A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression
Published 2025-01-01Subjects: Get full text
Article -
39
Demystifying authenticity: Behavioral and neurophysiological signatures of self-positivity for authentic and presented selves
Published 2025-02-01Subjects: “…Authenticity…”
Get full text
Article -
40
Copy-Move Forgery Verification in Images Using Local Feature Extractors and Optimized Classifiers
Published 2023-09-01Subjects: Get full text
Article