Search alternatives:
use » used (Expand Search)
Showing 21 - 40 results of 3,455 for search 'use authentication', query time: 0.17s Refine Results
  1. 21
  2. 22

    Classification of Authentic and Tampered Video Using Motion Residual and Parasitic Layers by Mubbashar Saddique, Khurshid Asghar, Usama Ijaz Bajwa, Muhammad Hussain, Hatim A. Aboalsamh, Zulfiqar Habib

    Published 2020-01-01
    “…The CNN layers encode these tampering traces and are learned using transfer learning. Finally, parasitic layers classify the video clip (VC) as authentic or tampered. …”
    Get full text
    Article
  3. 23

    Authenticity in bakery products: Detection of pistachio fraud using NGS metabarcoding by Sina Rammouz, Anne Reichstein, Jochen Riehle, Ansgar Ferner, Markus Fischer, Christian Schäfers

    Published 2025-06-01
    “…Ensuring the authenticity of food ingredients is a key aspect of food safety and quality control. …”
    Get full text
    Article
  4. 24

    Evaluation of the Proposed Hand Vein Authentication System using Machine Learning by rajaa ahmed, Ziyad Tariq Mustafa Al-Ta’i

    Published 2025-04-01
    “… This paper discusses the use of a biometric system for secure authentication based on deeper exploration in hand vein patterns to derive more reliability as a good biometric trait. …”
    Get full text
    Article
  5. 25
  6. 26
  7. 27

    Heartbeat Biometrics for Remote Authentication Using Sensor Embedded Computing Devices by Md Saiful Islam

    Published 2015-06-01
    “…Biometric verification has been included in remote user authentication schemes recently. In this paper, we have proposed the use of heartbeat biometrics for its liveness property as a possible defense against spoof attacks in remote authentication. …”
    Get full text
    Article
  8. 28

    Security Enhancement of Biometric-Based Authentication Systems Using Smart Card by Hyunseok Kim

    Published 2024-01-01
    “…By addressing the security flaws inherent in existing protocols and optimizing for performance, our scheme provides a robust and efficient solution for secure remote authentication using mobile device biometrics.…”
    Get full text
    Article
  9. 29
  10. 30

    Approach and models for using distributed ledger technology to authenticate educational documents by D. A. Kachan, U. A. Vishniakou

    Published 2020-11-01
    “…The objectives of the article are to analyze problems with the authentication of educational documents, develop new structural solutions using block chain technology, consider two models, and evaluate their use for educational documents.Authentication of educational documents is carried out using state registers, which is a complex and resource-intensive process. …”
    Get full text
    Article
  11. 31

    Deepfake Image Forensics for Privacy Protection and Authenticity Using Deep Learning by Saud Sohail, Syed Muhammad Sajjad, Adeel Zafar, Zafar Iqbal, Zia Muhammad, Muhammad Kazim

    Published 2025-03-01
    “…This research focuses on the detection of deepfake images and videos for forensic analysis using deep learning techniques. It highlights the importance of preserving privacy and authenticity in digital media. …”
    Get full text
    Article
  12. 32

    Use of the MA-XRF Technique in the Authentication of Guignard’s Artwork Recovered by the RJ Civil Police by Nilton Thaumaturgo Rocha Junior, Claudia Regina Ferreira de Souza, André Rocha Pimenta, Valter de Souza Félix, Renato Pereira de Freitas

    Published 2025-07-01
    “…Elemental mapping was conducted using the portable MA-XRF system, model CRONO (Bruker), on both the authenticated and unauthenticated artworks. …”
    Get full text
    Article
  13. 33

    Classification of Authentic and Spoofed GNSS Signals Using a Calibrated Antenna Array by Michael C. Esswein, Mark L. Psiaki

    Published 2025-01-01
    “…New optimization-based methods have been developed to use measured direction-of-arrival (DoA) information in order to classify received global navigation satellite system signals into authenticated and spoofed sets and to augment that information with pseudorange information when DoA information alone is insufficient to achieve the needed classification. …”
    Get full text
    Article
  14. 34

    Feasibility Study of Location Authentication for IoT Data Using Power Grid Signatures by Mudi Zhang, Charana Sonnadara, Sahil Shah, Min Wu

    Published 2025-01-01
    “…Experiments are conducted in the State of Maryland of the United States to demonstrate the feasibility of using ENV signals for location authentication of IoT data.…”
    Get full text
    Article
  15. 35

    Security, usability, and biometric authentication scheme for electronic voting using multiple keys by Masood Ahmad, Ateeq Ur Rehman, Nighat Ayub, MD Alshehri, Muazzam A Khan, Abdul Hameed, Halil Yetgin

    Published 2020-07-01
    “…To ensure authentication of local broadcast, electronic voting authentication scheme uses one-way key chains in a well-organized way. …”
    Get full text
    Article
  16. 36
  17. 37

    Evaluating the benefits and challenges of using authentic materials in EFL context for listening purpose by Wafa Alamri

    Published 2025-08-01
    “…This study addresses the research gap in using authentic listening materials by focusing on the challenges and benefits associated with authentic materials when used in, English as a Foreign Language (EFL) contexts. …”
    Get full text
    Article
  18. 38

    Heartbeat detection and personal authentication using a 60 GHz Doppler sensor by Takuma Asano, Shintaro Izumi, Hiroshi Kawaguchi

    Published 2025-08-01
    “…This study focuses on non-contact seismocardiography using microwave Doppler sensors and aims to apply this technology for biometric authentication.MethodWe proposed a method for authenticating and identifying heartbeat signals through supervised learning using a conditional variational autoencoder (CVAE). …”
    Get full text
    Article
  19. 39

    Cancelable finger vein authentication using multidimensional scaling based on deep learning by Mohamed Hammad, Mohammed ElAffendi, Ahmed A. Abd El-Latif

    Published 2025-06-01
    “…In this work, we proposed a novel cancelable finger vein authentication system using multidimensional scaling (MDS) based on deep learning. …”
    Get full text
    Article
  20. 40

    k-times attribute-based authentication scheme using direct anonymous attestation by Xin LIU, Qiuliang XU, Bin ZHANG, Bo ZHANG

    Published 2018-12-01
    “…Moreover, in order to reduce user's calculation as much as possible, the underlying attribute-based encryption scheme was modified, and then the main decryption operations were outsourced by using the key binding technique of Green et al. The new scheme can be deployed on a trusted platform and support expressive authentication policies. …”
    Get full text
    Article