Showing 1 - 20 results of 3,455 for search 'used authentication', query time: 0.11s Refine Results
  1. 1
  2. 2

    THE AUTHENTICATION PROCESS USING GRAPHICAL PASSWORDS by Sergei N. Davydov, Michael Ya. Kleptsov, Larisa V. Lyubimova

    Published 2016-05-01
    “…In this article the authors review the using of graphical passwords for authentication. …”
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    The use of authentic video materials in language teaching by Elena V. Revina

    Published 2015-11-01
    “…The article deals with using of authentic materials in the classroom which are necessitated by modern society. …”
    Get full text
    Article
  6. 6
  7. 7

    Authentication of data hiding using co-occurrence matrix by Melad saeed, Ghada thanoon

    Published 2012-07-01
    “…This is done through utilizing the capabilities and features that the process of image texture analysis offers, using the co-occurrence matrix. The message authenticity is verified by comparing the co-occurrence matrices before sending and after receiving in order to assure non infiltration.             …”
    Get full text
    Article
  8. 8

    Authentication of vegetable oils using isotope mass spectrometry by A. L. Panasyuk, D. A. Sviridov, A. A. Shilkin

    Published 2023-01-01
    “…To date,  one of the most  informative methods for assessing the authenticity of plant raw materials is the method of isotope mass spectrometry. …”
    Get full text
    Article
  9. 9

    Portal authentication HTTP redirection using netfilter NFQUEUE by Huan-jie ZHANG, Yu-liang XIA

    Published 2014-10-01
    “…When using portal for user authentication,unauthorized user's HTTP access should be redirected to portal login page to help user do authentication.Using netfilter NFQUEUE target send unauthorized user TCP port 80 packets to user-space program redir_http.Redir_http will send IP reply packets to user do HTTP redirection with the help of raw socket.Using NFQUEUE can ensures high performance redirection,avoid troublesome development in the Linux kernel,simplify application development and improve system stability.…”
    Get full text
    Article
  10. 10
  11. 11

    Voice authentication module using mel-cepstral coefficients by D. A. Elizarov, P. A. Ashaeva, E. A. Stepanova

    Published 2024-07-01
    “…The authentication module was developed using Python languageConclusion. …”
    Get full text
    Article
  12. 12

    Cell line authentication using optical genome mapping by Alex Chialastri, Kevin Flowers, L Amarin Cogburn, Damien Fink, Jennifer L. Dashnau

    Published 2025-07-01
    “…Abstract Background Cell line authentication and karyotype assessment are two critical quality control tests that should be performed when using cell lines for biologic research and are expected measurements for cell therapy development. …”
    Get full text
    Article
  13. 13

    Using a Portfolio as an Alternative and Authentic Tool of Assessment by Saleh DERRADJI

    Published 2009-12-01
    “…This paper suggests to examine and understand how and why a portfolio can be used as an alternative and authentic tool of oral assessment .We believe that through this testing technique and with the investment and commitment of the pedagogical team, we will be able to develop genuine oral communication in the learners and promote a new vision of measurement…”
    Get full text
    Article
  14. 14
  15. 15

    Differential Cryptanalysis of the Reduced Pointer Authentication Code Function Used in Arm’s FEAT_PACQARMA3 Feature by Roberto Avanzi, Orr Dunkelman, Shibam Ghosh

    Published 2025-03-01
    “… The Pointer Authentication Code (PAC) feature in the Arm architecture is used to enforce the Code Flow Integrity (CFI) of running programs. …”
    Get full text
    Article
  16. 16

    THE USE OF LITERATURE IN DEVELOPING STUDENTS’ CHARACTERS THROUGH AUTHENTIC ASSESSMENT by Fadhillah Wiandari, Siti Habsari Pratiwi

    Published 2018-12-01
    “…The finding also reveals that the scores obtained by students have reached the minimum scores of passing after the use of authentic assessment. …”
    Get full text
    Article
  17. 17

    Protection Against Internal Intruding using Host Identifier Authentication by Basil Alkhayaat, Abdulsattar khidhir, Omar Ibraheem

    Published 2009-03-01
    “…The first supplies an authenticated unique host-ID to each packet destined to leave the network, while the latter verifies these information, allowing the authenticated packet to pass into its destined while dropping and documenting the unauthorized one. …”
    Get full text
    Article
  18. 18
  19. 19

    The Legal Protection in The Use of Authentic Deeds in The Patent License Agreements by Silvia Sofiatunnisa Mulyana, Ranti Fauza Mayana, Elisatris Gultom

    Published 2024-08-01
    “…To achieve optimal legal protection, the formulation of an authentic deed in a patent license agreement should encompass aspects such as license exclusivity, limitations on patent usage, annual patent fees, information disclosure clauses, the equilibrium of patent use, sanctions, and dispute resolution.…”
    Get full text
    Article
  20. 20