搜索资源列表
hebeiBOSSIDcertificationproposalv2
- 关于boss系统身份认证的一些简要的介绍和方案情况-boss on the authentication system of the introduction and summary of the program
Recognition.of.human.Iris.Patterns
- This a thesis paper on iris recognition. it will be very helpful in guyz who are doin projects on biometric authentication- This is a thesis paper on iris recognition. it will be very helpful in guyz who are doin projects on biometric authentica
background-image
- image processing supposed to provide an authentication for the user. Authentication is granted if the password was entered correctly
BiometricSecurity
- This paper discusses the contactless palm vein authentication device that uses blood vessel patterns a personal identifying factor. The vein information is hard to duplicate since veins are internal to the human body. The palm vein authentication tec
Ch2
- The use of fingerprints for identification has been employed in law enforcement for about a century. A much broader application of fingerprints is for personal authentication, for instance to access a computer, a network, a bank-machine, a ca
Trusted-website
- 2012年会,可信网站认证资料,包括技术路线、开放平台-2012 Annual Meeting,Trusted website authentication information, including technical route, open platform。
UCBioBSP-SDK-Programmers-Guide-v3.00-(Eng)
- As the core module of UCBioBSP SDK, it is considered to be the main module that can achieve all functions related to fingerprint authentication. This module must be included in the development process using UCBioBSP SDK. APIs that can be used i
WCS-ispacs-2012-CR-v2
- This paper presents a two-factor authentication with key agreement scheme for web-based collaborative systems. The proposed mechanism integrates URI fragment identifier with secure email token and identity-based remote mutual authentication schem
Cloudauth-RACS-CR
- A private cloud provides organizations a secure environment to run business process. It provides a flexible way to extend the working environment. While user mobility has become an important feature for many systems, technologies that provide users
Finger-Knuckle-Print-Authentication-based-on-KWT.
- FKP authentication document-FKP authentication document
Image-Authentication-using-Digital-Watermarks
- Image Authentication using Digital Watermarks
CDMA-Authentication
- Motorola CDMA Authentication Introduction
AwareLESS-Authentication
- AwareLESS 認証:微小動作による無感知認証-AwareLESS Authentication: An Authentication Based on Insensible Motions
DESCRIPTION-PROCESS
- In this project we are making one cloud computing secure storage using networking concept, in this we have three modules-1.TPA(third party authentication),2.different cloud for using the services and 3.client to use the service cloud. We are going to
3833.Desfire-ev1-t-commands-P-authentication-proc
- pdf describe commands mifare desfire
A-Fragile-Watermarking-Scheme-for-Image-Authentic
- A Fragile Watermarking Scheme for Image Authentication with Tamper
EEG-for-biometrics
- Biometric recognition is the science of establishing the identity of a person using his/her physical or biological characteristics. Biometric systems can employ different kinds of features, e.g., features of fingerprint, face, iris or posture. EEG si
04721349
- Speech Based Watermarking for Digital Images This paper presents a novel scheme of watermarking of digital images for copyright protection and authentication. In this paper we proposed a method of embedding owner’s speech signal. Speech being
Preventing-Method-Of-Wormhole-Attack
- we introduce many types of attack. In many types of attack wormhole attack is more dangerous attack for network because it is very hard to detect. We discussed about a wormhole attack & its models and types. This survey introduces different wormhole
Q_GDW_1365-2013
- Q_GDW_1365-2013智能电能表信息交换安全认证技术规范-Q_GDW_1365-2013Intelligent watt-hour meter information exchange security authentication technology specification