Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 61.958
1.
  • AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors
    Abuhamad, Mohammed; Abuhmed, Tamer; Mohaisen, David ... IEEE internet of things journal, 2020-June, Letnik: 7, Številka: 6
    Journal Article

    Smartphones have become crucial for our daily life activities and are increasingly loaded with our personal information to perform several sensitive tasks, including, mobile banking and ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
2.
  • Authentication of Smartphone Users Using Behavioral Biometrics
    Alzubaidi, Abdulaziz; Kalita, Jugal IEEE Communications surveys and tutorials, 01/2016, Letnik: 18, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Smartphones and tablets have become ubiquitous in our daily lives. Smartphones, in particular, have become more than personal assistants. These devices have provided new avenues for consumers to ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
3.
  • An Efficient Message-Authen... An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks
    Cui, Jie; Wei, Lu; Zhang, Jing ... IEEE transactions on intelligent transportation systems, 05/2019, Letnik: 20, Številka: 5
    Journal Article
    Recenzirano

    With the progress in wireless communication technology and the increasing number of vehicles, vehicular ad hoc networks (VANETs) have become essential for improving road conditions and enhancing ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
4.
  • NeuroIDBench: An open-sourc... NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research
    Chaurasia, Avinash Kumar; Fallahi, Matin; Strufe, Thorsten ... Journal of information security and applications, September 2024, 2024-09-00, Letnik: 85
    Journal Article
    Recenzirano
    Odprti dostop

    Biometric systems based on brain activity have been proposed as an alternative to passwords or to complement current authentication techniques. By leveraging the unique brainwave patterns of ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
5.
Celotno besedilo
Dostopno za: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
6.
  • A multi-biometric system fo... A multi-biometric system for continuous student authentication in e-learning platforms
    Fenu, Gianni; Marras, Mirko; Boratto, Ludovico Pattern recognition letters, 10/2018, Letnik: 113
    Journal Article
    Recenzirano

    •We design a system to authenticate online students continuously and transparently.•We design a device/interaction-agnostic biometric system for student authentication.•We define a reliability ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
7.
  • Sensor-Based Continuous Aut... Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey
    Abuhamad, Mohammed; Abusnaina, Ahmed; Nyang, Daehun ... IEEE internet of things journal, 2021-Jan.1,-1, 2021-1-1, 20210101, Letnik: 8, Številka: 1
    Journal Article
    Odprti dostop

    Mobile devices and technologies have become increasingly popular, offering comparable storage and computational capabilities to desktop computers allowing users to store and interact with sensitive ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
8.
  • Anonymous Broadcast Authent... Anonymous Broadcast Authentication with One-to-Many Transmission to Control IoT Devices
    Minematsu, Kazuhiko; Shikata, Junji; Watanabe, Yohei ... IEEE access, 01/2023, Letnik: 11
    Journal Article
    Recenzirano
    Odprti dostop

    We consider a basic system to securely and remotely control many IoT devices. Specifically, we require that: (1) a system manager broadcasts information to IoT devices, e.g., wireless environment, ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
9.
  • A Coherent and Privacy-Prot... A Coherent and Privacy-Protecting Biometric Authentication Strategy in Cloud Computing
    Yadav, Bonthala Prabhanjan; Prasad, Ch. Shiva Sai; Padmaja, Ch ... IOP conference series. Materials Science and Engineering, 12/2020, Letnik: 981, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    The Biometric authentication has become progressively more desired in current years. With this expansion of cloud computing, database holders be influenced to expand this extensive volume of ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
10.
  • Multi-Modal Biometric-Based... Multi-Modal Biometric-Based Implicit Authentication of Wearable Device Users
    Vhaduri, Sudip; Poellabauer, Christian IEEE transactions on information forensics and security, 2019-Dec., 2019-12-00, Letnik: 14, Številka: 12
    Journal Article
    Recenzirano

    The Internet of Things (IoT) is increasingly empowering people with an interconnected world of physical objects ranging from smart buildings to portable smart devices, such as wearables. With recent ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
1 2 3 4 5
zadetkov: 61.958

Nalaganje filtrov