Top results
authentication and authorization for mobile devices bachelor of science thesis in software engineering and management navid ranjbar mahdi abdinejadi 2 the author grants to…
syntactic stylometry: using sentence structure for authorship attribution by charles dale hollingsworth (under the direction of michael covington) abstract most approaches…
continuous biometric authentication using mobile devices jesús friginal, giovanna sannino, alessandro testa, stefania tosi 1 some basics on authentication • in general,…
this paper is included in the proceedings of the 24th usenix security symposium august 12â14, 2015 ⢠washington, d.c. isbn 978-1-931971-232 open access to the proceedings…
authentication devices activid® token benefits increased security – tokens deliver additional authentication factors and cannot be re-used ease of use - end-users…
wp468 v10 october 20 2015 wwwxilinxcom 1 © copyright 2015 xilinx inc xilinx the xilinx logo artix ise kintex spartan virtex vivado zynq and other designated brands included…
improving user authentication on mobile devices: a touchscreen graphical password hsin-yi chiang carleton university hychiang@scscarletonca sonia chiasson carleton university…
a privacy-preserving authentication service using mobile devices mihai togan security software architect certsign context mobile devices • present everywhere high performance…
strong authentication for physical access using mobile devices dod identity protection and management conference may 15-17, 2012 dr. sarbari gupta, cissp, cisa [email protected]…
© 2015 uzh csg@ifi two-way authentication for tiny devices corinna schmitt burkhard stiller department of informatics ifi communication systems group csg university of zürich…
1 face-based multiple user active authentication on mobile devices pramuditha perera, student member, ieee and vishal m patel, senior member, ieee abstract—multiple user…
slide 1authorship verification authorship identification authorship attribution stylometry slide 2 author identification presented with writing sample (txt, articles, email,…
audio-based computational stylometry for electronic music francisco rodríguez-algarra master thesis upf / 2014 master in sound and music computing september, 2014 master…
doppelganger finder: taking stylometry to the undergroundsadia afroz∗, aylin caliskan-islam†, ariel stolerman†, rachel greenstadt† and damon mccoy†
doppelgänger finder: taking stylometry to the underground sadia afroz∗ aylin caliskan-islam† ariel stolerman† rachel greenstadt† and damon mccoy‡ ∗university…
a study on author identification through stylometry lakshmi pushpendra kumar pateriya m.tech student (computer science) assistant professor (computer science) lovely professional…
engineering, computing and mathematics bachelor of engineering & master of professional engineering final year project descriptions semester 1, 2017 to find a project…
www.enisa.europa.eu november 08 position paper 08 position paper www.enisa.europa.eu security issues in the context of authentication using mobile devices (mobile eid) security…
©2015 aspa use of holograms as security and authentication devices in india presented by: chander s jeena, secretary, aspa (authentication solution providersâ association),…
use the force evaluang force-sensive authencaon for mobile devices katharina krombholz, thomas hupperich, thorsten holz sba research ruhr-universität bochum presented by:…