Academic literature on the topic 'Autentifikacija'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Autentifikacija.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Autentifikacija"
Gvozdanović, Kristina, Polona Margeta, and Vladimir Margeta. "Primjena analitičkih metoda u postupcima autentifikacije poljoprivednih i prehrambenih proizvoda." Stočarstvo 71, no. 1-2 (August 25, 2017): 29–38. http://dx.doi.org/10.33128/s.71.1-2.4.
Full textMihajlović, Dragana. "UPOTREBLJIVOST SIGURNOSNIH MEHANIZAMA VEB APLIKACIJA." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 36, no. 09 (September 7, 2021): 1521–24. http://dx.doi.org/10.24867/14be13mihajlovic.
Full textLončarević, Zoran, Muzafer Saračević, and Muhedin Hadžić. "Analysis of some techniques of biometric authentication systems with emphasis on 2D and 3D face recognition technology." Ekonomski izazovi 7, no. 13 (2018): 119–39. http://dx.doi.org/10.5937/ekoizazov1813119l.
Full textCvetković, Aleksandar Sandro, and Saša Adamović. "Šifrovanje baze podataka sa više korisnika." ZBORNIK RADOVA UNIVERZITETA SINERGIJA 8, no. 3 (April 18, 2019). http://dx.doi.org/10.7251/zrsng1708068c.
Full textDissertations / Theses on the topic "Autentifikacija"
Maklakova, Natalija. "Autentifikacijos protokolų tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20060626_221538-47003.
Full textKulikauskas, Kristijonas. "Biometrinės autentifikacijos modelio automobiliams sukūrimas ir tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_112618-06857.
Full textAutomobile security is always relevant. Existing security systems could be easily bypassed and are not a big barrier for thieves. So there is a necessity for a innovative authentication system. Biometrics consist of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It could be also used for automobile security. Finger vein comparison is a relatively new form of biometrics, which could also be used for authentication. Images of finger veins could be obtained illuminating fingers with near-infrared light. Those images are very unique and different for every person and every finger. In this research biometric authentication model for automobiles is developed and researched. Three image recognition algorythms were tested in the experiment, determining which one is less sensitive to resolution changes and noise. The results were given, proposing use of one algorythm, in our model of biometric authentication system for automobiles.
Petrauskienė, Rasa. "Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_140213-99282.
Full textLocation-based Access Control LBAC techniques allow taking users’ physical location into account when determining their access privileges. The analysis of possibilities of integrating location information into access control and authentication is provided. I show the advantages of using location information for authentication and access control. I present location-based access control model that can increase the probability of correct authentication. I design wireless LAN location-based access control system that is used in building of several floors. The model is compliant with OGC (Open GeoSpatial Consortium) and Geo-RBAC (the extent of RBAC model); it integrates other types of location-based features. I describe the periodicity algorithm of location-based access control and design the policy enforcement algorithm that uses location mapping functions and the evaluation of confidence. The model is evaluated by testing the speed of the system and computer resources used by the system. The vulnerabilities of location-based access control are discussed in the context of sniffing, highjacking, DoS and warmhole attacks.
Pořízka, Jaromír. "Využití analytických technik a chemometrie k autentifikaci vín." Doctoral thesis, Vysoké učení technické v Brně. Fakulta chemická, 2015. http://www.nusl.cz/ntk/nusl-234569.
Full textMjachky, Ľuboš. "Generativní adversarialní neuronové sítě využity na ochranu soukromí při biometrické autentifikaci a identifikaci." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445583.
Full textLozda, Marius. "Elektroninio parašo atributų sertifikavimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2011~D_20140627_165731-47089.
Full textThis paper analyses issues of attribute certification in currently used electronic signatures. Fundamentals of electronic signatures and public key infrastructure are briefly described, focusing on possibilities of achieving higher security level in communication when attribute information is important. Various suggestions for attribute certification are analysed, introducing atribute certificates and atribute authorities. Different certification methods are compared and evaluated, applying the most suitable one in the public key infrastructure usage model, that is constructed by simplifying the current situation of electronic signatures. The solution is represented by describing the prototype of improved electronic signature infrastructure.
Conference papers on the topic "Autentifikacija"
Marjanović, Marko. "Kombinovanje biometrije i lozinki u savremenim servisima autentifikacije." In Sinteza 2014. Belgrade, Serbia: Singidunum University, 2014. http://dx.doi.org/10.15308/sinteza-2014-984-989.
Full textPilepić Stifanich, Ljubica. "TRENDOVI U BIOMETRIJI: METODA AUTENTIFIKACIJE I PRIMJERI KORIŠTENJA U TURIZMU I HOTELIJERSTVU." In 4th International Scientific Conference – EMAN 2020 – Economics and Management: How to Cope With Disrupted Times. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2020. http://dx.doi.org/10.31410/eman.2020.411.
Full text