To see the other types of publications on this topic, follow the link: Authentication Systems.

Books on the topic 'Authentication Systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Authentication Systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Smith-Creasey, Max. Continuous Biometric Authentication Systems. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-49071-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Terry, Plum, Bleiler Richard, and Association of Research Libraries. Office of Leadership and Management Services., eds. User authentication. Association of Research Libraries, Office of Leadership and Management Services, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Asad, Ali. Biometrics: An investigation of fingerprint authentication systems. University of East London, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

W, Mak M., and Lin Shang-Hung 1968-, eds. Biometric authentication: A machine learning approach. Prentice Hall Professional Technical Reference, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, David. Biometric Solutions: For Authentication in an E-World. Springer US, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jakobsson, Markus. Mobile Authentication: Problems and Solutions. Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

National Computer Security Center (U.S.), ed. A Guide to understanding identification and authentication in trusted systems. National Computer Security Center, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zviran, Moshe. A comparison of password techniques for multilevel authentication mechanisms. Naval Postgraduate School, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Borivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Auerbach Publications, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

ECCV 2004 International Workshop (2004 Prague, Czech Republic). Biometric authentication: ECCV 2004 International Workshop, BioAW 2004, Prague, Czech Republic, May 15th, 2004 : proceedings. Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

IFIP World Conference on Mobile Communications (1996 Canberra, A.C.T.). Mobile communications: Technology, tools, applications, authentication, and security : IFIP World Conference on Mobile Communications 2-6 September 1996, Canberra, Australia. Kluwer Academic Publishers, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

IFIP World Conference on Mobile Communications (1996 Canberra, A.C.T.). Mobile communications: Technology, tools, applications, authentication, and security : IFIP World Conference on Mobile Communications 2-6 September 1996, Canberra, Australia. Chapman & Hall, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Joint, OECD-Private Sector Workshop on Electronic Authentication (1999 Stanford and Menlo Park Calif ). Joint OECD-Private Sector Workshop on Electronic Authentication: Stanford and Menlo Park, California 2-4 June 1999. OECD, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Joint OECD-Private Sector Workshop on Electronic Authentication (1999 Stanford, Calif. and Menlo Park Calif.). Joint OECD-Private Sector Workshop on Electronic Authentication: Stanford and Menlo Park, California 2-4 June 1999. OECD, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Encarnação, José L. Mobile Communications: Technology, tools, applications, authentication and security IFIP World Conference on Mobile Communications 2 - 6 September 1996, Canberra, Australia. Springer US, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Yŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ред. Tibaisŭ injŭng kiban ŭi yubikʻwŏtʻŏsŭ hom netʻŭwŏkʻŭ poan kisul kaebal =: The development of security technology based on device authentication for ubiquitous home network. Chisik Kyŏngjebu, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

1944-, Seberry Jennifer, Susilo Willy, and SpringerLink (Online service), eds. Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Ahituv, Niv. Verifying the authentication of an information system user. Israel Institute of Business Research, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

McKellar, Brian. Advanced BSP programming: [Extensive coverage of key basics like HTTP, authentication, and session management ; detailded descriptions of BSP extensions and BEEs ; sample applications for help systems, RSS feeds, mini-portals, and more]. Galileo Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Heinlein, Peer. The book of IMAP: Building a mail server with Courier and Cyrus. Open Source Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

E, Smid Miles, Institute for Computer Sciences and Technology. Security Technology Group., and United States. National Bureau of Standards., eds. Message authentication code (MAC) validation system: Requirements and procedures. The Bureau, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Richard, Harper, and Langley Research Center, eds. Advanced information processing system: Authentication protocols for network communication. National Aeronautics and Space Administration, Langley Research Center, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

IEEE Computer Society. Storage Systems Standards Committee., Institute of Electrical and Electronics Engineers., IEEE Standards Board, and IEEE Standards Association, eds. IEEE standard for Media Management System (MMS) Session Security, Authentication, Initialization Protocol (SSAIP). Institute of Electrical and Electronics Engineers, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Khattri, Vipin, Sandeep Kumar Nayak, Deepak Kumar Singh, and Vikrant Bhateja. Identification and Mitigation of Fraudulent Online Transactions Using Authentication and Fraud Detection System. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-4888-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Peter, Lowe. Anti-counterfeiting technology: A guide to protecting and authenticating products and documents. ICC Commercial Crime Services, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kikō, Nihon Bōeki Shinkō. Electronic application system with individuals authentication for establishing e-government in the Kingdom of Cambodia: Main report. Japan External Trade Organization, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Authentication systems for secure networks. Artech House, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Smith-Creasey, Max. Continuous Biometric Authentication Systems: An Overview. Springer International Publishing AG, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Clarke, Nathan. Transparent User Authentication. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

User Authentication Systems and Role-Based Security. Pearson Custom Publishing, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

various. User Authentication Systems and Role-Based Security. Pearson, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Mobile Authentication Problems And Solutions. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Furht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Furht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Furht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Furht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Smid, Miles. Message Authentication Code Validation System: Requirements and Procedures. United States Government Printing Office, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Niemi, Valtteri, Silke Holtmanns, Philip Ginzboorg, Pekka Laitinen, and N. Asokan. Cellular Authentication for Mobile and Internet Services. Wiley & Sons, Limited, John, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Niemi, Valtteri, Silke Holtmanns, Philip Ginzboorg, Pekka Laitinen, and N. Asokan. Cellular Authentication for Mobile and Internet Services. Wiley & Sons, Incorporated, John, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Anderson, James, and Rayford Vaughn. Guide to Understanding Identification and Authentication in Trusted Systems. Diane Pub Co, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Koien, Geir M. Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Kao, I.-Lung. Effective and Efficient Authentication and Authorization in Distributed Systems. Creative Media Partners, LLC, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Koien, Geir M. Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Services, BPI Information. Guide to Understanding Identification and Authentication in Trusted Systems. Bpi Information Services, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Kao, I.-Lung. Effective and Efficient Authentication and Authorization in Distributed Systems. Dissertation Discovery Company, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Koien, Geir M. Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Zivic, Natasa, and Obaid Ur-Rehman. Noise Tolerant Data Authentication for Wireless Communication. Springer International Publishing AG, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Zivic, Natasa, and Obaid Ur-Rehman. Noise Tolerant Data Authentication for Wireless Communication. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!