Books on the topic 'Authentication Systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Authentication Systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Smith-Creasey, Max. Continuous Biometric Authentication Systems. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-49071-2.
Full textTerry, Plum, Bleiler Richard, and Association of Research Libraries. Office of Leadership and Management Services., eds. User authentication. Association of Research Libraries, Office of Leadership and Management Services, 2001.
Find full textAsad, Ali. Biometrics: An investigation of fingerprint authentication systems. University of East London, 2001.
Find full textW, Mak M., and Lin Shang-Hung 1968-, eds. Biometric authentication: A machine learning approach. Prentice Hall Professional Technical Reference, 2005.
Find full textZhang, David. Biometric Solutions: For Authentication in an E-World. Springer US, 2002.
Find full textJakobsson, Markus. Mobile Authentication: Problems and Solutions. Springer New York, 2013.
Find full textNational Computer Security Center (U.S.), ed. A Guide to understanding identification and authentication in trusted systems. National Computer Security Center, 1991.
Find full textZviran, Moshe. A comparison of password techniques for multilevel authentication mechanisms. Naval Postgraduate School, 1990.
Find full textBorivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Auerbach Publications, 2006.
Find full textECCV 2004 International Workshop (2004 Prague, Czech Republic). Biometric authentication: ECCV 2004 International Workshop, BioAW 2004, Prague, Czech Republic, May 15th, 2004 : proceedings. Springer, 2004.
Find full textIFIP World Conference on Mobile Communications (1996 Canberra, A.C.T.). Mobile communications: Technology, tools, applications, authentication, and security : IFIP World Conference on Mobile Communications 2-6 September 1996, Canberra, Australia. Kluwer Academic Publishers, 2001.
Find full textIFIP World Conference on Mobile Communications (1996 Canberra, A.C.T.). Mobile communications: Technology, tools, applications, authentication, and security : IFIP World Conference on Mobile Communications 2-6 September 1996, Canberra, Australia. Chapman & Hall, 1996.
Find full textJoint, OECD-Private Sector Workshop on Electronic Authentication (1999 Stanford and Menlo Park Calif ). Joint OECD-Private Sector Workshop on Electronic Authentication: Stanford and Menlo Park, California 2-4 June 1999. OECD, 1999.
Find full textJoint OECD-Private Sector Workshop on Electronic Authentication (1999 Stanford, Calif. and Menlo Park Calif.). Joint OECD-Private Sector Workshop on Electronic Authentication: Stanford and Menlo Park, California 2-4 June 1999. OECD, 1999.
Find full textEncarnação, José L. Mobile Communications: Technology, tools, applications, authentication and security IFIP World Conference on Mobile Communications 2 - 6 September 1996, Canberra, Australia. Springer US, 1996.
Find full textYŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ред. Tibaisŭ injŭng kiban ŭi yubikʻwŏtʻŏsŭ hom netʻŭwŏkʻŭ poan kisul kaebal =: The development of security technology based on device authentication for ubiquitous home network. Chisik Kyŏngjebu, 2008.
Find full text1944-, Seberry Jennifer, Susilo Willy, and SpringerLink (Online service), eds. Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings. Springer-Verlag Berlin Heidelberg, 2008.
Find full textAhituv, Niv. Verifying the authentication of an information system user. Israel Institute of Business Research, 1985.
Find full textMcKellar, Brian. Advanced BSP programming: [Extensive coverage of key basics like HTTP, authentication, and session management ; detailded descriptions of BSP extensions and BEEs ; sample applications for help systems, RSS feeds, mini-portals, and more]. Galileo Press, 2006.
Find full textHeinlein, Peer. The book of IMAP: Building a mail server with Courier and Cyrus. Open Source Press, 2008.
Find full textE, Smid Miles, Institute for Computer Sciences and Technology. Security Technology Group., and United States. National Bureau of Standards., eds. Message authentication code (MAC) validation system: Requirements and procedures. The Bureau, 1988.
Find full textRichard, Harper, and Langley Research Center, eds. Advanced information processing system: Authentication protocols for network communication. National Aeronautics and Space Administration, Langley Research Center, 1994.
Find full textIEEE Computer Society. Storage Systems Standards Committee., Institute of Electrical and Electronics Engineers., IEEE Standards Board, and IEEE Standards Association, eds. IEEE standard for Media Management System (MMS) Session Security, Authentication, Initialization Protocol (SSAIP). Institute of Electrical and Electronics Engineers, 2000.
Find full textKhattri, Vipin, Sandeep Kumar Nayak, Deepak Kumar Singh, and Vikrant Bhateja. Identification and Mitigation of Fraudulent Online Transactions Using Authentication and Fraud Detection System. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-4888-4.
Full textPeter, Lowe. Anti-counterfeiting technology: A guide to protecting and authenticating products and documents. ICC Commercial Crime Services, 2001.
Find full textKikō, Nihon Bōeki Shinkō. Electronic application system with individuals authentication for establishing e-government in the Kingdom of Cambodia: Main report. Japan External Trade Organization, 2009.
Find full textSmith-Creasey, Max. Continuous Biometric Authentication Systems: An Overview. Springer International Publishing AG, 2024.
Find full textUser Authentication Systems and Role-Based Security. Pearson Custom Publishing, 2004.
Find full textFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Find full textFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Find full textFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Find full textFurht, Borko, and Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Find full textSmid, Miles. Message Authentication Code Validation System: Requirements and Procedures. United States Government Printing Office, 1988.
Find full textNiemi, Valtteri, Silke Holtmanns, Philip Ginzboorg, Pekka Laitinen, and N. Asokan. Cellular Authentication for Mobile and Internet Services. Wiley & Sons, Limited, John, 2008.
Find full textNiemi, Valtteri, Silke Holtmanns, Philip Ginzboorg, Pekka Laitinen, and N. Asokan. Cellular Authentication for Mobile and Internet Services. Wiley & Sons, Incorporated, John, 2008.
Find full textAnderson, James, and Rayford Vaughn. Guide to Understanding Identification and Authentication in Trusted Systems. Diane Pub Co, 1991.
Find full textKoien, Geir M. Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2022.
Find full textKao, I.-Lung. Effective and Efficient Authentication and Authorization in Distributed Systems. Creative Media Partners, LLC, 2019.
Find full textKoien, Geir M. Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2022.
Find full textServices, BPI Information. Guide to Understanding Identification and Authentication in Trusted Systems. Bpi Information Services, 1991.
Find full textKao, I.-Lung. Effective and Efficient Authentication and Authorization in Distributed Systems. Dissertation Discovery Company, 2019.
Find full textKoien, Geir M. Entity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2022.
Find full textEntity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2009.
Find full textEntity Authentication and Personal Privacy in Future Cellular Systems. River Publishers, 2009.
Find full textZivic, Natasa, and Obaid Ur-Rehman. Noise Tolerant Data Authentication for Wireless Communication. Springer International Publishing AG, 2018.
Find full textZivic, Natasa, and Obaid Ur-Rehman. Noise Tolerant Data Authentication for Wireless Communication. Springer, 2018.
Find full text