Search results
Jump to navigation
Jump to search
- ...d in part have been described as being inefficient compared to alternative authentication protocols.<ref name="stallings">{{cite book|last=Stallings|first=William|ti ...name="woo-lam-2">{{cite journal|author=T.Y.C. Woo |author2=S.S. Lam |title=Authentication Revisited|journal=Computer|date=March 1992|volume=25|issue=3|page=10|doi=10 ...3 KB (514 words) - 23:51, 30 September 2023
- ...y''' is the area of [[cryptology]] where the [[cryptographic primitive]]s, methods and systems are based on [[algebraic structure]]s like [[semigroup]]s, [[Gr ...tographic problems like [[key exchange]], [[encryption]]-decryption, and [[authentication]]. These protocols are very similar to the corresponding protocols in the c ...12 KB (1,946 words) - 01:33, 29 June 2024
- ...3/SecureRF-Technical-White-Paper-06-with-Appendix-A-B.pdf |title=Algebraic methods in cryptography |publisher=American Mathematical Society |location=Contemp. ...tion is desired, authenticity assurances must be obtained by other means. Authentication is necessary to avoid [[man-in-the-middle attack]]s. If one of Alice or Bo ...11 KB (1,668 words) - 00:27, 19 October 2022
- ...hentication credential, which can be a random passcode or a smartcard. The authentication credential allows the voter to log onto a DRE machine in a private voting b [[Category:Electronic voting methods]] ...12 KB (1,867 words) - 22:36, 14 February 2025
- ...=Luciano|first2=Elisa|last3=Vecchiato|first3=Walter|date=2004|title=Copula Methods in Finance|url=http://dx.doi.org/10.1002/9781118673331|doi=10.1002/97811186 ...Yongfang Zhu|last3=Jain|first3=A.K.|date=2006|title=Validating a Biometric Authentication System: Sample Size Requirements|url=http://dx.doi.org/10.1109/tpami.2006.2 ...16 KB (2,356 words) - 16:51, 24 November 2024
- ...elds of small characteristic more efficient algorithms based on ''p''-adic methods exist. ...14 KB (2,262 words) - 21:37, 30 December 2023
- And some methods have been presented to automatically deduce these elementary graph edit ope |title=Audio- and Video-Based Biometric Person Authentication ...13 KB (1,723 words) - 03:20, 8 February 2025
- ...n make them valuable in a high-traffic office environment where electronic authentication is necessary. ...armature plate. The patent did not make any reference to the manufacturing methods of the electromagnet and detailed several variations on the design, includi ...15 KB (2,367 words) - 13:35, 18 January 2025
- ...its high degree of independence, tabulation hashing is usable with hashing methods that require a high-quality hash function, including [[hopscotch hashing]], | title = New hash functions and their use in authentication and set equality ...19 KB (2,900 words) - 14:24, 2 September 2024
- ...conducted in the IRCCyN laboratory. It provides solutions for security and authentication. ...igitally reconstructed radiograph computation and comparison with standard methods,” in Medical Imaging 2007: Physics of Medical Imaging, 2007, vol. 6510, p.& ...27 KB (3,978 words) - 18:39, 4 December 2024
- ...same time protect identity and location privacy.<ref name=":10" /> Several methods have been investigated to enhance the performances of location-preserving t ...ervice provider.<ref name=":1" /><ref name=":42"/> For example, one of the methods to achieve this is by replacing the correct network addresses with [[Fake I ...55 KB (7,739 words) - 07:36, 21 December 2024
- ...cial bubble experiments") of ex-ante reports of bubbles where the digital authentication key of a document with the forecasts was published on the internet. The con ...ref><ref>Sornette, D., Ouillon, G., "Dragon-kings: Mechanisms, statistical methods and empirical evidence", ''The European Physical Journal Special Topics'' 2 ...60 KB (8,410 words) - 14:57, 4 January 2025
- Integrity is easy to achieve using cryptography (typically through [[message-authentication code]], or MACs, on data blocks).<ref>{{harvnb|Juels|Oprea|2013|p=4}}</ref> ...(provable data possession) checking is a class of efficient and practical methods that provide an efficient way to check data integrity on untrusted servers: ...62 KB (8,494 words) - 09:35, 29 October 2024
- ...duction or high temperature conversion are the dominant online preparation methods for detection of HIC by IRMS. ...st sample size (typically ~200 ng<ref name=":05"/>) relative to other methods and has a high precision of 1~5 ‰. But this method is relatively slow and l ...236 KB (33,740 words) - 16:38, 15 November 2024
- ...ace|interfaces}} in some computer languages.<ref>{{cite web|title=Abstract Methods and Classes|url=http://docs.oracle.com/javase/tutorial/java/IandI/abstract. ...uilding {{gli|software}}. In general terms, it is a set of clearly defined methods of communication among various components. A good API makes it easier to de ...214 KB (29,880 words) - 09:50, 28 January 2025