The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authenticating with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-1997 (19) 1998-2000 (23) 2001-2002 (26) 2003 (22) 2004 (27) 2005 (39) 2006 (45) 2007 (45) 2008 (31) 2009 (28) 2010-2011 (27) 2012-2013 (25) 2014-2015 (26) 2016 (15) 2017-2018 (30) 2019-2020 (21) 2021 (15) 2022-2023 (26) 2024 (6)
Publication types (Num. hits)
article(144) inproceedings(350) phdthesis(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 348 occurrences of 229 keywords

Results
Found 496 publication records. Showing 496 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
46Weidong Shi, Hsien-Hsin S. Lee, Mrinmoy Ghosh, Chenghuai Lu Architectural Support for High Speed Protection of Memory Integrity and Confidentiality in Multiprocessor Systems. Search on Bibsonomy IEEE PACT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
44Giuseppe Ateniese, Susan Hohenberger Proxy re-signatures: new definitions, algorithms, and applications. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authenticating path in network, proxy re-signature, bilinear maps
44Ian T. Foster, Nicholas T. Karonis, Carl Kesselman, Greg Koenig, Steven Tuecke A Secure Communications Infrastructure for High-Performance Distributed Computing. Search on Bibsonomy HPDC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security-enhanced version, Nexus communication library, security/performance tradeoffs, authenticating, distributed computing, integrity, confidentiality, high-performance, security of data, users, resources, secure communications, security mechanisms
42Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate Authenticating ubiquitous services: a study of wireless hotspot access. Search on Bibsonomy UbiComp The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, wi-fi, phishing, ubiquitous services
42Meiqin Wang, Lin Li, Siu-Ming Yiu, Lucas Chi Kwong Hui, C. F. Chong, Kam-Pui Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun A Hybrid Approach for Authenticating MPEG-2 Streaming Data. Search on Bibsonomy MCAM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos Authenticated hash tables. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF rsa accumulator, verification, authentication, hash tables
31Xiaoyuan Yang 0002, Yao Guo, Ke Niu 0001, Xiang Wu An Authenticating Algorithm with Multi-compression Compatible in DCT Domain. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou, Jianhua Jiang LMCM: Layered Multiple Chaining Model for Authenticating Multicast Streams. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Source Authentication, Chain hashing, Non-repudiation, Multicast security
31Remo Meier, Roger Wattenhofer ALPS: Authenticating Live Peer-to-Peer Live Streams. Search on Bibsonomy SRDS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Chris Culnane, Helen Treharne, Anthony T. S. Ho Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning. Search on Bibsonomy IWDW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert Authenticating Feedback in Multicast Applications Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multicast acknowledgements, authenticated feedback, Ack implosion, generalized El-Gamal signatures, LFSR-based PKCs, multisignatures
31Tsong-Yi Chen, Da-Jinn Wang, Thou-Ho Chen, Chung-Yih Lee An Effective Authenticating Method On The Compressed Image Data. Search on Bibsonomy ICICIC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Jonghyoun Choi, Youngsong Mun Mechanism of Authenticating a MAP in Hierarchical MIPv6. Search on Bibsonomy GPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Zhi Li 0001, Yong Lian 0001, Qibin Sun, Chang Chen Authenticating Multimedia Transmitted Over Wireless Networks: A Content-Aware Stream-Level Approach. Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Hsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Chun-Shien Lu, Ja-Chen Lin Fragile watermarking for authenticating 3-D polygonal meshes. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Sang-Woong Lee, Ho-Choul Jung, Seong-Whan Lee Authenticating Corrupted Facial Images on Stand-Alone DSP System. Search on Bibsonomy AVBPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Ho-Choul Jung, Bon-Woo Hwang, Seong-Whan Lee Authenticating Corrupted Face Image Based on Noise Model. Search on Bibsonomy FGR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Il-Sun You, Kyungsan Cho A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Mipv6 Binding Update Protocol, CAM-DH, CGA
31Daniel J. Polivy, Roberto Tamassia Authenticating distributed data using Web services and XML signatures. Search on Bibsonomy XML Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Web services, XML, authentication, digital signatures
31Mohamed Al-Ibrahim, Josef Pieprzyk Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. Search on Bibsonomy ICN (2) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
31Hiroshi Yoshiura, Takaaki Shigematsu, Seiichi Susaki, Tsukasa Saitoh, Hisashi Toyoshima, Chikako Kurita, Satoru Tezuka, Ryôichi Sasaki Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
23Erdem Aktas, Kanad Ghose DARE: A Framework for Dynamic Authentication of Remote Executions. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Zhi Li 0001, Qibin Sun, Yong Lian 0001, Chang Wen Chen Joint Source-Channel-Authentication Resource Allocation and Unequal Authenticity Protection for Multimedia Over Wireless Networks. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Rene Mayrhofer, Martyn Welch A Human-Verifiable Authentication Protocol Using Visible Laser Light. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Limin Wang, Sandeep S. Kulkarni Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Ben Adida, David Chau, Susan Hohenberger, Ronald L. Rivest Lightweight Email Signatures (Extended Abstract). Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23May Phyo Oo, Nilar Thein, Thinn Thu Naing Grid Security Framework for Managing the Certificate. Search on Bibsonomy Web Intelligence The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Counting Process, RSA public key, Authentication method and Authorization method, Certificate
23Mario Di Raimondo, Rosario Gennaro Provably Secure Threshold Password-Authenticated Key Exchange. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Moni Naor Deniable Ring Authentication. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23John T. Robinson, Murthy V. Devarakonda Note on a Problem with Reed and Long's FBR Results. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
23Rosario Gennaro, Pankaj Rohatgi How to Sign Digital Streams. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
19R. Raghavan, John Singh K An enhanced and hybrid fingerprint minutiae feature extraction method for identifying and authenticating the patient's noisy fingerprint. Search on Bibsonomy Int. J. Syst. Assur. Eng. Manag. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Alessandro Scala Techniques for Authenticating Quantile Digests. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Leonardo Azalim de Oliveira, Edelberto Franco Silva Evaluation of EAP Usage for Authenticating Eduroam Users in 5G Networks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Simon Erfurth Digital Signatures for Authenticating Compressed JPEG Images. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
19Nihal Poredi, Deeraj Nagothu, Yu Chen 0002 Authenticating AI-Generated Social Media Images Using Frequency Domain Analysis. Search on Bibsonomy CCNC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Swathi Kumar Vembu, Anupam Chattopadhyay, Sayandeep Saha Authenticating Edge Neural Network through Hardware Security Modules and Quantum-Safe Key Management. Search on Bibsonomy VLSID The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Mustafa A. Qamhan, Yousef Ajami Alotaibi, Sid-Ahmed Selouani Transformer for authenticating the source microphone in digital audio forensics. Search on Bibsonomy Forensic Sci. Int. Digit. Investig. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Haikun Xu, Xuefei Zhang, Qimei Cui, Xiaofeng Tao A Dynamic Blockchain-Based Mutual Authenticating Identity Management System for Next-Generation Network. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Guangyong Gao, Min Wang A novel watermarking scheme for authenticating individual data integrity of WSNs. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Urvashi Sugandh, Swati Nigam, Manju Khari, Sanjay Misra An Approach for Risk Traceability Using Blockchain Technology for Tracking, Tracing, and Authenticating Food Products. Search on Bibsonomy Inf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Mohamed A. El-Zawawy, Alessandro Brighente, Mauro Conti Authenticating Drone-Assisted Internet of Vehicles Using Elliptic Curve Cryptography and Blockchain. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Fei Peng, Bo Long, Min Long A Semi-Fragile Reversible Watermarking for Authenticating 3D Models Based on Virtual Polygon Projection and Double Modulation Strategy. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Julien S. Jainsky, David Naccache, Bassem Ouni, Ofer Yifrach-Stav Authenticating Medications with QR-Codes and Compact Digital Signatures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
19Hanwen Feng 0001, Qiang Tang 0005 Witness Authenticating NIZKs and Applications. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
19Yidan Hu, Yukun Dong, Wenxin Chen, Yingfei Dong, Rui Zhang 0007 Authenticating Outsourced Location-Based Skyline Queries under Shortest Path Distance. Search on Bibsonomy CNS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Chibuzor Udokwu, Stefan Craß, Alex Norta Authenticating Parties in Blockchain-Enabled Inter-Organizational Processes with Configurable Challenge-Sets. Search on Bibsonomy FDSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Joan Boyar, Simon Erfurth, Kim S. Larsen, Ruben Niederhagen Quotable Signatures for Authenticating Shared Quotes. Search on Bibsonomy LATINCRYPT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Hoda Amal Hamouda Authenticating Citizen Journalism Videos by Incorporating the View of Archival Diplomatics into the Verification Processes of Open-source Investigations (OSINT). Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Siddharth Prakash Rao, Alexandros Bakas Authenticating Mobile Users to Public Internet Commodity Services Using SIM Technology. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Omar Adel Ibrahim, Roberto Di Pietro Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Noureddine Amraoui, Belhassen Zouari Anomalous behavior detection-based approach for authenticating smart home system users. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Sunpreet Sharma, Ju Jia Zou, Gu Fang A Novel Multipurpose Watermarking Scheme Capable of Protecting and Authenticating Images With Tamper Detection and Localisation Abilities. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Fei Peng, Tongxin Liao, Min Long A Semi-Fragile Reversible Watermarking for Authenticating 3D Models in Dual Domains Based on Variable Direction Double Modulation. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Ashima Anand, Amit Kumar Singh 0001 A method for authenticating digital records for healthcare systems. Search on Bibsonomy Sustain. Comput. Informatics Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19K. Balasamy 0001, N. Krishnaraj, K. Vijayalakshmi An Adaptive Neuro-Fuzzy Based Region Selection and Authenticating Medical Image Through Watermarking for Secure Communication. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Joan Boyar, Simon Erfurth, Kim S. Larsen, Ruben Niederhagen Quotable Signatures for Authenticating Shared Quotes. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19David Oliver Erdos Identification in personal data: Authenticating the meaning and reach of another broad concept in EU data protection law. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Mubarak Umar, Zhenqiang Wu, Xuening Liao Authenticating tier-two body area network devices through user-specific signal propagation characteristics. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng, Zheng Yang Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification. Search on Bibsonomy Comput. J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Junhyub Lee, Insu Kim, Jeongwoo Heo, Hyosu Kim Your tapstroke tells who you are: authenticating smartphone users with tapstroke-driven vibrations. Search on Bibsonomy MobiSys The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Patrick Cronin, Xing Gao 0001, Haining Wang, Chase Cotton Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints. Search on Bibsonomy SP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Omar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable Functions. Search on Bibsonomy WISEC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Smitha Sasi, Srividya B. V. Prediction and Estimation of Lung Cancer and Authenticating by CNN-ECC Model. Search on Bibsonomy Int. J. Organ. Collect. Intell. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Deepika Varshney, Dinesh Kumar Vishwakarma Hoax news-inspector: a real-time prediction of fake news using content resemblance over web search results for authenticating the credibility of news articles. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Matteo Loporchio, Anna Bernasconi 0001, Damiano Di Francesco Maesa, Laura Ricci Authenticating Spatial Queries on Blockchain Systems. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Doron Drusinsky Who Is Authenticating My E-Commerce Logins? Search on Bibsonomy Computer The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Fei Peng, Bo Long, Min Long A General Region Nesting-Based Semi-Fragile Reversible Watermarking for Authenticating 3D Mesh Models. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Fei Peng, Zi-Xing Lin, Xiang Zhang, Min Long A Semi-Fragile Reversible Watermarking for Authenticating 2D Engineering Graphics Based on Improved Region Nesting. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Joseph Glessner, Xiurui Hou, Cheng Zhong, Jie Zhang 0049, Munir Khan, Fabian Brand, Peter Krawitz, Patrick Sleiman, Hakon Hakonarson, Zhi Wei 0001 DeepCNV: a deep learning approach for authenticating copy number variations. Search on Bibsonomy Briefings Bioinform. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Deeraj Nagothu, Yu Chen 0002, Alexander J. Aved, Erik Blasch Authenticating Video Feeds using Electric Network Frequency Estimation at the Edge. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Paul Syverson, Matthew Finkel, Saba Eskandarian, Dan Boneh Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
19Mohammad Saidur Rahman 0001, Ibrahim Khalil, Xun Yi Reversible Biosignal Steganography Approach for Authenticating Biosignals Using Extended Binary Golay Code. Search on Bibsonomy IEEE J. Biomed. Health Informatics The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Bing Chen, Yubo Song, Zhenchao Zhu, Shang Gao 0006, Junbo Wang, Aiqun Hu Authenticating Mobile Wireless Device Through Per-packet Channel State Information. Search on Bibsonomy DSN Workshops The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Paul Syverson, Matthew Finkel, Saba Eskandarian, Dan Boneh Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses. Search on Bibsonomy WPES@CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Simon Khan, Cooper Fraser, Daqing Hou, Mahesh K. Banavar, Stephanie Schuckers Authenticating Facebook Users Based on Widget Interaction Behavior. Search on Bibsonomy CCNC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Hanwen Feng 0001, Qiang Tang 0005 Witness Authenticating NIZKs and Applications. Search on Bibsonomy CRYPTO (4) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Raphaël M. J. I. Larsen, Marc-Oliver Pahl, Gouenou Coatrieux Authenticating IDS autoencoders using multipath neural networks. Search on Bibsonomy CSNet The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
19Prateek Pandey, Ratnesh Litoriya Securing and authenticating healthcare records through blockchain technology. Search on Bibsonomy Cryptologia The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Xiaoyu Ji 0001, Chaohao Li, Xinyan Zhou, Juchuan Zhang, Yanmiao Zhang, Wenyuan Xu 0001 Authenticating Smart Home Devices via Home Limited Channels. Search on Bibsonomy ACM Trans. Internet Things The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Yong Huang 0005, Wei Wang 0050, Hao Wang 0014, Tao Jiang 0002, Qian Zhang 0001 Authenticating On-Body IoT Devices: An Adversarial Learning Approach. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Mingquan Fan A source coding scheme for authenticating audio signal with capability of self-recovery and anti-synchronization counterfeiting attack. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Liang He 0002, Yuanchao Shu, Youngmoon Lee, Dongyao Chen, Kang G. Shin Authenticating Drivers Using Automotive Batteries. Search on Bibsonomy Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Anatol Maier, Benedikt Lorch, Christian Riess Toward Reliable Models for Authenticating Multimedia Content: Detecting Resampling Artifacts With Bayesian Neural Networks. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Yong Huang 0005, Wei Wang 0050, Hao Wang 0014, Tao Jiang 0002, Qian Zhang 0001 Authenticating On-Body IoT Devices: An Adversarial Learning Approach. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
19Anatol Maier, Benedikt Lorch, Christian Riess Toward Reliable Models For Authenticating Multimedia Content: Detecting Resampling Artifacts With Bayesian Neural Networks. Search on Bibsonomy ICIP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Sudarsan Sadasivuni, Sanjeev Tannirkulam Chandrasekaran, Akshay Jayaraj, Arindam Sanyal Neural Networks for Authenticating Integrated Circuits Based on Intrinsic Nonlinearity. Search on Bibsonomy MWSCAS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Jaganath Prasad Mohanty, Kamalakanta Mahapatra Authenticating resilience of RTL codes against Power Side Channel leakages. Search on Bibsonomy iSES The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Irving R. Barron, Gaurav Sharma 0001 Toward CanvasChain: A Block Chain and Craquelure Hash Based System For Authenticating and Tracking Fine Art Paintings. Search on Bibsonomy Media Watermarking, Security, and Forensics The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
19Yan Dai 0001, Jie Shao 0001, Gang Hu, Long Guo A resource-aware approach for authenticating privacy preserving GNN queries. Search on Bibsonomy World Wide Web The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Fei Peng, Qin Long, Zi-Xing Lin, Min Long A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Dinesh Kumar Vishwakarma, Deepika Varshney, Ashima Yadav Detection and veracity analysis of fake news via scrapping and authenticating the web search. Search on Bibsonomy Cogn. Syst. Res. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Pantaleone Nespoli, Mattia Zago, Alberto Huertas Celdrán, Manuel Gil Pérez, Félix Gómez Mármol, Félix J. García Clemente PALOT: Profiling and Authenticating Users Leveraging Internet of Things. Search on Bibsonomy Sensors The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19K. Balasamy 0001, S. Ramakrishnan 0004 An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO. Search on Bibsonomy Clust. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Tempestt J. Neal, Md Asaduzzaman Noor, Parush Gera, Khadija Zanna, Gurpreet Kaptan Authenticating Phone Users Using a Gait-Based Histogram Approach on Mobile App Sessions. Search on Bibsonomy ICB The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Yu Liu, Curtis R. Taylor, Craig A. Shue Authenticating Endpoints and Vetting Connections in Residential Networks. Search on Bibsonomy ICNC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Gautam Prakash, Ravinder Kumar Verma, P. Vigneswara Ilavarasan, Arpan Kumar Kar Authenticating Fake News: An Empirical Study in India. Search on Bibsonomy TDIT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Paul Syverson, Matthew Traudt Self-Authenticating Traditional Domain Names. Search on Bibsonomy SecDev The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Bashar Talafha, Mohammad Al-Smadi, Mahmoud Al-Ayyoub, Yaser Jararweh, Patrick Juola Using a Hierarchical Softmax Based on the Huffman Coding Tree for Authenticating Arabic Tweets. Search on Bibsonomy AICCSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
19Don Owen Jr., Derek Heeger, Calvin Chan, Wenjie Che, Fareena Saqib, Matthew Areno, Jim Plusquellic An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays. Search on Bibsonomy Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 496 (100 per page; Change: )
Pages: [1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license