-
81
Toward Authentication of Videos: Integer Transform Based Motion Vector Watermarking
Published 2022-01-01Subjects: Get full text
Article -
82
BCSE: Blockchain-Based Trusted Service Evaluation Model over Big Data
Published 2022-03-01Subjects: Get full text
Article -
83
-
84
Untargeted metabolomics profiling for the geographical authentication of traditional pempek using high-resolution orbitrap mass spectrometry
Published 2025-03-01Subjects: Get full text
Article -
85
Efficient Authentication Mechanism For Defending Against Reflection-Based Attacks on Domain Name System
Published 2020-06-01Subjects: “…DNS, Reflection/Amplification attacks, Amplification factor, CHAP, Source Authentication.…”
Get full text
Article -
86
Navigating the Challenges and Opportunities of Securing Internet of Autonomous Vehicles With Lightweight Authentication
Published 2025-01-01Subjects: “…Lightweight authentication…”
Get full text
Article -
87
A Verifiable Discrete Trust Model (VDTM) Using Congruent Federated Learning (CFL) for Social Internet of Vehicles
Published 2024-01-01Subjects: Get full text
Article -
88
Computational thinking for young indigenous learners in New Zealand
Published 2024-06-01Subjects: “…authentic technological practice…”
Get full text
Article -
89
EXPANDING NASA FUNCTIONALITY USING ITS API AND IMPROVING INTEREST AMONG PEOPLE IN SPACE EXPLORATION
Published 2024-12-01Subjects: Get full text
Article -
90
FractalNet-based key generation for authentication in Voice over IP using Blockchain
Published 2025-03-01Subjects: Get full text
Article -
91
Mediating effects of occupational self-efficacy on the relationship of authentic leadership and job engagement
Published 2024-10-01Subjects: Get full text
Article -
92
Biometric Fusion for Enhanced Authentication in Cloud Computing Environments
Published 2024-03-01Subjects: Get full text
Article -
93
-
94
A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments
Published 2025-01-01Subjects: Get full text
Article -
95
IDEALIZATION OF REALITY THROUGH PHOTOS IN SOCIAL NETWORKS
Published 2024-12-01Subjects: Get full text
Article -
96
Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats
Published 2024-12-01Subjects: Get full text
Article -
97
Collaborative Strategies in Authentic Assessment: Addressing Opportunities and Challenges in Post-Pandemic Indonesia
Published 2024-12-01Subjects: “…authentic assessment…”
Get full text
Article -
98
Secure channel estimation model for cognitive radio network physical layer security using two-level shared key authentication
Published 2025-01-01Subjects: Get full text
Article -
99
Empowering medical students with AI writing co-pilots: design and validation of AI self-assessment toolkit
Published 2025-01-01Subjects: Get full text
Article -
100
The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database
Published 2016-03-01Subjects: Get full text
Article