-
101
Until you have something to lose! Loss aversion and two-factor authentication adoption
Published 2025-01-01Subjects: “…Two-factor authentication…”
Get full text
Article -
102
The third space professional: cultivating authentic learning experiences through collaborative practice
Published 2025-01-01Subjects: Get full text
Article -
103
A Novel Authentication Management for the Data Security of Smart Grid
Published 2024-01-01Subjects: Get full text
Article -
104
Pengaruh kecerdasan emosional terhadap penilaian autentik di sekolah menengah atas
Published 2024-08-01Subjects: “…emotoinal intelligence authentic assessment high school indonesian language teachers quantitative research…”
Get full text
Article -
105
Prototype Sistem Keamanan Mobil dengan Menggunakan Quick Response Code Berbasis Android dan Arduino
Published 2019-05-01Subjects: Get full text
Article -
106
Copula-Driven Learning Techniques for Physical Layer Authentication Using Multimodal Data
Published 2025-01-01Subjects: Get full text
Article -
107
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01Subjects: “…User authentication…”
Get full text
Article -
108
-
109
Secure software development: leveraging application call graphs to detect security vulnerabilities
Published 2025-01-01Subjects: Get full text
Article -
110
A Sartrean Approach to Ayé Ṣίṣe in Yorùbá Existentialism
Published 2021-12-01Subjects: “…Ayé ṣίṣe, Jean-Paul Sartre, Existentialism, Authentic existence, Yorùbá ontology…”
Get full text
Article -
111
Incorporating Environmental Education in English Language Teaching through Bloom’s Revised Taxonomy
Published 2018-12-01Subjects: Get full text
Article -
112
Students’ attitudes towards ethnic entrepreneurship
Published 2025-01-01Subjects: Get full text
Article -
113
A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression
Published 2025-01-01Subjects: Get full text
Article -
114
The impact of moral injury on healthcare workers’ career calling: exploring authentic self-expression, ethical leadership, and self-compassion
Published 2025-01-01Subjects: Get full text
Article -
115
Copy-Move Forgery Verification in Images Using Local Feature Extractors and Optimized Classifiers
Published 2023-09-01Subjects: Get full text
Article -
116
HERBARIUM SPECIMENS OF WILD CHILEAN POTATO SPECIES BELONGING TO THE SECTION <i> PETOTA </i> DUMORT. GENUS <i> SOLANUM </i> L. IN THE VIR HERBARIUM
Published 2018-06-01Subjects: Get full text
Article -
117
Privacy-preserving attribute-based access control using homomorphic encryption
Published 2025-01-01Subjects: Get full text
Article -
118
Beyond full‐bit secure authenticated encryption without input‐length limitation
Published 2022-07-01Subjects: “…authenticated encryption…”
Get full text
Article -
119
Group-Based Authentication Methods in The OneM2M Ecosystem
Published 2022-12-01Subjects: “…group-based authentication…”
Get full text
Article -
120
Real-Time Mouse Data Protection Method Using GANs for Image-Based User Authentication Based on GetCursorPos() and SetCursorPos() Functions
Published 2025-01-01Subjects: “…image-based authentication…”
Get full text
Article