-
41
Authentic leadership and employee silence intention: Mediated by perceptions of organizational politics and organizational commitment
Published 2024-01-01Subjects: “…authentic leadership…”
Get full text
Article -
42
The relationship between creative tourism and local development: a bibliometric approach for the period 2009-2019
Published 2021-01-01Subjects: Get full text
Article -
43
Authenticating Features in the TEI
Published 2021-09-01Subjects: “…authentication…”
Get full text
Article -
44
Usage of the foreign websites on foreign language practical classes for development of students’ communicative competence
Published 2022-09-01Subjects: “…authenticity…”
Get full text
Article -
45
Spoofing detection on adaptive authentication System‐A survey
Published 2022-03-01Subjects: “…adaptive authentication…”
Get full text
Article -
46
Library resource sharing solution based on federated authentication and CALIS unified authentication
Published 2013-09-01Subjects: “…federated authentication…”
Get full text
Article -
47
Mutual authentication scheme based on the TPM cloud computing platform
Published 2012-11-01Subjects: Get full text
Article -
48
Bulid campus network authentication system based on centralized 802.1x
Published 2014-10-01Subjects: “…802.1x authentication…”
Get full text
Article -
49
Study on Unified Identifier Authentication Service and Standards on Public Network
Published 2013-02-01Subjects: Get full text
Article -
50
Research of authentication techniques for the Internet of things
Published 2020-07-01Subjects: Get full text
Article -
51
Research on Access Authentication and Re-Authentication Mechanism of User Devices in Terrestrial Default Scenario in Satellite Internet
Published 2023-06-01Subjects: Get full text
Article -
52
Openstack authentication protocol based on digital certificate
Published 2019-02-01Subjects: Get full text
Article -
53
Anonymity handover authentication protocol based on group signature for wireless Mesh network
Published 2016-10-01Subjects: Get full text
Article -
54
Identity authentication scheme of Android client based on identifiers
Published 2017-04-01Subjects: Get full text
Article -
55
Research on“Wo Connect”Uniform Authentication Technology
Published 2015-06-01Subjects: Get full text
Article -
56
Lightweight authentication protocol for security vehicle network of railway freight train
Published 2018-11-01Subjects: Get full text
Article -
57
Mobile office system oriented to intelligent terminal
Published 2018-02-01Subjects: Get full text
Article -
58
UCAP:a PCL secure user authentication protocol in cloud computing
Published 2018-08-01Subjects: Get full text
Article -
59
Two-factor authenticated key agreement protocol based on biometric feature and password
Published 2017-07-01Subjects: Get full text
Article -
60
Packet-loss robust scalable authentication algorithm for compressed image streaming
Published 2014-04-01Subjects: “…image authentication…”
Get full text
Article