-
121
Lossless image authentication algorithm based on adaptive combinations of image basic blocks
Published 2012-06-01Subjects: “…lossless image authentication…”
Get full text
Article -
122
The tourist experience: an experience of the frameworks of the tourist experience?
Published 2016-12-01Subjects: Get full text
Article -
123
Design of United Identity Authentication and Key Agreement Protocol for Hybrid Cloud
Published 2014-04-01Subjects: Get full text
Article -
124
“Nothing could stop it, nothing”: The Burden of Postsouthern History in Barry Hannah’s “Uncle High Lonesome”
Published 2018-07-01Subjects: Get full text
Article -
125
Network authentication technology based on public key system
Published 2016-02-01Subjects: Get full text
Article -
126
La restauration du piano de Grétry
Published 2010-04-01Subjects: “…authenticity…”
Get full text
Article -
127
E-invoice authenticity verification scheme based on signature verification
Published 2019-12-01Subjects: Get full text
Article -
128
State recovery attack on ACORN v3 in nonce-reuse setting
Published 2020-08-01Subjects: “…authenticated cipher…”
Get full text
Article -
129
¿Unas elecciones de verdad? Autenticidad, representación y conflicto en los concursos de Reinas Indígenas de Guatemala
Published 2017-06-01Subjects: Get full text
Article -
130
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Published 2016-01-01Subjects: Get full text
Article -
131
Novel key management and authentication scheme for ad hoc space networks
Published 2006-01-01Subjects: Get full text
Article -
132
Trusted and anonymous authentication scheme for wireless networks
Published 2009-01-01Subjects: Get full text
Article -
133
Key technologies and application of artificial intelligence in telecom real-name system
Published 2019-05-01Subjects: Get full text
Article -
134
Self-Effacing Barbie: The Ideal, the Real and the Quest for Authentic Selfhood
Published 2025-02-01Subjects: Get full text
Article -
135
‘Como el agua vuelve al mar, volvemos’. La importancia de la comunidad en la migración kichwa otavalo (Ecuador)
Published 2014-06-01Subjects: Get full text
Article -
136
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01Subjects: “…identity authentication protocol…”
Get full text
Article -
137
-
138
GRU-based multi-scenario gait authentication for smartphones
Published 2022-10-01Subjects: “…continuous authentication…”
Get full text
Article -
139
Provable secure mutual authentication protocol for RFID in the standard model
Published 2013-04-01Subjects: Get full text
Article -
140
Authenticity" About Ferdowsi Neighborhoods Of Tehran with Historical Textures with the Phenomenological Approach
Published 2021-09-01Subjects: “…authenticity…”
Get full text
Article