Showing 1,121 - 1,140 results of 2,373 for search '"secure"', query time: 0.04s Refine Results
  1. 1121

    SUPPORT VECTOR MACHINE FOR HUMAN IDENTIFICATION BASED ON NON-FIDUCIAL FEATURES OF THE ECG by HATEM ZEHIR, TOUFIK HAFS, SARA DAAS, AMINE NAIT-ALI

    Published 2023-05-01
    Subjects: “…biometrics, hidden biometrics, security, identification, ECG, machine learning, SVM…”
    Get full text
    Article
  2. 1122
  3. 1123
  4. 1124

    Document watermarking scheme for information tracking by QI Wen-fa, LI Xiao-long, YANG Bin, CHENG Dao-fang

    Published 2008-01-01
    Subjects: “…information security…”
    Get full text
    Article
  5. 1125
  6. 1126

    Internet worm propagation model based on Markov chain by HOUHan-xun Z, UOWei G, IUJian L, IADa-yu J

    Published 2015-05-01
    Subjects: “…network security…”
    Get full text
    Article
  7. 1127
  8. 1128
  9. 1129
  10. 1130
  11. 1131
  12. 1132

    Research on the game of information security investment based on the Gordon-Loeb model by Qin WANG, Jianming ZHU

    Published 2018-02-01
    Subjects: “…information security investment…”
    Get full text
    Article
  13. 1133
  14. 1134
  15. 1135
  16. 1136

    Universally composable oblivious transfer protocol based on VSPH by LI Feng-hua1, FENG Tao1, MA Jian-feng1

    Published 2007-01-01
    Subjects: “…information security…”
    Get full text
    Article
  17. 1137
  18. 1138
  19. 1139
  20. 1140