Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Security

19 items found

Items per page 20 | 50 | 100
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
  • image of Age Factors in Biometric Processing
    Age Factors in Biometric Processing
  • image of Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications
    Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications
  • image of Authentication Technologies for Cloud Computing, IoT and Big Data
    Authentication Technologies for Cloud Computing, IoT and Big Data
  • image of Blockchain Technology for Secure Social Media Computing
    Blockchain Technology for Secure Social Media Computing
  • image of Data Security in Cloud Computing
    Data Security in Cloud Computing
  • image of Engineering Secure Internet of Things Systems
    Engineering Secure Internet of Things Systems
  • image of Hand-Based Biometrics: Methods and Technology
    Hand-Based Biometrics: Methods and Technology
  • image of Information Security: Foundations, Technologies and Applications
    Information Security: Foundations, Technologies and Applications
  • image of Iris and Periocular Biometric Recognition
    Iris and Periocular Biometric Recognition
  • image of Machine Learning, Blockchain Technologies and Big Data Analytics for IoTs: Methods, technologies and applications
    Machine Learning, Blockchain Technologies and Big Data Analytics for IoTs: Methods, technologies and applications
  • image of Mobile Biometrics
    Mobile Biometrics
  • image of Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications
    Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications
  • image of Physical Layer Security for Wireless Sensing and Communication
    Physical Layer Security for Wireless Sensing and Communication
  • image of Privacy by Design for the Internet of Things: Building accountability and security
    Privacy by Design for the Internet of Things: Building accountability and security
  • image of Proof-of-Stake for Blockchain Networks: Fundamentals, challenges and approaches
    Proof-of-Stake for Blockchain Networks: Fundamentals, challenges and approaches
  • image of Security and Privacy Schemes for Dense 6G Wireless Communication Networks
    Security and Privacy Schemes for Dense 6G Wireless Communication Networks
  • image of Split Federated Learning for Secure IoT Applications: Concepts, frameworks, applications and case studies
    Split Federated Learning for Secure IoT Applications: Concepts, frameworks, applications and case studies
  • image of User-Centric Privacy and Security in Biometrics
    User-Centric Privacy and Security in Biometrics
  • image of Voice Biometrics: Technology, trust and security
    Voice Biometrics: Technology, trust and security
Items per page 20 | 50 | 100
This is a required field
Please enter a valid email address