Keywords: تأیید هویت کاربر; Keystroke dynamics; User authentication; User-adaptive features; Novelty detection; Free text;
مقالات ISI تأیید هویت کاربر (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: تأیید هویت کاربر; Google glass; User authentication; Personal Identification Number; Usability; Shoulder surfing attack;
Keywords: تأیید هویت کاربر; User authentication; Security; Privacy; Gadget-free; Evaluation;
Keywords: تأیید هویت کاربر; User authentication; One-time challenge generation; User behavior profiling; Transactional data set patterns; Knowledge-based authentication; Question-based authentication;
Keywords: تأیید هویت کاربر; Keystroke dynamics; Mini-batch; Bagging; Attribute ranking; One-class naïve Bayes; User authentication;
Keywords: تأیید هویت کاربر; Keystroke dynamics; User authentication; Free text
Keywords: تأیید هویت کاربر; User authentication; Password leakage; Leakage-resilience password entry; Mobile devices; One-time password
Keywords: تأیید هویت کاربر; User authentication; Network authentication; Graph analysis; Intrusion detection; Cyber security; Enterprise security
Keywords: تأیید هویت کاربر; Keystroke dynamics; User authentication; Long and free text strings; Various input devices; Cramér–von Mises criterion; R and A measure
Keywords: تأیید هویت کاربر; User authentication; Wireless sensor networks; Gateway node bypass; User impersonation; User anonymity; Security and usability;
Keywords: تأیید هویت کاربر; Web browser; Password manager; User authentication; Security; Cloud; Storage
Keywords: تأیید هویت کاربر; Video surveillance system; Key management technique; Privacy masking and restoring; User authentication
Keywords: تأیید هویت کاربر; User authentication; Wireless sensor networks; User anonymity; Password guessing; Forward secrecy; Chaotic maps
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
Keywords: تأیید هویت کاربر; Wireless healthcare sensor networks; User authentication; Session key; Elliptic curve cryptography; AVISPA; BAN logic; Formal security;
New Graphic Password Scheme Containing Questions-Background-Pattern and Implementation
Keywords: تأیید هویت کاربر; Graphic password; user authentication; QBP scheme and implementation;
Utilizing overt and latent linguistic structure to improve keystroke-based authentication
Keywords: تأیید هویت کاربر; Keystroke dynamics; Biometrics; Linguistics; User authentication;
Secure bimodal PIN-entry method using audio signals
Keywords: تأیید هویت کاربر; User authentication; Personal identification number (PIN); Usability; Shoulder surfing attack; Random guessing attack;
Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones
Keywords: تأیید هویت کاربر; Mobile security; User authentication; Behavioral biometrics; Stroke dynamics; Single-handed interaction;
Improved perception-based spiking neuron learning rule for real-time user authentication
Keywords: تأیید هویت کاربر; Spiking neural networks; Perception-based spiking neuron learning rule; User authentication; Spatiotemporal pattern recognition
Performance evaluation of current and emerging authentication schemes for future 3GPP network architectures
Keywords: تأیید هویت کاربر; User authentication; Performance evaluation; Host Identity Protocol; Network architecture evolution; Evolved Packet Core; Wireless Personal Area Network
Power to the people? The evolving recognition of human aspects of security
Keywords: تأیید هویت کاربر; Human aspects; Security awareness; Usability; Antivirus; User authentication
A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices
Keywords: تأیید هویت کاربر; User authentication; Keystroke dynamics authentication; Keystroke feature; Graphical-based password authentication
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Keywords: تأیید هویت کاربر; Wireless sensor networks; User authentication; Wireless security; Passwords; Hash function; Smart cards
Robust one-time password authentication scheme using smart card for home network environment
Keywords: تأیید هویت کاربر; Home network; User authentication; Strong-password approach; HMAC-based one-time password; Hash-chaining technique
Using and managing multiple passwords: A week to a view
Keywords: تأیید هویت کاربر; Password management; User authentication; Security
An efficient biometrics-based remote user authentication scheme using smart cards
Keywords: تأیید هویت کاربر; Biometrics; Cryptography; User authentication; Smart cards; Security
A novel user-participating authentication scheme
Keywords: تأیید هویت کاربر; User participation; CAPTCHA; Visual secret sharing; User authentication
Approach for selecting the most suitable Automated Personal Identification Mechanism (ASMSA)
Keywords: تأیید هویت کاربر; Automated personal identification; User authentication; Biometric verification; Biometric identification; Identity management systems; Multi-objective multi-criteria; Multiple stakeholder processes
Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication
Keywords: تأیید هویت کاربر; Keystroke dynamics; Biometrics; User authentication; Data quality; Artificial rhythms; Tempo cues; Novelty detection
A remote user authentication scheme without using smart cards
Keywords: تأیید هویت کاربر; Cryptography; User authentication; Password; Smart card
Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems
Keywords: تأیید هویت کاربر; peer-to-peer (P2P) live streaming; user authentication; key management; hash chain; media-dependent;
A self-verification authentication mechanism for mobile satellite communication systems
Keywords: تأیید هویت کاربر; Mobile satellite communication system; Personal communication system; User authentication; Key establishment; Public-key management; Self-verification
Keystroke dynamics-based authentication for mobile devices
Keywords: تأیید هویت کاربر; Mobile device; Keystroke dynamics; Artificial rhythms; Tempo cues; Biometrics; User authentication
A fingerprint-based user authentication protocol considering both the mobility and security in the telematics environment
Keywords: تأیید هویت کاربر; User authentication; Fingerprint; Telematics
uWave: Accelerometer-based personalized gesture recognition and its applications
Keywords: تأیید هویت کاربر; Gesture recognition; Acceleration; Dynamic time warping; Personalized gesture; User authentication
Efficient password authenticated key agreement using bilinear pairings
Keywords: تأیید هویت کاربر; User authentication; Session key agreement; Identity protection; Bilinear pairings; Smart cards
Defense against outside attacks in wireless sensor networks
Keywords: تأیید هویت کاربر; Wireless sensor network; User authentication; Node capturing; Outside Security; Cellular automata
A new method for using hash functions to solve remote user authentication
Keywords: تأیید هویت کاربر; User authentication; Password; Hash function; Cryptography; Mutual authentication
Criteria to evaluate Automated Personal Identification Mechanisms
Keywords: تأیید هویت کاربر; Automated Personal Identification Mechanism; User authentication; Biometric verification; Biometric identification; Risk; Vulnerabilities; Reliability; Usability; Privacy; Accessibility
Advanced user authentication for mobile devices
Keywords: تأیید هویت کاربر; Keystroke analysis; User authentication; Biometrics; Mobility; Composite authentication
SSL/TLS session-aware user authentication – Or how to effectively thwart the man-in-the-middle
Keywords: تأیید هویت کاربر; Security; Man-in-the-middle attack; SSL/TLS protocol; User authentication; Electronic commerce
Cryptanalysis of the modified authenticated key agreement scheme
Keywords: تأیید هویت کاربر; Authenticated key agreement; Cryptanalysis; User authentication;
Query-directed passwords
Keywords: تأیید هویت کاربر; User authentication; Passwords; Knowledge-based authentication; Challenge questions; Password reset; Password creation; Call center authentication;
Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems
Keywords: تأیید هویت کاربر; User authentication; Visual memory; Usability; Security;