Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Jean Gourd"'
Publikováno v:
IEEE Access, Vol 8, Pp 79069-79078 (2020)
Two-factor authentication (2FA) systems implement by verifying at least two factors. A factor can be one or more of something a user knows (password, or phrase), something a user possesses (smart card, or smartphone), something a user is (fingerprint
Externí odkaz:
https://doaj.org/article/242781eb2a9044479182376f6c3a79be
Publikováno v:
Analele Universităţii din Oradea: Seria Geografie, Vol 24, Iss 2, Pp 143-157 (2014)
Nine different widely used classification methods available in ArcGIS and ERDAS software packages weretested on Landsat 7 imagery with the objective to compare their performance and adequacy in classifying six major land cover elements: urban/comme
Externí odkaz:
https://doaj.org/article/c7906d65e6ae4776b06db3cd315e6bb6
Autor:
Jean Gourd, Ali Abdullah S. AlQahtani
Traditional two-factor authentication (2FA) systems often require users to enter a code or use a physical token, which can be inconvenient or inconvenient. In this paper, we propose a novel zero-effort 2FA system that utilizes the characteristics of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::28ab8724ba6027afc5e5f4c8993bf78e
https://doi.org/10.36227/techrxiv.21824736.v2
https://doi.org/10.36227/techrxiv.21824736.v2
Publikováno v:
COMSNETS
Beacon frame is a type of management frame that is transmitted periodically by Wi-Fi Access Points (APs) for the purpose of establishing connections; also, it announces the existence of a network, allowing devices to find and identify the network and
Publikováno v:
2020 IEEE International Conference on Communication, Networks and Satellite (Comnetsat).
Beacon frame is a type of management frame that is transmitted periodically by Wi-Fi access points (APs) for the purpose of establishing connections; also, it announces the existence of a network, allowing devices to find and identify the network and
Publikováno v:
IIT
Two-factor authentication (2FA) systems implement by verifying at least two factors. A factor is something a user knows (password, or phrase), something a user possesses (smart card, or smartphone), something a user is (fingerprint, or iris), somethi
Autor:
Hosam Alamleh, Jean Gourd
Publikováno v:
2020 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW).
Mobile devices can sense several types of signals over the air using different radio frequency technologies (e.g., Wi-Fi, Bluetooth, cellular signals, etc.). Furthermore, mobile devices receive broadcast messages from transmitting entities (e.g., net
Publikováno v:
Journal of Advanced Computational Intelligence and Intelligent Informatics. 12:142-149
Developing broadband and internet technologies offers possibilities for new ways of minimizing the server bottleneck in online gaming as well as an increase in response and reliability. We look at a peer-to-peer (P2P) approach to circumnavigate some
Publikováno v:
International Journal of Intelligent Systems. 22:1139-1154
The Internet has become a critical tool for information and communication that has reached much of the developed world. It is comprised of numerous components, of which the World Wide Web (WWW) is the largest and fastest growing. Efficient functional