Showing 1 - 20 results of 18,352 for search 'By Authority,', query time: 5.17s Refine Results
  1. 1
  2. 2
  3. 3

    Windows Media 9 series by example / by Johnson, Nels, Safari Books Online

    Published: Focal Press, 2013
    Get full text
    Online Book
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Data exploration using example-based methods / by Lissandrini, Matteo, Mottin, Davide, Palpanas, Themis, 1973-, Velegrakis, Yannis, 1973-, Synthesis.

    Table of Contents: “…Conclusions -- Bibliography -- Authors' biographies.…”
    Get full text
    Online Book
  13. 13
  14. 14
  15. 15

    Emerging technologies for authorization and authentication : First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, proceedings / by ETAA (Workshop) Barcelona, Spain), SpringerLink (Online service)

    Published: Springer, 2018
    Table of Contents: “…Authentication and authorization techniques -- Authentication and authorization for interoperable IoT architecture -- Bringing Access Control Tree to Big Data -- SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme -- A Protocol to Strengthen Password-Based Authentication(short paper) -- Managing Private Credentials by Privacy-Preserving Biometrics -- Policy Support for Autonomous Swarms of Drones -- Violation Detection and Countermeasures -- A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts -- Towards a Framework for Testing the Security of IoT Devices Consistently -- Misuse Detection in a Simulated IaaS Environment -- Dissuading Stolen Password Reuse.…”
    Get full text
    Online Conference Proceeding Book
  16. 16

    Emerging technologies for authorization and authentication : 5th International Workshop, ETAA 2022, Copenhagen, Denmark, September 30, 2022, revised selected papers / by ETAA (Workshop) Copenhagen, Denmark), SpringerLink (Online service)

    Published: Springer, 2023
    Table of Contents: “…An Ontology-based Approach for Setting Security Policies in Smart Homes -- Clap Auth: A Gesture-based User-Friendly Authentication Scheme to Access a Secure Infrastructure -- User Authentication on Headset-like Devices By Bio-Acoustic Signals.-The measurable Environment as Nonintrusive Authentication Factor On the Example of WiFi Beacon Frames -- Protecting FIDO Extensions against Man-in-the-Middle Attacks -- Authentication, Authorization and Selective Disclosure for IoT Data Sharing using Verifiable Credentials and Zero-Knowledge Proofs -- Privacy-Preserving Speaker Verification and Speech Recognition -- An E-Voting System Based on Tornado Cash -- Linking Contexts from Distinct Data Sources in Zero Trust Federation.…”
    Get full text
    Online Conference Proceeding Book
  17. 17
  18. 18
  19. 19
  20. 20

    Science under fire : challenges to scientific authority in modern America / by Jewett, Andrew, 1970-, JSTOR

    Published: Harvard University Press, 2020
    Table of Contents: “…Introduction: Science by association -- Making modern minds -- Resisting the modern -- A scientific state -- Science and human behavior -- Facts and values -- Two cultures -- A new right -- Cross-fertilization -- A new left -- Skepticism instantiated -- Beyond universalism -- Conclusion: Scientific authority in pieces?…”
    Get full text
    Online Book