Sfoglia per Soggetto "Authentication"
Items 1-20 di 28
-
Abax: 2D/3D legaliser supporting look-ahead legalisation and blockage strategies
(2018)Abax is a modern version of the classical Abacus, minimum displacement, greedy legaliser. Abax supports single-tier 2D or 3D legalisation for multiple, logic-on-logic 3D-IC tiers, efficient look-ahead legalisation of ... -
A Blockchained Secure and Integrity-Preserved Architecture for Military Logistics Operations
(2022)The employment of 5G Internet of Things (5G-IoT), smart automation, and AI analytics can provide improved military logistics, by enhancing inventory control, reordering, accuracy, flexibility mobility, and real-time ... -
Cross-layer optimized authentication and error control for wireless 3D medical video streaming over LTE
(2017)3D video for tele-medicine applications is gradually gaining momentum since the 3D technology can provide precise location information. However, the weak link for 3D video streaming is the necessary wireless link of the ... -
A distributed biometric authentication scheme based on blockchain
(2020)Biometric authentication is the preferred authentication scheme in modern computing systems. While it offers enhanced usability, it also requires cautious handling of sensitive users' biometric templates. In this paper, a ... -
Domocus: Lock free parallel legalization in standard cell placement
(2017)In the cell placement problem a circuit's cells must be placed within a specified chip area so that they are row aligned and contain no overlaps. The problem is usually tackled in phases, whereby in the first phase a global ... -
Enhanced tetris legalization
(2016)Legalization and detailed placement methods for standard cell designs, are two of the most notable topics in current VLSI research. Being the final steps in a classic placement procedure they must be efficient in terms of ... -
Exploiting Net Connectivity in Legalization and Detailed Placement Scenarios
(2022)Standard-cell placement is the fundamental step in a typical VLSI/ASIC design flow. Its result, paired with the outcome of the routing procedure can be the decisive factor in rendering a design manufacturable. Global ... -
Foodomics in bee product research: a systematic literature review
(2021)Foodomics is an emerging research field in food science that applies advanced omics technologies to assess relevant aspects related to food and nutrition, with the ultimate goal to improve human health and well-being. Many ... -
The importance of biometric sensor continuous secure monitoring
(2008)The security of a biometric information system depends partially on the ability of the biometric information sensor to authenticate itself securely to the processing centre it usually interacts with, thus ensuring that the ... -
Investigation and trade-offs in 3DIC partitioning methodologies: N/A
(2019)In this work, we compare alternative 3DIC partitioning methodologies, in terms of slack, number of inter-tier vias, Tier Area Ratio (TAR) and HPWL design parameters. The popular 3DIC postplacement, bin-based Fidducia-Mattheyses ... -
Multi-screen lock: Visual passwords from user’s social data
(2019)A critical issue for a mobile device user is the protection of stored sensitive data and their access, via the device. A widely used technique for protecting the mobile device with a display is the lock screen. Many security ... -
A novel Two-Factor HoneyToken Authentication Mechanism
(2021)The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted form. Users hold the ... -
Performance evaluation of tetris-based legalization heuristics
(2016)Algorithms for standard cell placement legalization have attracted significant research efforts in the past. A prominent member of this category is the Tetris algorithm which is a simple and particularly fast method for ... -
Physico-chemical and sensory attributes in conjunction with multivariate analysis of two potato (Solanum tuberosum L.) cultivars after 90 days of storage: an exploratory authentication study
(2008)Two cultivars of potato (Spunta and Agria), were studied in terms of their physico-chemical and sensory characteristics. These cultivars were cultivated in three geographical regions of Greece (Macedonia, North Greece; ... -
R-Abax: A radiation hardening legalisation algorithm satisfying TMR spacing constraints
(2020)Faults caused by ionising radiation have become a significant reliability issue in modern ICs. However, the Radiation Hardening (RADHARD) design flow differs from the standard design flow. Thus, there is not sufficient ... -
Radiation Hardening Legalisation Satisfying TMR Spacing Constraints with Respect to HPWL
(2020)Reduction in device feature sizes and supply voltage renders modern Integrated Circuits (ICs) more susceptible to Soft Errors (SEs), i.e. Transient Faults caused by ionising radiation. Moreover, the RADiation HARDening ... -
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
(2018)This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G cellular ... -
Security Revisited: Honeytokens meet Google Authenticator
(2022)In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors ... -
Solon: A holistic approach for modelling, managing and mining legal sources
(2018)Recently there has been an exponential growth of the number of publicly available legal resources. Portals allowing users to search legal documents, through keyword queries, are now widespread. However, legal documents are ... -
Speed optimized face recognition on mobile devices using Eigenfaces decomposition
(2010)Face recognition on mobile devices can be utilized for security applications (e.g., user authentication) or in the context of pervasive and assistive computing for the support of elderly suffering from dementia in recognizing ...