Search query: authentication
Categories: All Categories
13142 records searched, 30 records found, top 20 matches displayed
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words for articles published in the last 45 days:
developed (95),
climate (85),
team (83),
species (75),
cells (74),
used (72),
human (64),
help (61),
change (60),
water (60),
years (60),
data (57),
energy (55),
such (53),
carbon (51),
discovered (50),
time (48),
like (47),
materials (46),
even (44)
Published How secure are voice authentication systems really? (via sciencedaily.com) Original source
Computer scientists have discovered a method of attack that can successfully bypass voice authentica...
Published This tiny, tamper-proof ID tag can authenticate almost anything (via sciencedaily.com) Original source
A cryptographic tag uses terahertz waves to authenticate items by recognizing the unique pattern of ...
Published Real-world study shows the potential of gait authentication to enhance smartphone security - Real-World Study Shows the Potential of Gait Authentication to Enhance Smartphone Security (via sciencedaily.com)
A study showed that -- within an appropriate framework -- gait recognition could be a viable techniq...
Published Scientific advance leads to a new tool in the fight against hackers - Scientific Advance Leads to a New Tool in the Fight Against Hackers (via sciencedaily.com)
A new form of security identification could soon see the light of day and help us protect our data f...
Published 3D biometric authentication based on finger veins almost impossible to fool - 3D Biometric Authentication Based on Finger Veins Almost Impossible to Fool (via sciencedaily.com)
Biometric authentication, which uses unique anatomical features such as fingerprints or facial featu ...
Published Protecting art and passwords with biochemistry (via sciencedaily.com) Original source
A new molecular test method helps to prove the authenticity of works of art. The new method could al ...
Published Face off for best ID checkers - Face Off for Best ID Checkers (via sciencedaily.com)
The Glasgow Face Matching Test has been updated to find super-recognizers who can help prevent error...
Published Thinking like a cyber-attacker to protect user data - Thinking Like a Cyber-Attacker to Protect User Data (via sciencedaily.com)
Researchers have shown that a component of modern computer processors that enables different areas o...
Published Researchers tickle rats to identify part of the brain critical for laughter and playfulness (via sciencedaily.com) Original source
To study play behaviors in animals, scientists must be able to authentically simulate play-conducive ...
Published Some black truffles grown in eastern U.S. may be less valuable lookalike species, study finds - **Some black truffles grown in eastern U.S. may be less valuable lookalike species, study finds** (via sciencedaily.com) Original source
Black truffle growers are unintentionally growing less-expensive winter truffles, which may lead to...
Published New anti-counterfeit technique packs two light-reactive images into one material (via sciencedaily.com) Original source
Growing concern about data theft and counterfeiting has inspired increasingly sophisticated security...
Published Leadership online: Charisma matters most in video communication - Leadership Online: Charisma Matters Most in Video Communication (via sciencedaily.com)
Managers need to make a consistent impression in order to motivate and inspire people, and that appl...
Published Tackling counterfeit seeds with 'unclonable' labels - Tackling Counterfeit Seeds with 'Unclonable' Labels (via sciencedaily.com)
As a way to reduce seed counterfeiting, researchers developed a silk-based tag that, when applied to...
Published Impenetrable optical OTP security platform - Impenetrable Optical OTP Security Platform: The Future of Data Protection (via sciencedaily.com)
An anticounterfeiting smart label and security platform which makes forgery fundamentally impossible...
Published High-security identification that cannot be counterfeited - High-Security Identification That Cannot Be Counterfeited (via sciencedaily.com)
Researcher have used the principles that underpin the whispering-gallery effect to create an unbeata...
Published Sub-surface imaging technology can expose counterfeit travel documents - Sub-Surface Imaging Technology: The Solution to Exposing Counterfeit Travel Documents (via sciencedaily.com)
New research has found that optical coherence tomography (OCT) imaging technology can be utilized to...
Published Unlock your smartphone with earbuds - Unlock Your Smartphone with Earbuds (via sciencedaily.com)
A research team is developing EarEcho, a biometric tool that uses modified wireless earbuds to authe...
Published Radio waves for the detection of hardware tampering - Radio Waves for the Detection of Hardware Tampering (via sciencedaily.com)
Up to now, protecting hardware against manipulation has been a laborious business: expensive, and on...
Published Sniffing out your identity with breath biometrics - Sniffing Out Your Identity with Breath Biometrics (via sciencedaily.com)
Researchers have developed an artificial 'nose' that can identify individuals from their breath. Bui...
Published Cybersecurity vulnerabilities of common seismological equipment - Cybersecurity Vulnerabilities of Common Seismological Equipment (via sciencedaily.com)
Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt...