Search query: authentication
Categories: All Categories
13142 records searched, 30 records found, 20 matches displayed
Search Hints:
- Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
- Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
- Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
- Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)
Most frequent words for articles published in the last 45 days:
developed (95),
climate (85),
team (83),
species (75),
cells (74),
used (72),
human (64),
help (61),
change (60),
water (60),
years (60),
data (57),
energy (55),
such (53),
carbon (51),
discovered (50),
time (48),
like (47),
materials (46),
even (44)
Published Agriculture tech use opens possibility of digital havoc - Agriculture Tech Use Opens Possibility of Digital Havoc (via sciencedaily.com)
Wide-ranging use of smart technologies is raising global agricultural production but international r...
Published A Tale of Terroir: Porcini mushrooms have evolved with a preference to local adaptation - A Tale of Terroir: Porcini Mushrooms Have Evolved with a Preference to Local Adaptation (via sciencedaily.com)
A genetic survey of porcini mushrooms across the Northern Hemisphere found that these delicious fung...
Published Ancient Roman coins reveal long-lost emperor - Ancient Roman Coins Reveal Long-Lost Emperor (via sciencedaily.com)
A gold coin long dismissed as a forgery appears to be authentic and depicts a long-lost Roman empero ...
Published Does throwing my voice make you want to shop here? - Does Throwing My Voice Make You Want to Shop Here? (via sciencedaily.com)
By breaking the laws of physics in a virtual reality environment, researchers find that changing the...
Published Moral behavior pays off - Moral Behavior Pays Off: The Benefits of Being a Good Person (via sciencedaily.com)
Coupling two approaches of game theory can shed light on how moral norms evolve. ABSTRACT: Moral Beh...
Published Secure communication with light particles - Secure Communication with Light Particles: A Breakthrough in Quantum Cryptography (via sciencedaily.com)
While quantum computers offer many novel possibilities, they also pose a threat to internet security...
Published Double locked: Polymer hydrogels secure confidential information - Double Locked: Polymer Hydrogels Secure Confidential Information (via sciencedaily.com)
The development of highly secure but simple and inexpensive encryption technology for the prevention...
Published Automatic speaker recognition technology outperforms human listeners in the courtroom - Automatic Speaker Recognition Technology Outperforms Human Listeners in the Courtroom (via sciencedaily.com)
The forensic-voice-comparison system, based on state-of-the-art automatic-speaker-recognition techno...
Published Bulletproof fingerprint technology takes images in the round - Bulletproof Fingerprint Technology Takes Images in the Round (via sciencedaily.com)
Experts have developed a unique method for retrieving high resolution images of fingermarks from cur...
Published Epigenetic fingerprint as proof of origin for chicken, shrimp and salmon - Epigenetic Fingerprint as Proof of Origin for Chicken, Shrimp, and Salmon (via sciencedaily.com)
Free-range organic chicken or factory farming? Scientists have developed a new detection method that...