Search query: authentication

Categories: All Categories


13142 records searched, 30 records found, top 20 matches displayed

Next 20 articles >


Search Hints:

  • Use a + (plus sign) or - (minus sign) to include or exclude a word: +mars -venus
  • Use a ? (question mark) as a wildcard for a single letter: te?t (test,text)
  • Use a * (asterisk) as a wildcard for multiple letters: he*t (heat, heart)
  • Use a ~ (tilde) to expand word endings: meteor~ (meteorite, meteorid, meteorology)


Most frequent words for articles published in the last 45 days:
developed (95), climate (85), team (83), species (75), cells (74), used (72), human (64), help (61), change (60), water (60), years (60), data (57), energy (55), such (53), carbon (51), discovered (50), time (48), like (47), materials (46), even (44)


Return to the site home page

Computer Science: Encryption Physics: Acoustics and Ultrasound
Published

How secure are voice authentication systems really?      (via sciencedaily.com)     Original source 

Computer scientists have discovered a method of attack that can successfully bypass voice authentica...

Engineering: Biometric
Published

This tiny, tamper-proof ID tag can authenticate almost anything      (via sciencedaily.com)     Original source 

A cryptographic tag uses terahertz waves to authenticate items by recognizing the unique pattern of ...

Engineering: Biometric
Published

3D biometric authentication based on finger veins almost impossible to fool - 3D Biometric Authentication Based on Finger Veins Almost Impossible to Fool      (via sciencedaily.com) 

Biometric authentication, which uses unique anatomical features such as fingerprints or facial featu ...

Chemistry: Biochemistry Chemistry: Organic Chemistry Computer Science: Encryption Computer Science: General Physics: General
Published

Protecting art and passwords with biochemistry      (via sciencedaily.com)     Original source 

A new molecular test method helps to prove the authenticity of works of art. The new method could al ...

Engineering: Biometric
Published

Face off for best ID checkers - Face Off for Best ID Checkers      (via sciencedaily.com) 

The Glasgow Face Matching Test has been updated to find super-recognizers who can help prevent error...

Computer Science: Encryption
Published

Thinking like a cyber-attacker to protect user data - Thinking Like a Cyber-Attacker to Protect User Data      (via sciencedaily.com) 

Researchers have shown that a component of modern computer processors that enables different areas o...

Offbeat: Plants and Animals
Published

Researchers tickle rats to identify part of the brain critical for laughter and playfulness      (via sciencedaily.com)     Original source 

To study play behaviors in animals, scientists must be able to authentically simulate play-conducive ...

Physics: Optics
Published

New anti-counterfeit technique packs two light-reactive images into one material      (via sciencedaily.com)     Original source 

Growing concern about data theft and counterfeiting has inspired increasingly sophisticated security...

Physics: Acoustics and Ultrasound
Published

Leadership online: Charisma matters most in video communication - Leadership Online: Charisma Matters Most in Video Communication      (via sciencedaily.com) 

Managers need to make a consistent impression in order to motivate and inspire people, and that appl...

Biology: Biochemistry Chemistry: Biochemistry
Published

Tackling counterfeit seeds with 'unclonable' labels - Tackling Counterfeit Seeds with 'Unclonable' Labels      (via sciencedaily.com) 

As a way to reduce seed counterfeiting, researchers developed a silk-based tag that, when applied to...

Computer Science: Encryption
Published

Impenetrable optical OTP security platform - Impenetrable Optical OTP Security Platform: The Future of Data Protection      (via sciencedaily.com) 

An anticounterfeiting smart label and security platform which makes forgery fundamentally impossible...

Engineering: Biometric
Published

High-security identification that cannot be counterfeited - High-Security Identification That Cannot Be Counterfeited      (via sciencedaily.com) 

Researcher have used the principles that underpin the whispering-gallery effect to create an unbeata...

Engineering: Biometric
Published

Unlock your smartphone with earbuds - Unlock Your Smartphone with Earbuds      (via sciencedaily.com) 

A research team is developing EarEcho, a biometric tool that uses modified wireless earbuds to authe...

Computer Science: Encryption Engineering: Biometric
Published

Radio waves for the detection of hardware tampering - Radio Waves for the Detection of Hardware Tampering      (via sciencedaily.com) 

Up to now, protecting hardware against manipulation has been a laborious business: expensive, and on...

Engineering: Biometric
Published

Sniffing out your identity with breath biometrics - Sniffing Out Your Identity with Breath Biometrics      (via sciencedaily.com) 

Researchers have developed an artificial 'nose' that can identify individuals from their breath. Bui...

Computer Science: Encryption
Published

Cybersecurity vulnerabilities of common seismological equipment - Cybersecurity Vulnerabilities of Common Seismological Equipment      (via sciencedaily.com) 

Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt...