Skip to main content
Koha online
Your cart is empty.
Cart
Lists
Public lists
WISE
joshi shubhangi
Computer Science
Technical communication
Your lists
Log in to create your own lists
Log in to your account
Your cookies
Search history
SNDT WOMEN'S UNIVERSITY
BMK Knowledge Resource Centre
Vithaldas Vidyavihar, Juhu Tara Road,
Santacruz (West) Mumbai - 400049
Search the catalog by:
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Search the catalog by keyword
Advanced search
Authority search
Tag cloud
Contact
Log in to your account
Card number or username:
Password:
Home
Advanced search
Results of search for 'su:"Authentication"'
Refine your search
Availability
Limit to records with available items
Authors
A.Kumaravel
Byung-Wook Jin
C.Raghavendra
Dr.B.Indrani
Dr.M.Amutha Prabakar
D.Srujan chandra red...
Faryal Munawar
gangadhar rao kanche...
M. R. Vishnuraj
Syeda Maham Jafri
Vijaykumari rodda
V. Sundaresan
V.V.Sunil kumar
Show more
Show less
Item types
Journal Article
Your search returned 8 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to cart
Add to list
New list
Place hold
Results
1.
An Efficient Password Based Authentication Scheme Using Dynamic Identity and Smart Card
by
Dr.B.Indrani
Dr.M.Amutha Prabakar
In:
Journal of Advance Software Engineering
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
2.
Authentication of traditional meat products (Haleem) sold in India: a first report confirming species mislabelling
by
M. R. Vishnuraj
In:
Journal of Food Science and Technology
Germany Springer
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
3.
A Design of Key Generation Protocol For User Autority In cloud Computing Environment
by
Byung-Wook Jin
In:
Indian Journal of Signal & Image Processing
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
4.
Personal Authentication System by Iris Biometric Using Log Gabor Filter Technique
by
C.Raghavendra
A.Kumaravel
In:
International Journal of Computer and Electronics Engineering
New Delhi Serial Publication
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
5.
Integration Of Blockchained-Enabled Ai Systems Into Clo3d
by
Faryal Munawar
Syeda Maham Jafri
In:
Textile Trends
West bengal Eastland Publications Private Limited
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
6.
Shoulder-surfing resistant graphical password system for cloud
by
Vijaykumari rodda
gangadhar rao kancherla
In:
Indian Journal of Simulation and Wireless Communication
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
7.
Trust based secure information exchange betwwen user ang sensor node using authentication method and verified at each gateway node in wireless network
by
D.Srujan chandra reddy
V.V.Sunil kumar
In:
International Journal of Soft Computing Process and Techniques
New Delhi
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
8.
Authentication and trade of true cinnamon: need for regulation and promotion of sustainable cultivation
by
V. Sundaresan
In:
Current Science
Availability:
Items available for loan:
SNDT Juhu
(1).
Place hold
Save to lists
Add to cart
(remove)
Not finding what you're looking for?
Make a
purchase suggestion