Ingredient 发表于 2025-3-23 09:59:33

Guerino Mazzola,Maria Mannone,Yan Pang user biometric data is the method of this work. The common methods of biometric authentication, existing methods for their protection and existing network steganography methods were analyzed. The method of remote biometric authentication using network steganography for various systems is presented.

伪造者 发表于 2025-3-23 16:34:40

http://reply.papertrans.cn/15/1485/148441/148441_12.png

上釉彩 发表于 2025-3-23 20:50:22

Cloud-Based Architecture Development to Share Vehicle and Traffic Information for Industry 4.0or, and increasing safety on the roads. For example, during the winter season, municipal employees will not have to wait at night to intervene in road freezing. Employees will instantly monitor which roads are at risk of icing through the data collected from the vehicles on the road and municipal wo

ANIM 发表于 2025-3-23 22:36:55

http://reply.papertrans.cn/15/1485/148441/148441_14.png

疏远天际 发表于 2025-3-24 05:27:57

Biometric Cryptosystems: Overview, State-of-the-Art and Perspective Directionsaphic systems, which are designed to generate secure pseudorandom sequences that can be used as cryptographic keys, passwords etc., are investigated. A comparative analysis of various biometric cryptosystems with the determination of their advantages and disadvantages is carried out. The perspective

不能根除 发表于 2025-3-24 09:51:36

Biometric Authentication Using Convolutional Neural Networksks (spoofing attacks) is proposed. The method is based on the use of an artificial convolutional neural network which was trained using a Replay-Attack Database from Idiap Research Institute. The obtained results show high efficiency of the proposed method of detecting spoofing attacks: the probabil

Oligarchy 发表于 2025-3-24 12:12:13

http://reply.papertrans.cn/15/1485/148441/148441_17.png

Arbitrary 发表于 2025-3-24 17:12:44

Ontological Fundamentals of Scientific and Education Portals for relevant information are presented. The model of aggregate displaying portal thematic resources is given. Formation means in the use of scientific and educational portals on the base of the component architecture of WEB-semantics services are determined and it describes their mechanisms applica

Iniquitous 发表于 2025-3-24 22:46:36

http://reply.papertrans.cn/15/1485/148441/148441_19.png

Inkling 发表于 2025-3-25 00:09:24

http://reply.papertrans.cn/15/1485/148441/148441_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Advances in Information and Communication Technology and Systems; Mykhailo Ilchenko,Leonid Uryvsky,Larysa Globa Conference proceedings 202