Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
QR code security: A survey of attacks and challenges for usable security
QR (Quick Response) codes are two-dimensional barcodes with the ability to encode
different types of information. Because of their high information density and robustness, QR …
different types of information. Because of their high information density and robustness, QR …
Strong authentication token with visual output of PKI signatures
D Marien - US Patent 8,966,268, 2015 - Google Patents
(57) ABSTRACT A handheld authentication device comprising a data proces sor and a
display is adapted to: generate an input value; Submit the input value to an asymmetric …
display is adapted to: generate an input value; Submit the input value to an asymmetric …
Spamming the Internet of Things: A Possibility and its probable Solution
F Razzak - Procedia computer science, 2012 - Elsevier
Abstract The Internet of Things (IoT) enabled users to bring physical objects into the sphere
of cyber world. This was made possible by different tagging technologies like NFC, RFID …
of cyber world. This was made possible by different tagging technologies like NFC, RFID …
An analytical predictive models and secure web-based personalized diabetes monitoring system
Diabetes, in all of its types, costs countries of all income levels unacceptably enormous
personal, societal, and economic expenses. To predict type-2 diabetes, this work aimed to …
personal, societal, and economic expenses. To predict type-2 diabetes, this work aimed to …
security of QR codes
I Kapsalis - 2013 - ntnuopen.ntnu.no
The 2-dimensional barcodes known as QR (Quick Response) Codesare increasing their
popularity as they appear in more places in theurban environment. QR Codes can be …
popularity as they appear in more places in theurban environment. QR Codes can be …
Hands-free one-time and continuous authentication using glass wearable devices
This paper investigates whether glass wearable devices can be used to authenticate end-
users, both to grant access (one-time) and to maintain access (continuous), in a hands-free …
users, both to grant access (one-time) and to maintain access (continuous), in a hands-free …
QR-based inventory management system (QR-IMS) of passenger luggage using website
DRA Shirley, RB Amruthavarshni… - … and control systems …, 2021 - ieeexplore.ieee.org
This research is an attempt to optimize web content in the m-flight environment. It provides
the design and implementation of a travel booking system based on a paperless mobile …
the design and implementation of a travel booking system based on a paperless mobile …
On the generation of alphanumeric one time passwords
S Srivastava, M Sivasankar - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
One Time Password (OTP) is a type of password that is valid for only one time use (use them
once and throw them away). It is an automatically generated string of numbers that will …
once and throw them away). It is an automatically generated string of numbers that will …
Secure authentication via encrypted qr code
H Kanakia, S Shaikh, Y Koyande… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
In this research study, a secure client-to-client communication system using QR code
encryption and one-time passwords (OTPs) is introduced. The report discusses how modern …
encryption and one-time passwords (OTPs) is introduced. The report discusses how modern …
[PDF][PDF] Security analysis of mobile authentication using QR-codes
The QR-Code authentication system using mobile application is easily implemented in a
mobile device with high recognition rate without short distance wireless communication …
mobile device with high recognition rate without short distance wireless communication …