-
81
-
82
-
83
-
84
-
85
-
86
Using mouse strokes to verify user identity
Published 2011“…The mouse is a piece of relatively cheap peripheral hardware that most users with a computer would have. The aim of this project is to try to see if it is possible to verify a user using the mouse movements created by this user. …”
Get full text
Final Year Project (FYP) -
87
Verifying on-line handwritten signature using neural networks approach
Published 2000Get full text
Book Section -
88
Verifying linearizability via optimized refinement checking
Published 2013Get full text
Get full text
Journal Article -
89
-
90
-
91
VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems
Published 2023-08-01Subjects: Get full text
Article -
92
-
93
-
94
Verifiably private outsourcing scheme for multivariate polynomial evaluation
Published 2015-08-01Subjects: “…cloud computing;big data;multivariate polynomial;verifiable outsourcing computing;multilinear map…”
Get full text
Article -
95
Verifiably private outsourcing scheme for multivariate polynomial evaluation
Published 2015-08-01Subjects: Get full text
Article -
96
-
97
-
98
Verifying temporal data in geotagged images via sun Azimuth estimation
Published 2012Get full text
Get full text
Journal Article -
99
Verifying data integrity of influenza genome database
Published 2018Get full text
Final Year Project (FYP) -
100
Secure Data Sharing With Lightweight Computation in E-Health
Published 2020-01-01Subjects: “…Edge computing…”
Get full text
Article