Sign Up to like & get
recommendations!
0
Published in 2018 at "Advanced materials"
DOI: 10.1002/adma.201801523
Abstract: In situ reduction of chloroauric acid inside an amine-cured epoxy matrix leads to formation of gold nanoparticles which are embedded inside the part. This phenomenon is leveraged to design an authentication system for composites wherein…
read more here.
Keywords:
authentication;
authentication epoxy;
situ nanoparticle;
epoxy composites ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Advanced Optical Materials"
DOI: 10.1002/adom.202102402
Abstract: DOI: 10.1002/adom.202102402 Union (EU), counterfeit products traded in 2019 alone were valued at USD 134 billion (5.8% of the EU imports).[1] Beyond economic consequences, counterfeiting can also endanger human lives, for example, by producing unsafe…
read more here.
Keywords:
anti counterfeiting;
database;
counterfeiting labels;
label ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Journal of Applied Polymer Science"
DOI: 10.1002/app.55472
Abstract: Photochromic inks have been a tempting authentication method to make commercial items more resistant to counterfeiting. However, recent studies have shown that photochromic inks have major drawbacks, such as expensiveness and low durability. Herein, we…
read more here.
Keywords:
electrospun nanofibrous;
authentication;
transparent electrospun;
nanofibrous membrane ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Microscopy Research and Technique"
DOI: 10.1002/jemt.23816
Abstract: Soft biometric information, such as gender, iris, and voice, can be helpful in various applications, such as security, authentication, and validation. Iris is secure biometrics with low forgery and error rates due to its highly…
read more here.
Keywords:
gender;
authentication;
gender classification;
iris images ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Journal of Basic Microbiology"
DOI: 10.1002/jobm.202200419
Abstract: Microbial inoculants are globally recommended for plant growth promotion and control of plant pathogens. These inoculants require stringent quality checks for sustainable field efficacy. Questionable regulatory frameworks constantly deteriorate the reliability of bio‐inoculant technology. Existing…
read more here.
Keywords:
authentication;
marker potential;
scar;
plant ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Journal of the science of food and agriculture"
DOI: 10.1002/jsfa.8572
Abstract: BACKGROUND Fraudulent mislabelling of processed meat products on a global scale that cannot be detected using conventional techniques necessitates sensitive, robust and accurate methods of meat authentication to ensure food safety and public health. In…
read more here.
Keywords:
based proteomic;
authentication;
meat;
gel offgel ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Rapid Communications in Mass Spectrometry"
DOI: 10.1002/rcm.8474
Abstract: Rationale Authentication of fish is of importance in the view of toxins, allergen warnings and economic fraud control. Traditional methods in the authentication of fish, e.g. morphological, genetic and proteomic analysis, are either at low…
read more here.
Keywords:
authentication;
mass spectrometry;
fish skin;
mass ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Small"
DOI: 10.1002/smll.202400261
Abstract: Modern cryptography based on computational complexity theory is mainly constructed with silicon-based circuits. As DNA nanotechnology penetrates the molecular domain, utilizing molecular cryptography for data access protection in the biomolecular domain becomes a unique approach…
read more here.
Keywords:
information;
authentication;
authentication strategies;
cryptography ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Soft Computing"
DOI: 10.1007/s00500-016-2440-3
Abstract: The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not…
read more here.
Keywords:
key authentication;
authentication scheme;
authentication;
public key ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2018 at "Soft Computing"
DOI: 10.1007/s00500-017-2607-6
Abstract: Multifactor authentication (MFA) is a growing trend for the accurate identification of the legitimate users through different modalities such as biometrics, nonbiometric, and cognitive behavior metric. In this paper, we have developed an adaptive MFA…
read more here.
Keywords:
fuzzy decision;
authentication;
decision support;
multifactor authentication ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Soft Computing"
DOI: 10.1007/s00500-019-03881-z
Abstract: AbstractBiometric recognition recognizes an identification of an individual which can be obtained with the biological characteristics such as fingerprint, iris, and voice. The challenge of biometric recognition is the matching of fingerprint database with some…
read more here.
Keywords:
methodology;
distance;
authentication;
minkowski distance ... See more keywords