Sign Up to like & get
recommendations!
0
Published in 2019 at "Journal of Statistical Planning and Inference"
DOI: 10.1016/j.jspi.2018.09.009
Abstract: Abstract A common assumption made in the study of supersaturated designs is the nonexistence of interaction effects. In this paper, however, we consider the constructions of supersaturated designs without this assumption. We propose and study…
read more here.
Keywords:
supersaturated designs;
foldover supersaturated;
two factor;
factor interactions ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "Advances in Applied Probability"
DOI: 10.1017/apr.2017.37
Abstract: Abstract We study an affine two-factor model introduced by Barczy et al. (2014). One component of this two-dimensional model is the so-called α-root process, which generalizes the well-known Cox–Ingersoll–Ross process. In the α = 2…
read more here.
Keywords:
factor model;
process;
model;
two factor ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Statistics"
DOI: 10.1080/02331888.2017.1319834
Abstract: ABSTRACT The between-within split of total sum of squares in one-way analysis of variance (ANOVA) is intuitively appealing and computationally simple, whether balanced or not. In the balanced two-factor setting, the same heuristic and computations…
read more here.
Keywords:
factor anova;
numbers two;
proportional subclass;
two factor ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "Journal of Statistical Theory and Practice"
DOI: 10.1080/15598608.2017.1299055
Abstract: A discrete choice experiment (DCE) is a survey method that gives insight into individual preferences for particular attributes. Traditionally, methods for constructing DCEs focus on identifying the individual effect of each attribute (a main effect).…
read more here.
Keywords:
aberration;
minimum aberration;
two factor;
aberration designs ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2869535
Abstract: With regard to the privacy of client–server communication systems, most research works have concentrated on authentication to guarantee security. Among the investigated schemes, two-factor password authentication has been a major focus and has undergone considerable…
read more here.
Keywords:
factor password;
password authentication;
card reader;
authentication ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3150519
Abstract: Two-factor authentication (2FA) is crucial for protecting the security of users authenticating to online servers. Despite its importance, users hesitate to use 2FA, due to usability issues. In this report we present a prototype implementation…
read more here.
Keywords:
authentication;
two factor;
toward usable;
factor authentication ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Transactions on Consumer Electronics"
DOI: 10.1109/tce.2020.3035566
Abstract: Universal Serial Bus (USB) is widely used, for example to facilitate hot-swapping and plug-and-play. However, USB ports can be exploited by an adversary to extract private or personal data from the connected devices. Hence, a…
read more here.
Keywords:
usb storage;
two factor;
scheme;
secure two ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Mobile Computing"
DOI: 10.1109/tmc.2021.3072598
Abstract: Secure and usable user authentication is the first line of defense against cyber attacks on smart end-user devices. Advanced hacking techniques pose severe threats to the traditional authentication systems based on the password/PIN/fingerprint. We propose…
read more here.
Keywords:
authentication;
two factor;
usable two;
factor ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Mobile Computing"
DOI: 10.1109/tmc.2021.3133275
Abstract: Mobile devices are promising to apply two-factor authentication to improve system security. Existing solutions have certain limits of requiring extra user effort, which might seriously affect user experience and delay authentication time. In this paper,…
read more here.
Keywords:
authentication;
two factor;
mobile two;
factor authentication ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "International Journal of Geometric Methods in Modern Physics"
DOI: 10.1142/s0219887819500257
Abstract: A [Formula: see text]-dimensional Einstein–Gauss–Bonnet (EGB) model with the cosmological term [Formula: see text] is considered. We find a class of solutions with exponential time dependence of two scale factors, governed by two Hubble-like parameters…
read more here.
Keywords:
egb model;
see text;
formula see;
two factor ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "Journal of Healthcare Engineering"
DOI: 10.1155/2022/9273662
Abstract: With the recent tremendous growth in technology, the Internet of Things (IoT) Telecare Medicine Information System (TMIS) is the most widely used medical information system with prominent achievements. Authentication schemes, which use Smart cards, offer…
read more here.
Keywords:
authentication;
authentication scheme;
two factor;
information system ... See more keywords