From post

A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMG.

, , , , , и . EIDWT, том 17 из Lecture Notes on Data Engineering and Communications Technologies, стр. 889-900. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Okazaki, Naonobu
add a person with the name Okazaki, Naonobu
 

Другие публикации лиц с тем же именем

On a user authentication method to realise an authentication system using s-EMG., , , , , , и . Int. J. Grid Util. Comput., 11 (5): 725-734 (2020)Evaluation of Index Poisoning Method in Large Scale Winny Network., , , , , и . EIDWT, том 17 из Lecture Notes on Data Engineering and Communications Technologies, стр. 999-1006. Springer, (2018)Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMG., , , , , , , и . AINA Workshops, том 1150 из Advances in Intelligent Systems and Computing, стр. 834-844. Springer, (2020)Proposal and Evaluation of Authentication Method Having Shoulder-Surfing Resistance for Smartwatches Using Shift Rule., , , , и . NBiS, том 1036 из Advances in Intelligent Systems and Computing, стр. 560-569. Springer, (2019)A Proposal and its Evaluations of a Re-keying Method for Dynamic Secure Group Communications., , , , и . AINA (2), стр. 43-49. IEEE Computer Society, (2004)Implementation of Arduino Simulator ADVIS Visualizing the Value of Voltage on the Circuit., , , , , и . JRNAL, 5 (4): 249-252 (2019)Development of a Monitoring System Based on Power Consumption., , , , , , и . NBiS, том 7 из Lecture Notes on Data Engineering and Communications Technologies, стр. 363-372. Springer, (2017)Interactive Video CAPTCHA for Better Resistance to Automated Attack., , , , , , и . ICMU, стр. 1-2. IEEE, (2018)An Examination of Pairing Method with Camera and Acceleration Sensor., , , и . ICMU, стр. 1-4. IEEE, (2018)Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files., , , , , , , и . NBiS, том 1036 из Advances in Intelligent Systems and Computing, стр. 305-316. Springer, (2019)