From post

Identification of Manual Alphabets Based Gestures Using s-EMG for Realizing User Authentication.

, , , , , , и . EIDWT, том 47 из Lecture Notes on Data Engineering and Communications Technologies, стр. 323-333. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Okazaki, Naonobu
add a person with the name Okazaki, Naonobu
 

Другие публикации лиц с тем же именем

On a user authentication method to realise an authentication system using s-EMG., , , , , , и . Int. J. Grid Util. Comput., 11 (5): 725-734 (2020)Evaluation of Index Poisoning Method in Large Scale Winny Network., , , , , и . EIDWT, том 17 из Lecture Notes on Data Engineering and Communications Technologies, стр. 999-1006. Springer, (2018)Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMG., , , , , , , и . AINA Workshops, том 1150 из Advances in Intelligent Systems and Computing, стр. 834-844. Springer, (2020)Proposal and Evaluation of Authentication Method Having Shoulder-Surfing Resistance for Smartwatches Using Shift Rule., , , , и . NBiS, том 1036 из Advances in Intelligent Systems and Computing, стр. 560-569. Springer, (2019)A Proposal and its Evaluations of a Re-keying Method for Dynamic Secure Group Communications., , , , и . AINA (2), стр. 43-49. IEEE Computer Society, (2004)Interactive Video CAPTCHA for Better Resistance to Automated Attack., , , , , , и . ICMU, стр. 1-2. IEEE, (2018)An Examination of Pairing Method with Camera and Acceleration Sensor., , , и . ICMU, стр. 1-4. IEEE, (2018)Development of a Monitoring System Based on Power Consumption., , , , , , и . NBiS, том 7 из Lecture Notes on Data Engineering and Communications Technologies, стр. 363-372. Springer, (2017)Development and Evaluation of Swahili Text Based CAPTCHA., , , , и . LifeTech, стр. 293-297. IEEE, (2021)Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files., , , , , , , и . NBiS, том 1036 из Advances in Intelligent Systems and Computing, стр. 305-316. Springer, (2019)