Accès libre

Extended Authentication Based on Geometric Patterns and Transformations

 et   
26 nov. 2024
À propos de cet article

Citez
Télécharger la couverture

Figure 1:

Communication in a symmetric system.
Communication in a symmetric system.

Figure 2:

Communication in an asymmetric system.
Communication in an asymmetric system.

Figure 3:

Examples of pin organization in a mechanical lock a) with one opening key b) with two opening keys.
Examples of pin organization in a mechanical lock a) with one opening key b) with two opening keys.

Figure 4:

Hierarchy of keys in a master-key system.
Hierarchy of keys in a master-key system.

Figure 5:

Externally tangent circles.
Externally tangent circles.

Figure 6:

Way of organizing keys in the master-key technique.
Way of organizing keys in the master-key technique.

Figure 7:

An example of related objects.
An example of related objects.

Figure 8:

Example of shifting two points of a linear function.
Example of shifting two points of a linear function.
Langue:
Anglais
Périodicité:
1 fois par an
Sujets de la revue:
Ingénierie, Présentations et aperçus, Ingénierie, autres