Buscas alternativas:
chaves algorithm » chaid algorithm (Expandir a busca), cubes algorithm (Expandir a busca), machines algorithm (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
programa chaves » progama chaves (Expandir a busca), programa capes (Expandir a busca), programa cidades (Expandir a busca)
code programa » code programs (Expandir a busca), model programa (Expandir a busca), voce programa (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
chaves algorithm » chaid algorithm (Expandir a busca), cubes algorithm (Expandir a busca), machines algorithm (Expandir a busca)
algorithm binary » algorithms library (Expandir a busca)
programa chaves » progama chaves (Expandir a busca), programa capes (Expandir a busca), programa cidades (Expandir a busca)
code programa » code programs (Expandir a busca), model programa (Expandir a busca), voce programa (Expandir a busca)
binary method » boundary method (Expandir a busca), boundary methods (Expandir a busca)
1
Assuntos:
“...Chave secreta - concordância...”
Concordância de chave secreta aplicada a controle de acesso utilizando biometria da íris e sistemas RFID.
Tese
2
Assuntos:
“...Chave secreta - concordância...”
Concordância de chave secreta aplicada a controle de acesso utilizando biometria da íris e sistemas RFID.
Tese
3
“...-correcting code whose message is formed from a binary chaotic sequence and from bits of the original image...”
New fragile image watermarking schemes using chaotic sequences
Dissertação