A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is
The screen splits and multiplies into nine symmetrically and compositionally identical frames of the previous image, moving onward to a close up of her alarm clock. ... instead of particular ethnic identities. ...doi:10.18061/ijsd.v6i0.5256 fatcat:cw6efaucrjcazczibtxsezm6ga
International Journal of Network Security
In this paper, a new robust biometrics-based one-time identity-password (OTIP) authenticated key agreement protocol is given for E-coupon system. ... In addition, biometrics-based algorithm can make the scheme become more secure and user friendly. ... compromised (captured) nodes can be detected by base station and as a result, the base station, cluster head and sensor nodes know the identities of the compromised nodes. ...fatcat:opax2a4dc5eutoy4mmoka5hgs4
Many compromises had to be carried out by the new nation facing the arrival of the global era. ... His wider research interests are in environment studies, international development and climate change resilience. ...fatcat:bjsllgvyy5ebdddmjurzyhzv3i