ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Specification for Steel Chain-Link Fencing Materials Used for High Security Applications
Mapping Intimacies
◽
10.1520/f1712-11
◽
2011
◽
Author(s):
Keyword(s):
Security Applications
◽
High Security
◽
Chain Link
◽
Materials Used
Download Full-text
Related Documents
Cited By
References
Specification for Steel Chain-Link Fencing Materials Used for High Security Applications
10.1520/f1712
◽
2008
◽
Author(s):
Keyword(s):
Security Applications
◽
High Security
◽
Chain Link
◽
Materials Used
Download Full-text
Specification for Steel Chain-Link Fencing Materials Used for High Security Applications
10.1520/f1712-02
◽
2002
◽
Author(s):
Keyword(s):
Security Applications
◽
High Security
◽
Chain Link
◽
Materials Used
Download Full-text
Specification for Steel Chain-Link Fencing Materials Used for High Security Applications
10.1520/f1712-96a
◽
1996
◽
Author(s):
Keyword(s):
Security Applications
◽
High Security
◽
Chain Link
◽
Materials Used
Download Full-text
Specification for Steel Chain-Link Fencing Materials Used for High Security Applications
10.1520/f1712-06
◽
2006
◽
Author(s):
Keyword(s):
Security Applications
◽
High Security
◽
Chain Link
◽
Materials Used
Download Full-text
FPGA Implementation of MC-CDMA for High Security Applications
CVR Journal of Science & Technology
◽
10.32377/cvrjst0507
◽
2013
◽
Vol 5
(1)
◽
pp. 36-41
Author(s):
R. Ganesh
◽
◽
Ch. Sandeep Reddy
◽
Keyword(s):
Fpga Implementation
◽
Security Applications
◽
High Security
Download Full-text
IC-Cards in High-Security Applications
Advances in Cryptology — EUROCRYPT ’87 - Lecture Notes in Computer Science
◽
10.1007/3-540-39118-5_18
◽
2010
◽
pp. 177-199
◽
Cited By ~ 1
Author(s):
I. Schaumüller-Bichl
Keyword(s):
Security Applications
◽
High Security
◽
Ic Cards
Download Full-text
Polarization-encoded fringe-adjusted joint-transform correlator for fingerprint verification systems for high-security applications
10.1117/12.542721
◽
2004
◽
Author(s):
Aed M. El-Saba
◽
Mohammad S. Alam
Keyword(s):
Joint Transform Correlator
◽
Fingerprint Verification
◽
Security Applications
◽
High Security
◽
Verification Systems
Download Full-text
Security analysis of password hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications
Procedia Computer Science
◽
10.1016/j.procs.2010.11.025
◽
2010
◽
Vol 2
◽
pp. 195-206
◽
Cited By ~ 6
Author(s):
V.S. Meenakshi
◽
Dr.G. Padmavathi
Keyword(s):
Security Analysis
◽
Feature Points
◽
Fuzzy Vault
◽
Security Applications
◽
High Security
◽
Combined Feature
Download Full-text
Design and analysis of AES-CBC mode for high security applications
Second International Conference on Current Trends In Engineering and Technology - ICCTET 2014
◽
10.1109/icctet.2014.6966347
◽
2014
◽
Cited By ~ 9
Author(s):
M. Vaidehi
◽
B. Justus Rabi
Keyword(s):
Security Applications
◽
High Security
Download Full-text
Video performance for high security applications
44th Annual 2010 IEEE International Carnahan Conference on Security Technology
◽
10.1109/ccst.2010.5678672
◽
2010
◽
Author(s):
Jack C. Connell
◽
Bradley C. Norman
Keyword(s):
Security Applications
◽
High Security
◽
Video Performance
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close