Home
Statistics
How It Works
Login
Register
Keyword Connections
-
authentic
Keywords
Connection Type
Connection
Journals
No Journal Connected
Research Groups
No Research Group Connected
Bibliographies
[1]
Educational Technology
[2]
آراءُ العلماء حول اعتبارِ الحديثِ الشاذِّ حديثًا صحيحًا (دراسة بحثية): The Perspectives of Scholars on Considering Shādh Hadith as Authentic Hadith: A Comprehensive Study
[3]
MRM–MS of marker peptides and their abundance as a tool for authentication of meat species and meat cuts in single-cut meat products
[4]
Nigella sativa oil: Physico-chemical properties, authentication analysis and its antioxidant activity
[5]
Inkjet-printed unclonable quantum dot fluorescent anti-counterfeiting labels with artificial intelligence authentication
[6]
Nigella sativa oil: Physico-chemical properties, authentication analysis and its antioxidant activity
[7]
Proteomics for the authentication of fish species.
[8]
Internet Users Authentication via Artificial Intelligence
[9]
A machine learning-based user authentication model using mobile app data
[10]
Authentic Leadership In Madrassas: Asserting Islamic Values in Teacher Performance
[11]
Authentic Leadership In Madrassas: Asserting Islamic Values in Teacher Performance
[12]
Rapid Scotch Whisky Analysis and Authentication using Desorption Atmospheric Pressure Chemical Ionisation Mass Spectrometry
[13]
Pemanfaatan Teknologi Fingerprint Authentication untuk Otomatisasi Presensi Perkuliahan
[14]
Against postmodernism: Paolo Sorrentino and the search for authenticity
[15]
Exploring Affective Dimensions of Authentic Geographic Education Using a Qualitative Document Analysis of Students’ YouthMappers Blogs
[16]
Fit of role involvement with values: Theoretical, conceptual, and psychometric development of work and family authenticity
[17]
Safeguarding Health at the Workplace: A Study of Work Engagement, Authenticity and Subjective Wellbeing among Religious Workers.
[18]
Is my company really doing good? Factors influencing employees' evaluation of the authenticity of their company's corporate social responsibility engagement
[19]
The role and dimensions of authenticity in heritage tourism
[20]
‘The smell of death and the smell of life’: authenticity, anxiety and perceptions of death at Varanasi’s cremation grounds
[21]
A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things.
[22]
Based Medical Systems for Patient's Authentication: Towards a New Verification Secure Framework Using CIA Standard.
[23]
Invertible secret image sharing with steganography and authentication for AMBTC compressed images
[24]
Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing
[25]
Design of electronic payment system based on authenticated key exchange
[26]
A key agreement authentication protocol using an improved parallel Pollard rho for electronic payment system
[27]
Authentication of Apis cerana Honey and Apis mellifera Honey Based on Major Royal Jelly Protein 2 Gene.
[28]
A Rainbow-Based Authentical Scheme for Securing Smart Connected Health Systems.
[29]
Authentication for ID cards based on colour visual cryptography and facial recognition
[30]
Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography
[31]
Cloud security architecture based on user authentication and symmetric key cryptographic techniques
[32]
Realization of Identity Card and Face Recognition Two-Factor Authentication System Based on Wechat
[33]
IMBUA: Identity management on blockchain for biometrics-based user authentication
[34]
Authentic leadership and internal whistleblowing intention: The mediating role of psychological safety
[35]
Teacher Self-Evaluation Models As Authentic Portfolio To Monitor Language Teachers' Performance
[36]
On the greatest challenge in the management of living religious heritage: Linking the authenticity of heritage and the authenticity of tourist experiences to the authenticity of religious tradition
[37]
Erratum: The University Brand and Social Media: Using Data Analytics to Assess Brand Authenticity (Journal of Marketing for Higher Education, 10.1080/08841241.2018.1486345)
[38]
A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment.
[39]
Radio Frequency Fingerprint-Based Intelligent Mobile Edge Computing for Internet of Things Authentication.
[40]
Authentication scheme using sparse matrix in cloud computing
[41]
Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks
[42]
Authentication of black cohosh (Actaea racemosa) dietary supplements based on chemometric evaluation of hydroxycinnamic acid esters and hydroxycinnamic acid amides.
[43]
Blockchain-technology-supported platforms for diamond authentication and certification in luxury supply chains
[44]
Twice-told tales: Self-repetition decreases observer assessments of performer authenticity.
[45]
NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture.
[46]
Moderating role of cynicism about organizational change between authentic leadership and commitment to change in Pakistani public sector hospitals.
[47]
Organizing Health Care Services for the 2017 "Athens Marathon, The Authentic:" Perspectives on Collaboration among Health and Safety Personnel in the Marathon Command Center.
[48]
Computationally efficient mutual authentication protocol for remote infant incubator monitoring system.
[49]
An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system.
[50]
Authentic materials and Mexican immersion: A professional development program combining pedagogy, language, and culture
[51]
Cultivating employees’ communal relationship and organizational citizenship behavior through authentic leadership: studying the influence of procedural justice
[52]
A Cross-Disciplinary and Multi-Modal Experimental Design for Studying Near-Real-Time Authentic Examination Experiences.
[53]
The New Visual Testimonial: Narrative, Authenticity, and Subjectivity in Emerging Commercial Photographic Practice
[54]
Relationship between authentic leadership and nurses' intent to leave: The mediating role of work environment and burnout.
[55]
Parallel pathways to brand loyalty: Mapping the consequences of authentic consumption experiences for hotels and Airbnb
[56]
Involvement in consumer-generated advertising: Effects of organizational transparency and brand authenticity on loyalty and trust
[57]
In Situ Nanoparticle Embedding for Authentication of Epoxy Composites.
[58]
Authentication analysis of MT-4 cells distributed by the NIH AIDS Reagent Program.
[59]
Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks
[60]
Physical layer authentication under intelligent spoofing in wireless sensor networks
[61]
New fool proof examination system through color visual cryptography and signature authentication
[62]
The Communist hero and the April Fool's joke: the cultural politics of authentication and fakery
[63]
Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networks
[64]
CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY
[65]
Authenticated Key Agreement Scheme with Strong Anonymity for Multi-Server Environment in TMIS.
[66]
Authentication of the naturalness of wintergreen (Gaultheria genus) essential oils by gas chromatography, isotope ratio mass spectrometry and radiocarbon assessment
[67]
DNA barcoding and mini-barcoding in authenticating processed animal-derived food: A case study involving the Chinese market
[68]
Authenticity and traceability in beverages.
[69]
Inauthentic self-presentation on facebook as a function of vulnerable narcissism and lower self-esteem
[70]
Authentic tolerance: between forbearance and acceptance.
[71]
Potential authentication of various meat-based products using simple and efficient DNA extraction method.
[72]
Quantitative bioluminometric method for DNA-based species/varietal identification in food authenticity assessment.
[73]
Brown rice authenticity evaluation by spark discharge-laser-induced breakdown spectroscopy
[74]
Efficient authentication protocol with anonymity and key protection for mobile Internet users
[75]
Dispositional empathy, emotional display authenticity, and employee outcomes.
[76]
The interaction between formulaic language and linguistic variability in authentic language use, exemplified by the prepositional multi-word expression unter geschrei
[77]
Assessing the impact of authentic leadership and team climate on innovative work behavior within self-managed teams in IT organizations
[78]
Retraction notice to Retraction: Eldefrawy, M.H.; Khan, M.K.; Alghathbar, K.; Tolba, A.S.; Kim, K.J. Authenticated Key Agreement with Rekeying for Secured Body Sensor Networks [Sensors 11 (2011) 747-753]
[79]
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
[80]
ASPA: Advanced Strong Pseudonym based Authentication in Intelligent Transport System.
[81]
Secure and efficient ECC based SIP authentication scheme for VoIP communications in internet of things
[82]
Extending the theory of planned behaviour: testing the effects of authentic perception and environmental concerns on the slow-tourist decision-making process
[83]
High-efficiency optical image authentication scheme based on ghost imaging and block processing
[84]
Authentic Management and Emotionally Intelligent Leaders versus Conjectural Management and Conjectural Leaders
[85]
An inaudible voice attack to context-based device authentication in smart IoT systems
[86]
Authenticate audio video-crypto invisible watermarking approach for enhancing hidden information security and robustness
[87]
A conceptual framework on knowledge sharing, intrinsic motivation, high-performance work system, authentic leadership and creativity
[88]
DNA barcoding coupled with high-resolution melting analysis for nut species and walnut milk beverage authentication.
[89]
Counter Argumentation against the Theory of Discrediting Hadith as Linguistic Evidence while Accepting the Authenticity of Anomalous Qiraat and Unknown Poetry
[90]
Exposé or misconstrual? Unresolved issues of authorship and the authenticity of GW Stow’s ‘forgery’ of a rock art painting
[91]
An Authentic Pan-Hispanic Language Policy? Spain as the Point of Reference in the Spanish Royal Academy's Diccionario de la lengua espaNõla
[92]
Maladaptive perfectionism and authentic leadership skills in emergency medicine students
[93]
Developing authentic leadership as a starting point to responsible management: A Canadian university case study
[94]
Optimized in-network authentication against pollution attacks in software-defined-named data networking
[95]
Decentralized Authentication of Distributed Patients in Hospital Networks using Blockchain.
[96]
An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs
[97]
An autonomous lightweight conditional privacy-preserving authentication scheme with provable security for vehicular ad-hoc networks
[98]
A Revocable Group Signatures Scheme to Provide Privacy-Preserving Authentications
[99]
A traceable and privacy-preserving authentication for UAV communication control system
[100]
Destination brand authenticity: What an experiential simulacrum! A multigroup analysis of its antecedents and outcomes through official online platforms
[101]
Transformational leadership and authentic leadership as practical implications of positive organizational psychology