Skip to search formSkip to main contentSkip to account menu

Stolen Product

Known as: Stolen 
A product has been determined to have been stolen.
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
To protect the resources from unauthorized users, the remote user authentication have become an essential part in the… 
Review
2013
Review
2013
More than 63,000 cars were reported stolen in Los Angeles in 2003–04. However, the distribution of thefts across car types is… 
2011
2011
Recently, Das proposed a secure two-factor user authentication scheme based on hash function, which is efficient enough to be… 
2008
2008
Where should defenses be deployed? Security managers can answer the question by knowing what types of breaches there are, and the… 
2007
2007
The most emerging technology for people identification and authentication is biometrics. In contrast with traditional recognition… 
Review
2000
Review
2000
Abstract Several criteria (frequency, hazardous use, drunkenness) were used to delineate four distinct groups and to analyse the… 
1995
1995
Fifty years after the Soviet regime cracked down totally on its creative artists, the combination of perestroika and his own…