-
1
المؤلفون: Satyajayant Misra, Travis Mick, Nahid Ebrahimi Majd, Frank Natividad, Reza Tourani, Hong Huang
المصدر: IEEE Transactions on Dependable and Secure Computing. 16:5-17
مصطلحات موضوعية: Computer access control, Distributed System Security Architecture, business.industry, Computer science, Network Access Control, Server, The Internet, Access control, Internet traffic, Electrical and Electronic Engineering, business, Authentication server, Computer network
-
2
المؤلفون: Kaoru Ota, Mianxiong Dong, Ming Tao, Zhuzhong Qian
المصدر: Journal of Parallel and Distributed Computing. 118:107-117
مصطلحات موضوعية: Challenge-Handshake Authentication Protocol, Information privacy, Computer access control, Computer Networks and Communications, Computer science, computer.internet_protocol, Email authentication, Access control, 02 engineering and technology, Computer security, computer.software_genre, NTLMSSP, Theoretical Computer Science, Distributed System Security Architecture, Artificial Intelligence, Forward secrecy, Generic Bootstrapping Architecture, Lightweight Extensible Authentication Protocol, 0202 electrical engineering, electronic engineering, information engineering, Data Authentication Algorithm, Authentication, Revocation, business.industry, 020206 networking & telecommunications, Mutual authentication, Multi-factor authentication, Chip Authentication Program, Hardware and Architecture, Network Admission Control, IPsec, Network Access Control, Authentication protocol, Protected Extensible Authentication Protocol, 020201 artificial intelligence & image processing, Lightweight protocol, Challenge–response authentication, business, computer, Software, Computer network
-
3Near-field chipless-RFID system with high data capacity for security and authentication applications
المؤلفون: Ferran Martin, Cristian Herrojo, Eloi Ramon, Javier Mata-Contreras, Ferran Paredes, Alba Nunez
المصدر: Recercat. Dipósit de la Recerca de Catalunya
instname
Recercat: Dipósit de la Recerca de Catalunya
Varias* (Consorci de Biblioteques Universitáries de Catalunya, Centre de Serveis Científics i Acadèmics de Catalunya)
Dipòsit Digital de Documents de la UAB
Universitat Autònoma de Barcelonaمصطلحات موضوعية: Authentication, Radiation, business.industry, Computer science, 010401 analytical chemistry, Electrical engineering, 020206 networking & telecommunications, 02 engineering and technology, Condensed Matter Physics, Computer security, computer.software_genre, 01 natural sciences, Microstrip, 0104 chemical sciences, Chipless RFID, Distributed System Security Architecture, Authentication protocol, Network Access Control, 0202 electrical engineering, electronic engineering, information engineering, Radio-frequency identification, Electrical and Electronic Engineering, business, computer, Envelope detector
وصف الملف: application/pdf
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d8533a0aaa5a786666ba5d373926dda3
http://hdl.handle.net/2072/428304 -
4
المؤلفون: Mythili Boopathi, M. Aramudhan
المصدر: Alexandria Engineering Journal, Vol 57, Iss 2, Pp 819-829 (2018)
مصطلحات موضوعية: 021110 strategic, defence & security studies, Computer science, business.industry, 0211 other engineering and technologies, General Engineering, 020206 networking & telecommunications, 02 engineering and technology, Engineering (General). Civil engineering (General), Computer security, computer.software_genre, Authentication server, NTLMSSP, Internet Authentication Service, Distributed System Security Architecture, Authentication protocol, Lightweight Extensible Authentication Protocol, 0202 electrical engineering, electronic engineering, information engineering, TA1-2040, Challenge–response authentication, business, computer, Data Authentication Algorithm, Computer network
-
5
المؤلفون: Yi Mu, Da-Zhi Sun
المصدر: IEEE Wireless Communications Letters. 7:254-257
مصطلحات موضوعية: Challenge-Handshake Authentication Protocol, 020203 distributed computing, Authentication, Otway–Rees protocol, Computer science, 02 engineering and technology, Computer security, computer.software_genre, Distributed System Security Architecture, Control and Systems Engineering, Authentication protocol, 0202 electrical engineering, electronic engineering, information engineering, Cryptographic hash function, 020201 artificial intelligence & image processing, Electrical and Electronic Engineering, Challenge–response authentication, computer, Data Authentication Algorithm
-
6
المؤلفون: Hamid Sadeq Mahdi, Haitham A. Ail, Qusay Kanaan Kadhim
المصدر: Diyala Journal For Pure Science. 14:1-17
مصطلحات موضوعية: Cloud computing security, Computer science, business.industry, Network security, 05 social sciences, 0211 other engineering and technologies, Cloud computing, 02 engineering and technology, Utility computing, Distributed System Security Architecture, Cloud testing, Network Access Control, 021105 building & construction, 0502 economics and business, business, Space-based architecture, 050203 business & management, Computer network
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::339ca4fd146575eb9db2d14401691243
https://doi.org/10.24237/djps.1401.205c -
7
المؤلفون: Philipp Mundhenk, Ramesh Karri, Martin Lukasiewycz, Samarjit Chakraborty, Peter Waszecki, Sebastian Steinhorst
المصدر: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 36:1790-1803
مصطلحات موضوعية: 021110 strategic, defence & security studies, Engineering, business.industry, Control (management), 0211 other engineering and technologies, Automotive industry, 02 engineering and technology, Computer Graphics and Computer-Aided Design, 020202 computer hardware & architecture, Domain (software engineering), Transmission (telecommunications), Distributed System Security Architecture, 0202 electrical engineering, electronic engineering, information engineering, Systems architecture, Single point of failure, Electrical and Electronic Engineering, Architecture, business, Software, Computer network
-
8
المؤلفون: Wei Chen, Ming Zhang, Yunpeng Cao
المصدر: Journal of Mathematics and Computer Science. 17:488-505
مصطلحات موضوعية: Distributed security, Database, Computer science, General Mathematics, Distributed computing, Computational Mechanics, Large scale data, Information repository, computer.software_genre, Storage model, Computer Science Applications, Computational Mathematics, Security service, Distributed System Security Architecture, Converged storage, computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::4b18abef4e1dc43d211229e8cc820dad
https://doi.org/10.22436/jmcs.017.04.05 -
9
المؤلفون: Hassina Nacer, Nabil Djebari, Djamil Aïssani, Hachem Slimani
المصدر: Computers & Security. 70:144-178
مصطلحات موضوعية: Web standards, medicine.medical_specialty, General Computer Science, Web development, Web 2.0, computer.internet_protocol, Computer science, Interoperability, Services computing, 02 engineering and technology, Ontology (information science), Computer security, computer.software_genre, Security policy, Distributed System Security Architecture, 020204 information systems, 0202 electrical engineering, electronic engineering, information engineering, medicine, Data Web, Authentication, business.industry, WS-I Basic Profile, Enterprise information security architecture, Service-oriented architecture, Multi-factor authentication, Web application security, Scalability, 020201 artificial intelligence & image processing, The Internet, Single sign-on, Kerberos, Web service, business, WS-Policy, Law, computer, Web modeling
-
10
المؤلفون: V Niharika
المصدر: International Journal of Advanced Research in Computer and Information Security. 1:7-12
مصطلحات موضوعية: Distributed System Security Architecture, Computer science, Authentication protocol, Network Access Control, Lightweight Extensible Authentication Protocol, Challenge–response authentication, Multi-factor authentication, Computer security, computer.software_genre, NTLMSSP, computer, Data Authentication Algorithm
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::c1053329b07580c5a621ea620e0318b2
https://doi.org/10.21742/ijacis.2017.1.1.02