Atzeni et al., 2015 - Google Patents
AuthenticationAtzeni et al., 2015
- Document ID
- 8418267783479854454
- Author
- Atzeni A
- Lioy A
- Publication year
- Publication venue
- Encyclopedia of Information Science and Technology, Third Edition
External Links
Snippet
I Authentication Page 1 I 4239 Copyright © 2015, IGI Global. Copying or distributing in print or
electronic forms without written permission of IGI Global is prohibited. Category: IT Security and
Ethics DOI: 10.4018/978-1-4666-5888-2.ch416 Authentication INTRODUCTION In a world …
- 239000000203 mixture 0 abstract description 4
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Abdullah et al. | Blockchain based approach to enhance big data authentication in distributed environment | |
| Chuang et al. | An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics | |
| Zhao et al. | A novel mutual authentication scheme for Internet of Things | |
| Bhatia et al. | Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues | |
| CN103124269B (en) | Based on the Bidirectional identity authentication method of dynamic password and biological characteristic under cloud environment | |
| Li et al. | Applying biometrics to design three‐factor remote user authentication scheme with key agreement | |
| US8112787B2 (en) | System and method for securing a credential via user and server verification | |
| US12255880B2 (en) | Cryptographic device, system and method thereof | |
| Dua et al. | Replay attack prevention in Kerberos authentication protocol using triple password | |
| Mumtaz et al. | An RSA based authentication system for smart IoT environment | |
| Giri et al. | A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer usb mass storage devices | |
| Panchal et al. | Designing secure and efficient biometric-based access mechanism for cloud services | |
| Khan et al. | A brief review on cloud computing authentication frameworks | |
| Murtaza et al. | A portable hardware security module and cryptographic key generator | |
| CN106230840B (en) | A kind of command identifying method of high security | |
| Sinnhofer et al. | Patterns to establish a secure communication channel | |
| Kiennert et al. | Authentication systems | |
| Patel et al. | A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier | |
| Xie et al. | A multi server authentication protocol with integrated monitoring for iomt based healthcare system | |
| Wang et al. | A new fingerprint authentication scheme based on secret-splitting for enhanced cloud security | |
| Naziri et al. | SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems | |
| Patiyoot | “Patiyoot” Cryptography Authentication Protocol for Computer Network | |
| Atzeni et al. | Authentication | |
| Hsiao et al. | Secure authentication scheme for supporting healthcare in wireless sensor networks | |
| Patel et al. | Secure & Efficient Authentication Framework for Internet of Things |