[go: up one dir, main page]

Atzeni et al., 2015 - Google Patents

Authentication

Atzeni et al., 2015

Document ID
8418267783479854454
Author
Atzeni A
Lioy A
Publication year
Publication venue
Encyclopedia of Information Science and Technology, Third Edition

External Links

Snippet

I Authentication Page 1 I 4239 Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Category: IT Security and Ethics DOI: 10.4018/978-1-4666-5888-2.ch416 Authentication INTRODUCTION In a world …
Continue reading at www.igi-global.com (other versions)

Similar Documents

Publication Publication Date Title
Abdullah et al. Blockchain based approach to enhance big data authentication in distributed environment
Chuang et al. An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics
Zhao et al. A novel mutual authentication scheme for Internet of Things
Bhatia et al. Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues
CN103124269B (en) Based on the Bidirectional identity authentication method of dynamic password and biological characteristic under cloud environment
Li et al. Applying biometrics to design three‐factor remote user authentication scheme with key agreement
US8112787B2 (en) System and method for securing a credential via user and server verification
US12255880B2 (en) Cryptographic device, system and method thereof
Dua et al. Replay attack prevention in Kerberos authentication protocol using triple password
Mumtaz et al. An RSA based authentication system for smart IoT environment
Giri et al. A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer usb mass storage devices
Panchal et al. Designing secure and efficient biometric-based access mechanism for cloud services
Khan et al. A brief review on cloud computing authentication frameworks
Murtaza et al. A portable hardware security module and cryptographic key generator
CN106230840B (en) A kind of command identifying method of high security
Sinnhofer et al. Patterns to establish a secure communication channel
Kiennert et al. Authentication systems
Patel et al. A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier
Xie et al. A multi server authentication protocol with integrated monitoring for iomt based healthcare system
Wang et al. A new fingerprint authentication scheme based on secret-splitting for enhanced cloud security
Naziri et al. SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems
Patiyoot “Patiyoot” Cryptography Authentication Protocol for Computer Network
Atzeni et al. Authentication
Hsiao et al. Secure authentication scheme for supporting healthcare in wireless sensor networks
Patel et al. Secure & Efficient Authentication Framework for Internet of Things