Výsledky vyhledávání - "Extensible Authentication Protocol"
-
1
Autoři: a další
Zdroj: IEEE Transactions on Industrial Informatics. 19:1343-1355
Témata: extensible authentication protocol (EAP), network security, authentication, formal verification, wireless local area network (WLAN)
Popis souboru: application/pdf
Přístupová URL adresa: http://urn.fi/urn:nbn:fi-fe2023030229190
-
2
Autoři: a další
Zdroj: Computer Systems Science and Engineering. 45:459-481
Témata: FOS: Computer and information sciences, Challenge–response authentication, Alternative medicine, IoT Security, Computer Networks and Communications, User Authentication Methods and Security Measures, Internet of Things, Biomedical Engineering, Wireless Body Area Networks in Healthcare, 02 engineering and technology, FOS: Medical engineering, 7. Clean energy, Engineering, Computer security, Pathology, 0202 electrical engineering, electronic engineering, information engineering, Lightweight Extensible Authentication Protocol, Authentication, Computer network, Internet of Things and Edge Computing, Continuous Authentication, 16. Peace & justice, Computer science, Challenge-Handshake Authentication Protocol, Authentication (law), Computer Science, Physical Sciences, Protocol (science), Medicine, Authentication protocol, Multi-factor authentication, Information Systems
-
3
Autoři: a další
Zdroj: IEEE Access, Vol 8, Pp 28956-28969 (2020)
Témata: FOS: Computer and information sciences, Mutual authentication, Smart Cards, User Authentication Methods and Security Measures, Computer Networks and Communications, Mobile device, security, Remote User Authentication, 02 engineering and technology, Computer security, offloading, 0202 electrical engineering, electronic engineering, information engineering, Cloud computing, Security Protocols for Authentication and Key Exchange, Lightweight Extensible Authentication Protocol, Authentication, Computer network, Mobile computing, Internet of Things and Edge Computing, Continuous Authentication, virtual smart card, two-factor authentication, Computer science, Mobile cloud computing, TK1-9971, Mobile Edge Computing, Operating system, Authentication (law), Computer Science, Physical Sciences, Electrical engineering. Electronics. Nuclear engineering, Authentication protocol, Multi-factor authentication, Decision-making, energy, Information Systems
-
4
Autoři: a další
Zdroj: Teh, P S, Zhang, N, Tan, S, Shi, Q, Khoh, W H & Nawaz, R 2020, 'Strengthen user authentication on mobile devices by using user’s touch dynamics pattern', Journal of Ambient Intelligence and Humanized Computing, pp. 1-21. https://doi.org/10.1007/s12652-019-01654-y
Témata: QA75, FOS: Computer and information sciences, User Authentication Methods and Security Measures, Fingerprint (computing), Usability, Mobile device, 0805 Distributed Computing, 02 engineering and technology, Fingerprint recognition, QA76, user authentication, Characterization and Detection of Android Malware, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Lightweight Extensible Authentication Protocol, Mobile computing, Authentication, USable, Human–computer interaction, Chip Authentication Program, behavioural biometrics, Continuous Authentication, Biometric Recognition and Security Systems, Computer science, Challenge-Handshake Authentication Protocol, Multimodal Biometrics, World Wide Web, touch dynamics, Biometrics, QA75-76.95 Calculating machines, Authentication (law), Computer Science, Physical Sciences, Signal Processing, Authentication protocol, Multi-factor authentication, Information Systems
Popis souboru: application/pdf; text
Přístupová URL adresa: https://link.springer.com/content/pdf/10.1007/s12652-019-01654-y.pdf
https://research.manchester.ac.uk/en/publications/d9ef4536-7ef8-4bec-853b-738f13ff0463
https://doi.org/10.1007/s12652-019-01654-y
https://dblp.uni-trier.de/db/journals/jaihc/jaihc11.html#TehZTSKN20
https://www.research.manchester.ac.uk/portal/en/publications/strengthen-user-authentication -on-mobile-devices-by-using-users-touch-dynamics-pattern(d9ef4536-7ef8-4bec-853b-738f13ff0463).html
https://eprint.ncl.ac.uk/268422
https://eprints.ncl.ac.uk/file_store/production/268422/1BAA7B23-7F51-49DA-9A34-BD71E8A78C46.pdf
https://link.springer.com/content/pdf/10.1007/s12652-019-01654-y.pdf
https://e-space.mmu.ac.uk/624667/
https://research.manchester.ac.uk/en/publications/d9ef4536-7ef8-4bec-853b-738f13ff0463
http://link.springer.com/10.1007/s12652-019-01654-y
https://doi.org/10.1007/s12652-019-01654-y
https://e-space.mmu.ac.uk/624667/ -
5
Autoři: a další
Témata: authentication, extensible authentication protocol (EAP), formal verification, network security, wireless local area network (WLAN)
Popis souboru: application/pdf
Dostupnost: http://urn.fi/urn:nbn:fi-fe2023030229190
-
6
Autoři: a další
Zdroj: Ad Hoc Networks. 152:103303
Témata: FOS: Computer and information sciences, Data Authentication Algorithm, User Authentication Methods and Security Measures, Vehicular Ad Hoc Networks, Internet of Vehicles, Engineering, Computer security, FOS: Electrical engineering, electronic engineering, information engineering, Electrical and Electronic Engineering, Spoofing attack, Lightweight Extensible Authentication Protocol, Authentication, Computer network, Graphical Passwords, Biometric Recognition and Security Systems, Wireless ad hoc network, Face Spoof Detection, Computer science, Vehicular ad hoc network, Authentication (law), Computer Science, Physical Sciences, Signal Processing, Channel state information, Wireless, Telecommunications, Vehicular Ad Hoc Networks and Communications, Authentication protocol, Information Systems
-
7
Autoři: a další
Zdroj: EURASIP Journal on Wireless Communications and Networking, Vol 2020, Iss 1, Pp 1-34 (2020)
Témata: Handover, WiMAX, Mutual authentication, TK7800-8360, Computer Networks and Communications, TK5101-6720, Remote User Authentication, 02 engineering and technology, 7. Clean energy, RFID Technology and Applications, Authentication server, Engineering, Computer security, FOS: Electrical engineering, electronic engineering, information engineering, Media Technology, 0202 electrical engineering, electronic engineering, information engineering, EAP-AKA ′ authentication, Electrical and Electronic Engineering, Fast re-authentication, Wireless network, Security Protocols for Authentication and Key Exchange, Lightweight Extensible Authentication Protocol, Authentication, IEEE 802.11, Computer network, Computer science, Heterogeneous Wireless Networks, Wireless Mobility and Network Handoff Management, Authentication (law), Computer Science, Physical Sciences, Telecommunication, Wireless, Telecommunications, AVISPA, Authentication protocol, Electronics, 5G, Authentication Protocol
Popis souboru: text
Přístupová URL adresa: https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-020-01702-8
https://doaj.org/article/865285820b6a4189a9ae0a43ba067d5c
https://link.springer.com/article/10.1186%2Fs13638-020-01702-8
https://dblp.uni-trier.de/db/journals/ejwcn/ejwcn2020.html#AlezabiHHAJ20
https://doi.org/10.1186/s13638-020-01702-8
http://psasir.upm.edu.my/id/eprint/88751/
https://link.springer.com/content/pdf/10.1186/s13638-020-01702-8.pdf
https://jwcn-eurasipjournals.springeropen.com/articles/10.1186/s13638-020-01702-8 -
8
Autoři:
Zdroj: ScientificWorldJournal
The Scientific World Journal, Vol 2016 (2016)Témata: FOS: Computer and information sciences, Technology, Alternative medicine, Computer Networks and Communications, User Authentication Methods and Security Measures, Science, Encryption, Review Article, 02 engineering and technology, Key management, Computer security, Pathology, 0202 electrical engineering, electronic engineering, information engineering, Key (lock), Security Protocols for Authentication and Key Exchange, Lightweight Extensible Authentication Protocol, Authentication, Computer network, Wireless Networks, Secure Routing, Computer science, Challenge-Handshake Authentication Protocol, Authentication (law), Computer Science, Physical Sciences, Protocol (science), Security Protocols, Medicine, Security in Wireless Sensor Networks, Authentication protocol, Wireless Sensor Networks, Wireless sensor network, Information Systems
Přístupová URL adresa: http://downloads.hindawi.com/journals/tswj/2016/6854303.pdf
https://pubmed.ncbi.nlm.nih.gov/26881272
https://doaj.org/article/f719a6616b1b4cb5bb686198942fe6cd
http://downloads.hindawi.com/journals/tswj/2016/6854303.pdf
https://www.hindawi.com/journals/tswj/2016/6854303/
https://paperity.org/p/153883365/comparative-study-on-various-authentication -protocols-in-wireless-sensor-networks
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4737465
http://europepmc.org/articles/PMC4737465
https://core.ac.uk/display/89259873 -
9
Autoři:
Přispěvatelé:
Témata: рукостискання Dragonfly, PSK (Pre-Shared Key), EAP-pwd (Extensible Authentication Protocol), AP (точка доступу), WPA2, SAE, безпровiдний зв'язок, WPA3
Popis souboru: application/pdf
Přístupová URL adresa: https://ela.kpi.ua/handle/123456789/50880
-
10
Autoři:
Zdroj: Research Journal of Applied Sciences, Engineering and Technology. 7:329-342
Témata: Handover, Computer Networks and Communications, Remote User Authentication, AKA, 02 engineering and technology, Library science, Engineering, Artificial Intelligence, Computer security, FOS: Electrical engineering, electronic engineering, information engineering, 0202 electrical engineering, electronic engineering, information engineering, Vertical Handover, Electrical and Electronic Engineering, Security Protocols for Authentication and Key Exchange, Lightweight Extensible Authentication Protocol, Authentication, IEEE 802.11, Computer network, Advanced Cryptographic Schemes and Protocols, 16. Peace & justice, Computer science, Wireless Mobility and Network Handoff Management, Authentication (law), Computer Science, Physical Sciences, Handoff Decision Algorithms, Authentication protocol
Přístupová URL adresa: https://maxwellsci.com/jp/mspabstract.php?jid=RJASET&doi=rjaset.7.259
-
11
Autoři:
Zdroj: Tongxin xuebao, Vol 35, Pp 1-7 (2014)
Témata: system wide information management (SWIM), Diameter protocol, extensible authentication protocol (EAP), message-digest (MD) algorithm, identity authentication, Telecommunication, TK5101-6720
Popis souboru: electronic resource
Relation: https://doaj.org/toc/1000-436X
Přístupová URL adresa: https://doaj.org/article/2ab7698ab98949989e5b22c3904abdcd
-
12
Autoři: Linjiang Li
Zdroj: Dianxin kexue, Vol 29, Pp 44-50 (2013)
Témata: wireless local area network, service non-sense authentication, protected extensible authentication protocol, EAP-SIM/AKA, MAC, Telecommunication, TK5101-6720, Technology
Popis souboru: electronic resource
Relation: https://doaj.org/toc/1000-0801
Přístupová URL adresa: https://doaj.org/article/041c418e846f418ba359c692aa067cef
-
13
Autoři:
Zdroj: Lecture Notes in Computer Science ISBN: 9783662543870
Témata: extensible authentication protocol, pseudorandom function, composition theorem, server session, forward secrecy
Přístupová URL adresa: https://ntnuopen.ntnu.no/ntnu-xmlui/bitstream/11250/2468807/1/H%c3%a5kon%20Jacobsen_PhD.pdf
https://link.springer.com/chapter/10.1007/978-3-662-54388-7_12
https://brage.bibsys.no/xmlui/handle/11250/2468807
https://link.springer.com/10.1007/978-3-662-54388-7_12
http://dblp.uni-trier.de/db/journals/iacr/iacr2017.html#BrzuskaJ17
https://ntnuopen.ntnu.no/ntnu-xmlui/handle/11250/2468807 -
14
Autoři: a další
Přispěvatelé: a další
Zdroj: IFIP Advances in Information and Communication Technology ISBN: 9783319336299
Témata: Computer Networks and Communications, Smart grid, 02 engineering and technology, [INFO] Computer Science [cs], Smart Grids, 7. Clean energy, Password, Engineering, Artificial Intelligence, Multicast, Computer security, Control-Flow Integrity, 0202 electrical engineering, electronic engineering, information engineering, Synchrophasors, Protocol Independent Multicast, Language-based Information Flow Security, Multicast authentication, Lightweight Extensible Authentication Protocol, Computer network, 9. Industry and infrastructure, Secure Routing, Security Challenges in Smart Grid Systems, Computer science, Distributed computing, Intrusion Detection, Reliable multicast, Overhead (engineering), Source-specific multicast, Operating system, Handshake, Control and Systems Engineering, Authentication (law), False Data Injection Attacks, Electrical engineering, Asynchronous communication, Physical Sciences, Computer Science, Wide area monitoring protection and control, Security in Wireless Sensor Networks, Authentication protocol
Popis souboru: application/pdf
Přístupová URL adresa: https://europepmc.org/articles/pmc5520642?pdf=render
https://pubmed.ncbi.nlm.nih.gov/28736582
https://inria.hal.science/hal-01369539v1
https://doi.org/10.1007/978-3-319-33630-5_3
https://inria.hal.science/hal-01369539v1/document
http://europepmc.org/articles/PMC5520642
https://link.springer.com/chapter/10.1007/978-3-319-33630-5_3
https://rd.springer.com/chapter/10.1007/978-3-319-33630-5_3
https://csrc.nist.gov/publications/detail/conference-paper/2016/05/11/inf-tesla-multicast-delayed-authentication -for-power-systems
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5520642
https://dblp.uni-trier.de/db/conf/sec/sec2016.html#CamaraAPC16 -
15
Autoři: a další
Zdroj: International Journal of Advanced Computer Science and Applications. 8
Témata: FOS: Computer and information sciences, Artificial intelligence, User Authentication Methods and Security Measures, Usability, Perspective (graphical), 02 engineering and technology, Detection and Prevention of Phishing Attacks, Password, Characterization and Detection of Android Malware, Computer security, 0202 electrical engineering, electronic engineering, information engineering, Lightweight Extensible Authentication Protocol, 2. Zero hunger, Authentication, Human–computer interaction, Chip Authentication Program, Computer science, Challenge-Handshake Authentication Protocol, World Wide Web, Authentication (law), Computer Science, Physical Sciences, Signal Processing, Security Analysis, Internet privacy, Authentication protocol, Multi-factor authentication, Information Systems
Přístupová URL adresa: http://thesai.org/Downloads/Volume8No1/Paper_42-Modern_Authentication_Techniques_in_Smart_Phones.pdf
https://thesai.org/Publications/ViewPaper?Volume=8&Issue=1&Code=ijacsa&SerialNo=42
https://thesai.org/Downloads/Volume8No1/Paper_42-Modern_Authentication_Techniques_in_Smart_Phones.pdf -
16
Autoři:
Přispěvatelé:
Témata: Extensible Authentication Protocol (EAP), zero-knowledge proofs, authentication, cryptography, key-stretching, passwords authentication, quadratic residuosity problem, razširljivi aventikacijski protokol (EAP), dokazi ničelnega znanja, avtentifikacija, kriptografija, raztegovanje ključev, gesla, problem kvadratnih ostankov, info:eu-repo/classification/udc/004.7
Popis souboru: application/pdf; text/url
Relation: https://repozitorij.upr.si/IzpisGradiva.php?id=18664; https://repozitorij.upr.si/Dokument.php?id=30299&dn=; https://repozitorij.upr.si/Dokument.php?id=27048&dn=; https://plus.cobiss.net/cobiss/si/sl/bib/120058883
-
17
Autoři:
Zdroj: Advances in Information Security ISBN: 9780387848174
-
18
Autoři:
Zdroj: Jurnal Inovasi dan Kewirausahaan
Popis souboru: application/pdf
Dostupnost: https://www.neliti.com/publications/119953/eap-based-authentication-for-ad-hoc-network
-
19
Autoři: a další
Přispěvatelé: a další
Témata: Authentication, Extensible Authentication Protocol (EAP, IEEE 802.1x, IEEE 802.11i, Wireless LAN, Security CONTENTS
Popis souboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.537.7797; http://www.ccrc.nthu.edu.tw/tech/WIRE1x_2_0_no_cover.pdf
-
20
Autoři: a další
Přispěvatelé: a další
Témata: Authentication, IEEE 802.1x, Extensible Authentication Protocol (EAP, EAP-SIM, Wireless LANs, Security 1 Table of Contents
Popis souboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.496.9204; http://www.ccrc.nthu.edu.tw/tech/WIRE1x_SIM_module_no_cover.pdf
Full Text Finder
Nájsť tento článok vo Web of Science