Academic literature on the topic 'Authentication and Authorization'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Authentication and Authorization.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Authentication and Authorization"

1

Shivanna, Preetha, and Sheela Samudrala Venkatesiah. "Secure Multimodal Authentication Scheme for Wireless Sensor Networks." International Journal of Safety and Security Engineering 11, no. 6 (2021): 653–61. http://dx.doi.org/10.18280/ijsse.110605.

Full text
Abstract:
In the current era, it is necessary to device authorization and authentication techniques to secure resources in information technology. There are several methods to substantiate authorization and authentication. User authentication is essential for authenticating user access control in WSNs. Biometric recognition error, lack of anonymity and vulnerability to attacks, user verification problem, revocation problem and disclosure of session key by the gateway node are some of the security flaws encountered. In this study, a Multimodal Authentication Scheme for Wireless Sensor Networks (WSN-MAS)
APA, Harvard, Vancouver, ISO, and other styles
2

B, Vinay Kumar. "Authorization and Authentication in Mobile Devices." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1733–38. http://dx.doi.org/10.22214/ijraset.2022.41610.

Full text
Abstract:
Abstract: With the rapid evolution of the wireless communication technology, user authorization and authentication is important in order to ensure the security of the wireless communication technology. Password play an important role in the process of authentication. In the process of authentication, the password enter by the user will be transmitted along the traffic to the authentication server in order to allow the server to grant access to the authorized user. The attackers will use the chance to attempt sniff others person password in order to perform some illegal activities by using othe
APA, Harvard, Vancouver, ISO, and other styles
3

B, Vinay Kumar. "Authorization and Authentication in Mobile Devices." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1739–44. http://dx.doi.org/10.22214/ijraset.2022.41611.

Full text
Abstract:
Abstract: With the rapid evolution of the wireless communication technology, user authorization and authentication is important in order to ensure the security of the wireless communication technology. Password play an important role in the process of authentication. In the process of authentication, the password enter by the user will be transmitted along the traffic to the authentication server in order to allow the server to grant access to the authorized user. The attackers will use the chance to attempt sniff others person password in order to perform some illegal activities by using othe
APA, Harvard, Vancouver, ISO, and other styles
4

Needleman, Mark. "The Shibboleth Authentication/Authorization System." Serials Review 30, no. 3 (2004): 252–53. http://dx.doi.org/10.1080/00987913.2004.10764917.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Anugrah, Indra Gita, and Muhamad Aldi Rifai Imam Fakhruddin. "Development Authentication and Authorization Systems of Multi Information Systems Based REst API and Auth Token." INNOVATION RESEARCH JOURNAL 1, no. 2 (2020): 127. http://dx.doi.org/10.30587/innovation.v1i2.1927.

Full text
Abstract:
The security of an application is the most important problem in an information system integration process. The authentication and authorization process is usually carried out using Single Sign On (SSO). Authentication and authorization methods are used to secure data in a system. The authentication and authorization processes are carried out on the client side (web browser) in the form of a session and on the server side (web server) in the form of cookies. Sessions and cookies are valuable assets in the authentication and authorization process because they contain the data required for the lo
APA, Harvard, Vancouver, ISO, and other styles
6

Kang, Jeong Hwa, and Minhye Seo. "Enhanced Authentication for Decentralized IoT Access Control Architecture." Cryptography 7, no. 3 (2023): 42. http://dx.doi.org/10.3390/cryptography7030042.

Full text
Abstract:
The internet of things (IoT) enables a hyperconnected society, offering intelligent services and convenience through various connections between people, objects, and services. However, the current state of the IoT still faces limitations in security. Security issues in the IoT are of significant concern, leading to the proposal of numerous security frameworks and solutions to address these challenges. Authentication and authorization are crucial security requirements in the IoT environment, considering the potential risks posed by inadequate authentication and incorrect authorization. To compr
APA, Harvard, Vancouver, ISO, and other styles
7

Istiaque Ahmed, Kazi, Mohammad Tahir, Mohamed Hadi Habaebi, Sian Lun Lau, and Abdul Ahad. "Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction." Sensors 21, no. 15 (2021): 5122. http://dx.doi.org/10.3390/s21155122.

Full text
Abstract:
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the electric power grid or water supply systems has emerged as a major national and global priority. To address the security issue of IoT, several studies are being carried out that involve the use of, but are not limited to, blockchain, artificial intelligence, and edge/fog computing. Authentication and authorization are crucial aspects of the CIA triad to protect the network from malicious parties. However, existing
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Mingyang, Junli Guo, Haoyu Yuan, and Xinyu Yang. "Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture." Electronics 12, no. 4 (2023): 782. http://dx.doi.org/10.3390/electronics12040782.

Full text
Abstract:
Zero-trust security architecture reconstructs the trust foundation of access control based on authentication and authorization by continuously authenticating the terminal during the authentication process and not relying solely on geographic location/user attributes as the sole basis for the trust assessment. However, due to the fine-grained verification of identity under the zero-trust security architecture, there is a need for multiple authentication and authorization processes. If a single policy engine has unknown vulnerabilities and unknown backdoors to be maliciously attacked, or DDOS at
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Jing, Rongchao Liu, and Yingxu Lai. "Risk-Based Dynamic Identity Authentication Method Based on the UCON Model." Security and Communication Networks 2022 (March 31, 2022): 1–13. http://dx.doi.org/10.1155/2022/2509267.

Full text
Abstract:
With the continuous progress of computer technology, static identity authentication technology has encountered challenges in practical applications; in addition, it has deficiencies in continuity and mutability. For these reasons, we propose a risk-based dynamic identity authentication method based on the Usage Control (UCON) model. When authenticating a user, we consider their access rights based on the degree of risk, except in case of password authentication. We propose a risk assessment method, and blockchain technology is used in the scheme to provide a reliable process for risk assessmen
APA, Harvard, Vancouver, ISO, and other styles
10

Eigeles, Dan. "Intelligent authentication, authorization, and administration (I3A)." Information Management & Computer Security 13, no. 5 (2005): 419–34. http://dx.doi.org/10.1108/09685220510627296.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Authentication and Authorization"

1

Hakobyan, Davit. "Authentication and Authorization Systems in Cloud Environments." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102870.

Full text
Abstract:
The emergence of cloud computing paradigm offers attractive and innovative computing services through resource pooling and virtualization techniques. Cloud providers deliver various types of computing services to customers according to a pay-per-use economic model. However, this technology shift introduces a new concern for enterprises and businesses regarding their privacy and security. Security as a Service is a new cloud service model for the security enhancement of a cloud environment. This is a way of centralizing security solutions under the control of professional security specialists.
APA, Harvard, Vancouver, ISO, and other styles
2

Hamedtoolloei, Hamidreza. "A service-oriented architecture for authentication and authorization." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2009. http://wwwlib.umi.com/cr/ucsd/fullcit?p1460003.

Full text
Abstract:
Thesis (M.S.)--University of California, San Diego, 2009.<br>Title from first page of PDF file (viewed January 9, 2009). Available via ProQuest Digital Dissertations. Includes bibliographical references (p. 94-97).
APA, Harvard, Vancouver, ISO, and other styles
3

Yao, Danfeng. "Privacy-aware authentication and authorization in trust management." View abstract/electronic edition; access limited to Brown University users, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3318375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Subils, Jean-Baptiste. "Authentication Via Multiple Associated Devices." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5778.

Full text
Abstract:
This thesis presents a practical method of authentication utilizing multiple devices. The factors contributing to the practicality of the method are: the utilization of devices already commonly possessed by users and the amenability to being implemented on a wide variety of devices. The term “device” refers to anything able to perform cryptographic operations, store data, and communicate with another such device. In the method presented herein, multiple devices need to be associated with a single user to provide this user an identity in the system. A public key infrastructure is used to provid
APA, Harvard, Vancouver, ISO, and other styles
5

Tran, Florén Simon. "Implementation and Analysis of Authentication and Authorization Methods in a Microservice Architecture : A Comparison Between Microservice Security Design Patterns for Authentication and Authorization Flows." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-301620.

Full text
Abstract:
Microservices have emerged as an attractive alternative to more classical monolithic software application architectures. Microservices provides many benefits that help with code base comprehension, deployability, testability, and scalability. As the Information technology (IT) industry has grown ever larger, it makes sense for the technology giants to adopt the microservice architecture to make use of these benefits. However, with new software solutions come new security vulnerabilities, especially when the technology is new and vulnerabilities are yet to be fully mapped out. Authentication an
APA, Harvard, Vancouver, ISO, and other styles
6

Aas, Dag-Inge. "Authentication and Authorization for Native Mobile Applications using OAuth 2.0." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22969.

Full text
Abstract:
OAuth 2.0 has in the recent years become the de-facto standard of doing API authorization and authentication on mobile devices. However, recent critics have claimed that OAuth does not provide sufficient security or ease-of-use for developers on mobile devices. In this thesis, I study four approaches to mobile authorization using OAuth 2.0, and suggest an improved solution based on current industry best-practices for security on Android. The end result is a solution which provides a native authorization flow for third-party developers to integrate with an existing API endpoint. However, the th
APA, Harvard, Vancouver, ISO, and other styles
7

Dasun, Weerasinghe P. W. H. "Parameter based identification, authentication and authorization method for mobile services." Thesis, City University London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.510696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alenius, Fabian. "Authentication and Authorization : Achieving Single Sign-on in an Erlang Environment." Thesis, Uppsala University, Department of Information Technology, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-129523.

Full text
Abstract:
<p>Forcing users to enter their credentials every time they want to use a service is associated with several problems. Common problems include lowered user productivity, increased administration costs and security issues. As companies and organizations are adding more services to their networks, it is becoming an increasingly important problem. By allowing users to sign on once and centralizing access control decisions, it is possible to reduce or completely mitigate this problem. This paper describes how a service written in Erlang was modified to allow for single sign-on and centralized acce
APA, Harvard, Vancouver, ISO, and other styles
9

Sandberg, Joakim. "Network Authentication to the Physical World." Thesis, KTH, Kommunikationssystem, CoS, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-221177.

Full text
Abstract:
Quick Response (QR) codes have been used for both non-authentication purposes and authentication &amp; authorization of a user. The visual representation of a QR code requires a reader/decoder to convert the code to a readable resource for an application. This raises some concerns, such as: What kind of information and how much information can be stored in this representation? What kind of vulnerabilities are there when using this technology in some type of authentication? The concrete problem addressed in this thesis is whether a mobile device displaying a QR code can be used as an authentica
APA, Harvard, Vancouver, ISO, and other styles
10

Mensah, Francis. "Framework to Implement Authentication, Authorization and Secure Communications in a Multiuser Collaborative CAx Environment." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/4314.

Full text
Abstract:
Computer Aided Design (CAD) applications have historically been based on a single user per application architecture. Although this architecture is still popular to date, it does have several drawbacks. First of all the single user CAD architecture inhibits a concurrent engineering design process where several designers can work on the same model simultaneously. This limitation introduces time inefficiency especially when a project involves geographically dispersed designers. A solution to these drawbacks could be a transition from the traditional single user CAD architecture to a multiuser col
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Authentication and Authorization"

1

Saracino, Andrea, and Paolo Mori, eds. Emerging Technologies for Authorization and Authentication. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93747-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saracino, Andrea, and Paolo Mori, eds. Emerging Technologies for Authorization and Authentication. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39749-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saracino, Andrea, and Paolo Mori, eds. Emerging Technologies for Authorization and Authentication. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04372-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Saracino, Andrea, and Paolo Mori, eds. Emerging Technologies for Authorization and Authentication. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64455-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Saracino, Andrea, and Paolo Mori, eds. Emerging Technologies for Authorization and Authentication. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-25467-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Corporation, Microsoft, ed. Building secure Microsoft ASP.NET applications: Authentication, authorization, and secure communication : patterns & practices. Microsoft Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Security controls for Sarbanes-Oxley section 404 IT compliance: Authorization, authentication, and access. Wiley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Guide to claims-based identity and access control: Authentication and authorization for services and the web. Microsoft Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dashorst, Martijn. Wicket in action. Manning, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dashorst, Martijn. Wicket in action. Manning, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Authentication and Authorization"

1

Norberg, Scott. "Authentication and Authorization." In Advanced ASP.NET Core 3 Security. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6014-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Calles, Miguel A. "Authentication and Authorization." In Serverless Security. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6100-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lopez, Daniel Andres Pelaez. "Authentication and Authorization." In Full-Stack Web Development with Jakarta EE and Vue.js. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6342-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Freeman, Adam, and Steven Sanderson. "Authentication and Authorization." In Pro ASP.NET MVC 3 Framework. Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3405-0_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Freeman, Adam. "Authentication and Authorization." In Applied ASP .NET 4 in Context. Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3468-5_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sinha, Sanjib. "Authentication and Authorization." In Beginning Laravel. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2538-7_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Müller, Michael. "Authentication and Authorization." In Practical JSF in Java EE 8. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3030-5_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bressoud, Thomas, and David White. "Authentication and Authorization." In Introduction to Data Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54371-6_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baker, Matthew. "Authentication and Authorization." In Secure Web Application Development. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8596-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Freeman, Adam. "Authentication and Authorization." In Pro ASP.NET 4.5 in C#. Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-4255-0_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Authentication and Authorization"

1

Ferrari, Elena. "Session details: Authorization and Authentication." In SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies. ACM, 2017. http://dx.doi.org/10.1145/3254590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Toseef, Umar, and Kostas Pentikousis. "Authentication and Authorization in FELIX." In 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC). IEEE, 2015. http://dx.doi.org/10.1109/ucc.2015.98.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ed Dawson, J. Lopez, J. A. Montenegro, and E. Okamoto. "BAAI: biometric authentication and authorization infrastructure." In International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003. IEEE, 2003. http://dx.doi.org/10.1109/itre.2003.1270620.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ali, Wasan Ahmed, Naji Mutar Sahib, and Jumana Waleed. "Preservation Authentication and Authorization on Blockchain." In 2019 2nd International Conference on Engineering Technology and its Applications (IICETA). IEEE, 2019. http://dx.doi.org/10.1109/iiceta47481.2019.9012996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hernandez, Santiago Zapata, and Antonio F. Gomez Skarmeta. "Virtual identities in authentication and authorization scenarios." In the 2006 International Conference. ACM Press, 2006. http://dx.doi.org/10.1145/1501434.1501502.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Boehm, Oliver, Jörg Caumanns, Markus Franke, and Oliver Pfaff. "Federated Authentication and Authorization: A Case Study." In 2008 12th International IEEE Enterprise Distributed Object Computing Conference (EDOC). IEEE, 2008. http://dx.doi.org/10.1109/edoc.2008.36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ezawa, Yuki, Makoto Takita, Yoshiaki Shiraishi, et al. "Designing Authentication and Authorization System with Blockchain." In 2019 14th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2019. http://dx.doi.org/10.1109/asiajcis.2019.00006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Laferriere and Charland. "Authentication and authorization techniques in distributed systems." In Proceedings of IEEE International Carnahan Conference on Security Technology. IEEE, 1993. http://dx.doi.org/10.1109/ccst.1993.386805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kreutz, Diego, Alysson Bessani, Eduardo Feitosa, and Hugo Cunha. "Towards Secure and Dependable Authentication and Authorization Infrastructures." In 2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, 2014. http://dx.doi.org/10.1109/prdc.2014.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Hyunwoo, and Steven C. Timm. "X.509 Authentication and Authorization in Fermi Cloud." In 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC). IEEE, 2014. http://dx.doi.org/10.1109/ucc.2014.119.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Authentication and Authorization"

1

Mitton, D., M. St.Johns, S. Barkley, et al. Authentication, Authorization, and Accounting: Protocol Evaluation. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Glass, S., T. Hiller, S. Jacobs, and C. Perkins. Mobile IP Authentication, Authorization, and Accounting Requirements. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Aboba, B., and J. Wood. Authentication, Authorization and Accounting (AAA) Transport Profile. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bormann, C. An Authorization Information Format (AIF) for Authentication and Authorization for Constrained Environments (ACE). RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Housley, R., and B. Aboba. Guidance for Authentication, Authorization, and Accounting (AAA) Key Management. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Giaretta, G., I. Guardini, E. Demaria, J. Bournelle, and R. Lopez. Authentication, Authorization, and Accounting (AAA) Goals for Mobile IPv6. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Selander, G., M. Mani, and S. Kumar. Use Cases for Authentication and Authorization in Constrained Environments. Edited by L. Seitz and S. Gerdes. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Perkins, C., and P. Calhoun. Authentication, Authorization, and Accounting (AAA) Registration Keys for Mobile IPv4. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc3957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chandramouli, Ramaswamy, and Teresa Schwarzhoff. Framework for emergency response official (ERO) authentication and authorization infrastructure. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.ir.7601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Campbell, B., C. Mortimore, M. Jones, and Y. Goland. Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!