Academic literature on the topic 'Authentication mechanism'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Authentication mechanism.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Authentication mechanism"
Putra, Kurnia Prima, Marwan Ramdhany Edy, M. Syahid Nur Wahid, Muhammad Fajar B, and Fadhlirrahman Baso. "FEATURES SIMPLIFICATION USING CUBIC BEZIER PROPERTIES FOR GAIT RECOGNITION ON SMARTPHONE." Journal of Embedded Systems, Security and Intelligent Systems 3, no. 1 (2022): 11. http://dx.doi.org/10.26858/jessi.v3i1.33716.
Full textCarrillo-Torres, Diego, Jesús Arturo Pérez-Díaz, Jose Antonio Cantoral-Ceballos, and Cesar Vargas-Rosales. "A Novel Multi-Factor Authentication Algorithm Based on Image Recognition and User Established Relations." Applied Sciences 13, no. 3 (2023): 1374. http://dx.doi.org/10.3390/app13031374.
Full textTaskeen, Fathima, and Mary Vennila S. "An Improved Mechanism for SDN Flow Space to Control Oriented Authentication NAA Network." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2019): 350–54. https://doi.org/10.35940/ijeat.B3014.129219.
Full textZhang, Xiaolong, Wei Wu, and Bin Zhou. "Secure Physical Layer Transmission and Authentication Mechanism Based on Compressed Sensing of Multiple Antenna Arrays." Journal of Sensors 2021 (November 10, 2021): 1–11. http://dx.doi.org/10.1155/2021/7022297.
Full textKadam, Pankaj Anil. "Enhanced ATM Security based on Machine Vision." International Journal for Research in Applied Science and Engineering Technology 9, no. VIII (2021): 816–20. http://dx.doi.org/10.22214/ijraset.2021.37432.
Full textHerrera-Cubides, Jhon Francined, Paulo Alonso Gaona-García, and Geiner Alexis Salcedo-Salgado. "Towards the Construction of a User Unique Authentication Mechanism on LMS Platforms through Model-Driven Engineering (MDE)." Scientific Programming 2019 (March 11, 2019): 1–16. http://dx.doi.org/10.1155/2019/9313571.
Full textMishra, Gouri Sankar, Pradeep Kumar Mishra, Parma Nand, Rani Astya, and Amrita. "User Authentication: A Three Level Password Authentication Mechanism." Journal of Physics: Conference Series 1712 (December 2020): 012005. http://dx.doi.org/10.1088/1742-6596/1712/1/012005.
Full textTalati, Ronak, and Shubham Shah. "4-D Authentication Mechanism." IOSR Journal of Computer Engineering 16, no. 2 (2014): 01–06. http://dx.doi.org/10.9790/0661-16250106.
Full textZavrak, Sultan, Seyhmus Yilmaz, Huseyin Bodur, and Sinan Toklu. "The implementation of two-factor web authentication system based on facial recognition." Global Journal of Computer Sciences: Theory and Research 7, no. 2 (2017): 68. http://dx.doi.org/10.18844/gjcs.v7i2.2715.
Full textRayani, Praveen Kumar, Bharath Bhushan, and Vaishali Ravindra Thakare. "Multi-Layer Token Based Authentication Through Honey Password in Fog Computing." International Journal of Fog Computing 1, no. 1 (2018): 50–62. http://dx.doi.org/10.4018/ijfc.2018010104.
Full textDissertations / Theses on the topic "Authentication mechanism"
Gerdzhikov, Petko. "Behaviour of Port-knocking authentication mechanism." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-60929.
Full textVelthuis, Paul. "New authentication mechanism using certificates for big data analytic tools." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215694.
Full textJ, Sharma Madhu. "Improved IP multimedia subsystem authentication mechanism in next generation networks." Thesis, University of British Columbia, 2011. http://hdl.handle.net/2429/39950.
Full textMonteiro, Steena D. S. "A Novel Authentication And Validation Mechanism For Analyzing Syslogs Forensically." DigitalCommons@USU, 2008. https://digitalcommons.usu.edu/etd/198.
Full textMaguire, Joseph Noel. "An ecologically valid evaluation of an observation-resilient graphical authentication mechanism." Thesis, University of Glasgow, 2013. http://theses.gla.ac.uk/4708/.
Full textFrushour, John H. "Design considerations for a computationally-lightweight authentication mechanism for passive RFID tags." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FFrushour.pdf.
Full textSakamuri, Sai. "Design and Evaluation of a New Authentication Mechanism for Validating the Sender of an Email." Scholar Commons, 2005. https://scholarcommons.usf.edu/etd/840.
Full textChang, Shun-Shyan, and 張舜賢. "An Anti-Phishing User Authentication Mechanism." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/39480187846522786317.
Full textHung, Chun-Lai, and 洪春來. "An Authentication Mechanism of Medical Image Application." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/12868917002325471232.
Full textChang, Chi-Hung, and 張啟宏. "OpenID authentication mechanism with enhanced ATM card." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/37602243625006956778.
Full textBooks on the topic "Authentication mechanism"
Magno, Marianna B. Survey of user authentication mechanisms. Naval Postgraduate School, 1996.
Find full textZviran, Moshe. A comparison of password techniques for multilevel authentication mechanisms. Naval Postgraduate School, 1990.
Find full textTodorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Auerbach Pub, 2007.
Find full textMartin, Keith M. Entity Authentication. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0008.
Full textTodorov, Dobromir. Mechanics of User Identification and Authentication. Auerbach Publications, 2007. http://dx.doi.org/10.1201/9781420052206.
Full textTodorov, Dobromir. Mechanics of User Identification and Authentication: Fundamentals of Identity Management. Auerbach Publishers, Incorporated, 2007.
Find full textTodorov, Dobromir. Mechanics of User Identification and Authentication: Fundamentals of Identity Management. AUERBACH, 2007.
Find full textTodorov, Dobromir. Mechanics of User Identification and Authentication: Fundamentals of Identity Management. Auerbach Publishers, Incorporated, 2007.
Find full textBook chapters on the topic "Authentication mechanism"
Fietkau, Julian, Syeda Mehak Zahra, and Markus Hartung. "Secure Authentication for Everyone! Enabling 2nd-Factor Authentication Under Real-World Constraints." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_8.
Full textYadav, Vinay, Manish Kumar Soni, and Ajay Pratap. "Securing the Cloud Authentication Mechanism using Two-Factor Authentication." In Emerging Trends in IoT and Computing Technologies. CRC Press, 2024. http://dx.doi.org/10.1201/9781003535423-67.
Full textToiruul, Batbold, KyungOh Lee, HyunJun Lee, YoungHan Lee, and YoonYoung Park. "Mutual-Authentication Mechanism for RFID Systems." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11943952_38.
Full textJeong, Yoon-Su, Bong-Keun Lee, Keon-Myung Lee, and Sang-Ho Lee. "Efficient Unilateral Authentication Mechanism for MIPv6." In Computational Science – ICCS 2006. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11758501_135.
Full textManzanares, Antonio Izquierdo, Joaquín Torres Márquez, Juan M. Estevez-Tapiador, and Julio César Hernández Castro. "Attacks on Port Knocking Authentication Mechanism." In Computational Science and Its Applications – ICCSA 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11424925_134.
Full textGuo, Ming-Huang, Horng-Twu Liaw, Jui-Kheng Tang, and Chih-Ta Yen. "High Security Authentication Mechanism for Mobile Networks." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23948-9_32.
Full textGopali, Saroj, Pranaya Sharma, Praveen Kumar Khethavath, and Doyel Pal. "HyPA: A Hybrid Password-Based Authentication Mechanism." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73100-7_47.
Full textKhalil, Issa, Zuochao Dou, and Abdallah Khreishah. "TPM-Based Authentication Mechanism for Apache Hadoop." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23829-6_8.
Full textIbañez-Ramírez, Juan Alejandro, and Francisco de Asís López-Fuentes. "Authentication Mechanism to Access Multiple-Domain Multimedia Data." In Cryptology and Network Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98678-4_55.
Full textSaarinen, Markku-Juhani O. "The PASSERINE Public Key Encryption and Authentication Mechanism." In Information Security Technology for Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27937-9_20.
Full textConference papers on the topic "Authentication mechanism"
Zhai, Hongting, Qingrui Zhang, Qi Zhai, et al. "Dual Authentication Mechanism of Reliable Session Initiation Protocol." In 2024 IEEE 7th International Conference on Automation, Electronics and Electrical Engineering (AUTEEE). IEEE, 2024. https://doi.org/10.1109/auteee62881.2024.10869742.
Full textGupta, Samikhsha, Sumeet Gupta, and Sachin Gupta. "Smart Card-Based Mutual Authentication Mechanism for UAV Networks." In 2024 IEEE International Conference on Communication, Computing and Signal Processing (IICCCS). IEEE, 2024. http://dx.doi.org/10.1109/iicccs61609.2024.10763670.
Full textGuo, Junli, Qing Liu, Yongteng Ou, and Xiangge Meng. "Electronic Control Unit Authentication Mechanism Based on Endogenous Security." In 2025 4th International Symposium on Computer Applications and Information Technology (ISCAIT). IEEE, 2025. https://doi.org/10.1109/iscait64916.2025.11010535.
Full textDostalek, Libor, and Jiri Safarik. "Strong password authentication with AKA authentication mechanism." In 2017 International Conference on Applied Electronics (AE). IEEE, 2017. http://dx.doi.org/10.23919/ae.2017.8053581.
Full textSridhar, S., and K. Vimala Devi. "Nested mechanism for mutual authentication." In 2011 3rd International Conference on Electronics Computer Technology (ICECT). IEEE, 2011. http://dx.doi.org/10.1109/icectech.2011.5941679.
Full textJivanadham, L. B., A. K. M. Muzahidul Islam, Yoshiaki Katayama, Shozo Komaki, and S. Baharun. "Cloud Cognitive Authenticator (CCA): A public cloud computing authentication mechanism." In 2013 2nd International Conference on Informatics, Electronics and Vision (ICIEV). IEEE, 2013. http://dx.doi.org/10.1109/iciev.2013.6572626.
Full textLi, Feng, and Jie Wu. "Authentication via Ambassadors: A Novel Authentication Mechanism in MANETs." In MILCOM 2007 - IEEE Military Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/milcom.2007.4455065.
Full textYun-kyung Lee, Hong-il Ju, Jee-hye Park, and Jong-wook Han. "User authentication mechanism using authentication server in home network." In 8th International Conference on Advanced Communication Technology. IEEE, 2006. http://dx.doi.org/10.1109/icact.2006.206017.
Full textBoshoff, Dutliff, Alexander Scriba, Raphael Nkrow, and Gerhard P. Hancke. "Phone Pick-up Authentication: A Gesture-Based Smartphone Authentication Mechanism." In 2023 IEEE International Conference on Industrial Technology (ICIT). IEEE, 2023. http://dx.doi.org/10.1109/icit58465.2023.10143117.
Full textBoshoff, Dutliff, Raphael Nkrow, and Gerhard P. Hancke. "Knock-to-Enter Authentication: A Rhythm-Based Smartphone Authentication Mechanism." In IECON 2023- 49th Annual Conference of the IEEE Industrial Electronics Society. IEEE, 2023. http://dx.doi.org/10.1109/iecon51785.2023.10312590.
Full textReports on the topic "Authentication mechanism"
Cullen, M., S. Hartman, D. Zhang, and T. Reddy. Port Control Protocol (PCP) Authentication Mechanism. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7652.
Full textMelnikov, A. Salted Challenge Response HTTP Authentication Mechanism. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7804.
Full textNewman, C., A. Menon-Sen, A. Melnikov, and N. Williams. Salted Challenge Response Authentication Mechanism (SCRAM) SASL and GSS-API Mechanisms. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5802.
Full textLeach, P., and C. Newman. Using Digest Authentication as a SASL Mechanism. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2831.
Full textZuccherato, R., and M. Nystrom. ISO/IEC 9798-3 Authentication SASL Mechanism. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3163.
Full textSiemborski, R., and A. Menon-Sen. The Post Office Protocol (POP3) Simple Authentication and Security Layer (SASL) Authentication Mechanism. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc5034.
Full textZeilenga, K. Anonymous Simple Authentication and Security Layer (SASL) Mechanism. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4505.
Full textZeilenga, K., ed. The PLAIN Simple Authentication and Security Layer (SASL) Mechanism. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4616.
Full textHowlett, J. A GSS-API Mechanism for the Extensible Authentication Protocol. Edited by S. Hartman. RFC Editor, 2013. http://dx.doi.org/10.17487/rfc7055.
Full textMelnikov, A., ed. The Kerberos V5 ("GSSAPI") Simple Authentication and Security Layer (SASL) Mechanism. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4752.
Full text