Academic literature on the topic 'Authentication Systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Authentication Systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Authentication Systems"
Pagnin, Elena, and Aikaterini Mitrokotsa. "Privacy-Preserving Biometric Authentication: Challenges and Directions." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/7129505.
Full textPapaspirou, Vassilis, Maria Papathanasaki, Leandros Maglaras, et al. "A Novel Authentication Method That Combines Honeytokens and Google Authenticator." Information 14, no. 7 (2023): 386. http://dx.doi.org/10.3390/info14070386.
Full textJunquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.
Full textSong, Yubo, Bing Chen, Tianqi Wu, Tianyu Zheng, Hongyuan Chen, and Junbo Wang. "Enhancing Packet-Level Wi-Fi Device Authentication Protocol Leveraging Channel State Information." Wireless Communications and Mobile Computing 2021 (November 17, 2021): 1–12. http://dx.doi.org/10.1155/2021/2993019.
Full textLoginovskiy, O. V., M. E. Koval, and A. A. Shinkarev. "Using the ideal point method to search the best authentication method in corporate information systems." Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control & Radioelectronics 22, no. 3 (2022): 5–18. http://dx.doi.org/10.14529/ctcr220301.
Full textB, Dhainje Prakash, and Dhainje Dattatray B. "3D Authentication Systems." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 5 (2017): 713–17. http://dx.doi.org/10.23956/ijarcsse/sv7i5/0328.
Full textWang, Yajie, Xiaomei Zhang, and Haomin Hu. "Continuous User Authentication on Multiple Smart Devices." Information 14, no. 5 (2023): 274. http://dx.doi.org/10.3390/info14050274.
Full textNigam, Dhananjay, Shilp Nirajbhai Patel, P. M. Durai Raj Vincent, Kathiravan Srinivasan, and Sinouvassane Arunmozhi. "Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems." Journal of Healthcare Engineering 2022 (March 24, 2022): 1–15. http://dx.doi.org/10.1155/2022/1789996.
Full textKarim, Nader Abdel, Hasan Kanaker, Waleed K. Abdulraheem, Majdi Ali Ghaith, Essam Alhroob, and Abdulla Mousa Falah Alali. "Choosing the right MFA method for online systems: A comparative analysis." International Journal of Data and Network Science 8, no. 1 (2024): 201–12. http://dx.doi.org/10.5267/j.ijdns.2023.10.003.
Full textNoh, Seungil, Jaehan Kim, Seokmin Lee, Youngshin Kang, Cheolsoo Park, and Youngjoo Shin. "Broken Heart: Privacy Leakage Analysis on ECG-Based Authentication Schemes." Security and Communication Networks 2022 (September 29, 2022): 1–14. http://dx.doi.org/10.1155/2022/7997509.
Full textDissertations / Theses on the topic "Authentication Systems"
Sandnes, Are Haugen. "National Authentication Systems." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18349.
Full textPutienkov, O. M., та А. V. Bulashenko. "Вiometric authentication systems". Thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/67602.
Full textMerritt, John W. "Distributed file systems in an authentication system." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9938.
Full textMadero, Alvaro. "Password secured systems and negative authentication." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/90691.
Full textRuoti, Scott. "Authentication Melee: A Usability Analysis of Seven Web Authentication Systems." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/4376.
Full textAggarwal, Pankaj. "Mobile authentication in wireless systems." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0010839.
Full textLiu, Yu. "Research on extended noise tolerant message authentication codes and applications on noisy information authentication." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 148 p, 2007. http://proquest.umi.com/pqdweb?did=1354135421&sid=36&Fmt=2&clientId=8331&RQT=309&VName=PQD.
Full textFält, Markus. "Multi-factor Authentication : System proposal and analysis of continuous authentication methods." Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-39212.
Full textÅslund, Jonas. "Authentication in peer-to-peer systems." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1222.
Full textHakobyan, Davit. "Authentication and Authorization Systems in Cloud Environments." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102870.
Full textBooks on the topic "Authentication Systems"
Smith-Creasey, Max. Continuous Biometric Authentication Systems. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-49071-2.
Full textTerry, Plum, Bleiler Richard, and Association of Research Libraries. Office of Leadership and Management Services., eds. User authentication. Association of Research Libraries, Office of Leadership and Management Services, 2001.
Find full textAsad, Ali. Biometrics: An investigation of fingerprint authentication systems. University of East London, 2001.
Find full textW, Mak M., and Lin Shang-Hung 1968-, eds. Biometric authentication: A machine learning approach. Prentice Hall Professional Technical Reference, 2005.
Find full textZhang, David. Biometric Solutions: For Authentication in an E-World. Springer US, 2002.
Find full textJakobsson, Markus. Mobile Authentication: Problems and Solutions. Springer New York, 2013.
Find full textNational Computer Security Center (U.S.), ed. A Guide to understanding identification and authentication in trusted systems. National Computer Security Center, 1991.
Find full textZviran, Moshe. A comparison of password techniques for multilevel authentication mechanisms. Naval Postgraduate School, 1990.
Find full textBorivoje, Furht, and Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Auerbach Publications, 2006.
Find full textECCV 2004 International Workshop (2004 Prague, Czech Republic). Biometric authentication: ECCV 2004 International Workshop, BioAW 2004, Prague, Czech Republic, May 15th, 2004 : proceedings. Springer, 2004.
Find full textBook chapters on the topic "Authentication Systems"
Melone, Michael. "Authentication." In Designing Secure Systems. CRC Press, 2021. http://dx.doi.org/10.1201/9781003144182-5.
Full textBlanton, Marina. "Authentication." In Encyclopedia of Database Systems. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_32-2.
Full textBlanton, Marina. "Authentication." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_32.
Full textBlanton, Marina. "Authentication." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_32.
Full textAli, Asad, François Tuot, and Gerald Maunier. "Authentication and Mutual Authentication." In Trusted Computing for Embedded Systems. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09420-5_4.
Full textJain, Anil K., Sarat C. Dass, and Karthik Nandakumar. "Soft Biometric Traits for Personal Recognition Systems." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25948-0_99.
Full textChen, J. S., Y. S. Moon, and K. F. Fong. "Efficient Fingerprint Image Enhancement for Mobile Embedded Systems." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25976-3_14.
Full textTuyls, Pim, and Jasper Goseling. "Capacity and Examples of Template-Protecting Biometric Authentication Systems." In Biometric Authentication. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25976-3_15.
Full textPark, Seung Bae, Moon Seol Kang, and Sang Jun Lee. "New Authentication Systems." In Grid and Cooperative Computing. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24679-4_189.
Full textDasgupta, Dipankar, Arunava Roy, and Abhijit Nag. "Negative Authentication Systems." In Infosys Science Foundation Series. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58808-7_3.
Full textConference papers on the topic "Authentication Systems"
Ganiga, Prakruthi, Priyadarshini, Vineela Chandra Dodda, Ravi Kumar, and Inbarasan Muniraj. "Hologram authentication and classification via a Convolutional Neural Network." In Imaging Systems and Applications. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/isa.2024.itu3g.4.
Full textDenes, Istvan, and Sándor Semperger. "Improvement of Physical Security through Continuous Authentication for SCADA and DCS Systems in Industrial Automation and Control Systems." In 10th International Scientific Conference on Advances in Mechanical Engineering. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-nl1llk.
Full textShah, Mahi Mukesh, Unnati Sitaram Rathi, Amol Murlidhar Patil, et al. "Blockchain Based Goods Authentication System." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS). IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837550.
Full textGreen, R. "User requirements of image security systems." In IEE Seminar on Secure Images and Image Authentication. IEE, 2000. http://dx.doi.org/10.1049/ic:20000224.
Full textÖzgür, Hafızullah, and Yunus Emre Selçuk. "Authentication in ATM/ITM Machines using Iris Recognition Biometrics." In 10th International Conference on Artificial Intelligence & Applications. Academy & Industry Research Collaboration Center, 2023. http://dx.doi.org/10.5121/csit.2023.131901.
Full textCristescu, Robert madalin. "AUTHENTICATION BASED ON OCULAR RETINA RECOGNITION IN E-LEARNING SYSTEMS." In eLSE 2019. Carol I National Defence University Publishing House, 2019. http://dx.doi.org/10.12753/2066-026x-19-098.
Full textLampson, Butler, Martín Abadi, Michael Burrows, and Edward Wobber. "Authentication in distributed systems." In the thirteenth ACM symposium. ACM Press, 1991. http://dx.doi.org/10.1145/121132.121160.
Full textBoechat, Glaucya C., Jeneffer C. Ferreira, and Edson C. B. Carvalho Filho. "Authentication personal." In 2007 International Conference on Intelligent and Advanced Systems (ICIAS). IEEE, 2007. http://dx.doi.org/10.1109/icias.2007.4658385.
Full textLopes, Ana Paula Golembiouski, Paulo R. L. Gondim, and Jaime Lloret. "Mutual Authentication Protocol for Cloud-based E-health Systems." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/sbseg_estendido.2018.4145.
Full textHong, Feng, Meiyu Wei, Shujuan You, Yuan Feng, and Zhongwen Guo. "Waving Authentication." In CHI '15: CHI Conference on Human Factors in Computing Systems. ACM, 2015. http://dx.doi.org/10.1145/2702613.2725444.
Full textReports on the topic "Authentication Systems"
Mangan, D. L., C. S. Sonnier, and D. D. Drayer. Authentication of operator-designed monitoring systems. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6171425.
Full textFisher, Bill. Multifactor Authentication for Law Enforcement Systems. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8523.ipd.
Full textPoplawski, Michael, Adam St. Lawrence, and Hung Ngo. An Authentication Vulnerability Assessment of Connected Lighting Systems. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1618038.
Full textLamb, Christopher, Benjamin Karch, Minami Tanaka, and Romuald Valme. Advanced Reactor Control Systems Authentication Methods and Recommendations. Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/2430252.
Full textPasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Full textVarastehpour, Soheil, Hamid Sharifzadeh, Iman Ardekani, and Abdolhossein Sarrafzadeh. Human Biometric Traits: A Systematic Review Focusing on Vascular Patterns. Unitec ePress, 2020. http://dx.doi.org/10.34074/ocds.086.
Full textSmid, Miles E., Elaine Barker, David Balenson, and Martha Haykin. Message authentication code (MAC) validation system. National Bureau of Standards, 1988. http://dx.doi.org/10.6028/nbs.sp.500-156.
Full textLi, T., and R. Atkinson. Intermediate System to Intermediate System (IS-IS) Cryptographic Authentication. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3567.
Full textWu, T. The SRP Authentication and Key Exchange System. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2945.
Full textSerhrouchni, A., and H. Labiod. TLS Authentication Using Intelligent Transport System (ITS) Certificates. Edited by M. Msahli, N. Cam-Winget, and W. Whyte. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8902.
Full text