Journal articles on the topic 'Authentication Systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Authentication Systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Pagnin, Elena, and Aikaterini Mitrokotsa. "Privacy-Preserving Biometric Authentication: Challenges and Directions." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/7129505.
Full textPapaspirou, Vassilis, Maria Papathanasaki, Leandros Maglaras, et al. "A Novel Authentication Method That Combines Honeytokens and Google Authenticator." Information 14, no. 7 (2023): 386. http://dx.doi.org/10.3390/info14070386.
Full textJunquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.
Full textSong, Yubo, Bing Chen, Tianqi Wu, Tianyu Zheng, Hongyuan Chen, and Junbo Wang. "Enhancing Packet-Level Wi-Fi Device Authentication Protocol Leveraging Channel State Information." Wireless Communications and Mobile Computing 2021 (November 17, 2021): 1–12. http://dx.doi.org/10.1155/2021/2993019.
Full textLoginovskiy, O. V., M. E. Koval, and A. A. Shinkarev. "Using the ideal point method to search the best authentication method in corporate information systems." Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control & Radioelectronics 22, no. 3 (2022): 5–18. http://dx.doi.org/10.14529/ctcr220301.
Full textB, Dhainje Prakash, and Dhainje Dattatray B. "3D Authentication Systems." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 5 (2017): 713–17. http://dx.doi.org/10.23956/ijarcsse/sv7i5/0328.
Full textWang, Yajie, Xiaomei Zhang, and Haomin Hu. "Continuous User Authentication on Multiple Smart Devices." Information 14, no. 5 (2023): 274. http://dx.doi.org/10.3390/info14050274.
Full textNigam, Dhananjay, Shilp Nirajbhai Patel, P. M. Durai Raj Vincent, Kathiravan Srinivasan, and Sinouvassane Arunmozhi. "Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems." Journal of Healthcare Engineering 2022 (March 24, 2022): 1–15. http://dx.doi.org/10.1155/2022/1789996.
Full textKarim, Nader Abdel, Hasan Kanaker, Waleed K. Abdulraheem, Majdi Ali Ghaith, Essam Alhroob, and Abdulla Mousa Falah Alali. "Choosing the right MFA method for online systems: A comparative analysis." International Journal of Data and Network Science 8, no. 1 (2024): 201–12. http://dx.doi.org/10.5267/j.ijdns.2023.10.003.
Full textNoh, Seungil, Jaehan Kim, Seokmin Lee, Youngshin Kang, Cheolsoo Park, and Youngjoo Shin. "Broken Heart: Privacy Leakage Analysis on ECG-Based Authentication Schemes." Security and Communication Networks 2022 (September 29, 2022): 1–14. http://dx.doi.org/10.1155/2022/7997509.
Full textChen, Xiang, Shouzhi Xu, Kai Ma, and Peng Chen. "Cross-Domain Identity Authentication Protocol of Consortium Blockchain Based on Face Recognition." Information 13, no. 11 (2022): 535. http://dx.doi.org/10.3390/info13110535.
Full textBalyuk, Aleksey, and Oleg Finko. "INFORMATION SECURITY OF CYBER-PHYSICAL SYSTEMS: AUTHENTICATION OF DIGITAL TWINS." Voprosy kiberbezopasnosti, no. 5(51) (2022): 100–113. http://dx.doi.org/10.21681/2311-3456-2022-5-100-113.
Full textCarrillo-Torres, Diego, Jesús Arturo Pérez-Díaz, Jose Antonio Cantoral-Ceballos, and Cesar Vargas-Rosales. "A Novel Multi-Factor Authentication Algorithm Based on Image Recognition and User Established Relations." Applied Sciences 13, no. 3 (2023): 1374. http://dx.doi.org/10.3390/app13031374.
Full textBeaudin, Shauna, Yar Levy, James Parrish, and Theon Danet. "An empirical study of authentication methods to secure e-learning system activities against impersonation fraud." Online Journal of Applied Knowledge Management 4, no. 1 (2016): 42–61. http://dx.doi.org/10.36965/ojakm.2016.4(1)42-61.
Full textLiebl, Armin. "Authentication in distributed systems." ACM SIGOPS Operating Systems Review 27, no. 4 (1993): 31–41. http://dx.doi.org/10.1145/163640.163643.
Full textLampson, Butler, Martín Abadi, Michael Burrows, and Edward Wobber. "Authentication in distributed systems." ACM SIGOPS Operating Systems Review 25, no. 5 (1991): 165–82. http://dx.doi.org/10.1145/121133.121160.
Full textLampson, Butler, Martín Abadi, Michael Burrows, and Edward Wobber. "Authentication in distributed systems." ACM Transactions on Computer Systems 10, no. 4 (1992): 265–310. http://dx.doi.org/10.1145/138873.138874.
Full textPinto, Alexandre, André Souto, Armando Matos, and Luís Antunes. "Commitment and authentication systems." Designs, Codes and Cryptography 53, no. 3 (2009): 175–93. http://dx.doi.org/10.1007/s10623-009-9303-1.
Full textWoo, T. Y. C., and S. S. Lam. "Authentication for distributed systems." Computer 25, no. 1 (1992): 39–52. http://dx.doi.org/10.1109/2.108052.
Full text., Rishabh, and Saksham Azad. "Multilayered voice authentication systems." International Journal of Electronic Devices and Networking 5, no. 1 (2024): 01–07. http://dx.doi.org/10.22271/27084477.2024.v5.i1a.46.
Full textAnastasaki, Ioanna, George Drosatos, George Pavlidis, and Konstantinos Rantos. "User Authentication Mechanisms Based on Immersive Technologies: A Systematic Review." Information 14, no. 10 (2023): 538. http://dx.doi.org/10.3390/info14100538.
Full textLiu, Jing, Rongchao Liu, and Yingxu Lai. "Risk-Based Dynamic Identity Authentication Method Based on the UCON Model." Security and Communication Networks 2022 (March 31, 2022): 1–13. http://dx.doi.org/10.1155/2022/2509267.
Full textLi, Hui, Xuesong Pan, Xinluo Wang, Haonan Feng, and Chengjie Shi. "Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices." Wireless Communications and Mobile Computing 2020 (September 1, 2020): 1–14. http://dx.doi.org/10.1155/2020/8819790.
Full textXia, Zhe, Yining Liu, Ching-Fang Hsu, and Chin-Chen Chang. "Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications." Security and Communication Networks 2020 (July 13, 2020): 1–8. http://dx.doi.org/10.1155/2020/6183861.
Full textWu, Miqi, Lin You, Gengran Hu, Liang Li, and Chengtang Cao. "A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture." Security and Communication Networks 2021 (April 22, 2021): 1–20. http://dx.doi.org/10.1155/2021/5592119.
Full textSureshbabu, P., and M. Sakthivadivu. "A Review on Biometrics Authentication System Using Fingerprint." Asian Journal of Computer Science and Technology 8, S1 (2019): 4–6. http://dx.doi.org/10.51983/ajcst-2019.8.s1.2016.
Full textAl-ali, Mowafaq, Ali A.Yassin, and Hamid Ali Abed AL-Asadi. "Adoption of Bloom Filter and Firebase Framework to Enhance Authentication Time for Healthcare Systems Based on Blockchain Technology." Basrah Researches Sciences 50, no. 1 (2024): 16. http://dx.doi.org/10.56714/bjrs.50.1.23.
Full textRobert, Wang, Chan Stephan, and Chang Yung-Cheng. "Performance Evaluation of Android Pattern Authentication Systems." Engineering: An International Journal 1, no. 1 (2019): 1–14. https://doi.org/10.5281/zenodo.3774821.
Full textHaarbrandt, B., D. Fortmeier, R. Haux, C. Seidel, and J. Schwartze. "Authentication Systems for Securing Clinical Documentation Workflows." Methods of Information in Medicine 53, no. 01 (2014): 3–13. http://dx.doi.org/10.3414/me12-01-0078.
Full textAlomair, Basel, and Radha Poovendran. "Information Theoretically Secure Encryption with Almost Free Authentication." JUCS - Journal of Universal Computer Science 15, no. (15) (2009): 2937–56. https://doi.org/10.3217/jucs-015-15-2937.
Full textTripathi, Diwakar R., and Dipesh Kumar Nishad. "Biometric Authentication Systems: A Survey." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2878–84. http://dx.doi.org/10.61841/turcomat.v11i3.14653.
Full textGorbenko, I. D., and D. Fesenko. "Using BLOCKCHAIN in automotive security." Radiotekhnika, no. 203 (December 23, 2020): 97–108. http://dx.doi.org/10.30837/rt.2020.4.203.09.
Full textYounis MOSTAFA, Ehab, and Saja J. MOHAMMED. "THE LANDSCAPE OF AUTHENTICATION SYSTEMS: A COMPREHENSIVE SURVEY." MINAR International Journal of Applied Sciences and Technology 05, no. 04 (2023): 01–16. http://dx.doi.org/10.47832/2717-8234.17.1.
Full textJ.Balaraju, Et al. "Inspired Symbol-based Authentication against Dictionary attacks Using ML Algorithm." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 2197–200. http://dx.doi.org/10.17762/ijritcc.v11i9.9223.
Full textGupta, Brij B., and Shaifali Narayan. "A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server." Journal of Organizational and End User Computing 33, no. 2 (2021): 1–16. http://dx.doi.org/10.4018/joeuc.20210301.oa1.
Full textRajasingh, J. Paul, and D. Sai Yaswanth. "Fingerprint Authentication." International Journal of Engineering and Advanced Technology 10, no. 5 (2021): 87–89. http://dx.doi.org/10.35940/ijeat.e2651.0610521.
Full textJ, Paul Rajasingh, and Sai Yaswanth D. "Fingerprint Authentication." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 5 (2021): 87–89. https://doi.org/10.35940/ijeat.E2651.0610521.
Full textJabłoński, Janusz, and Robert Dylewski. "Quantum-Resistant Cryptography for Smart Metering in Smart Grid Systems." Energies 18, no. 5 (2025): 1204. https://doi.org/10.3390/en18051204.
Full textAndjarwirawan, Justinus. "Single Sign-On (SSO) Implementation Using Keycloak, RADIUS, LDAP, and PacketFence for Network Access." Teknika 14, no. 1 (2025): 41–46. https://doi.org/10.34148/teknika.v14i1.1089.
Full textRozlomii, Inna, and Serhii Naumenko. "AUTHENTICATION METHODS IN EMBEDDED SYSTEMS WITH LIMITED COMPUTING RESOURCES." Problems of Modeling and Design Automatization 1, no. 21 (2025): 86–93. https://doi.org/10.31474/2074-7888-2025-1-21-86-93.
Full textNatarajan Meghanathan. "Biometric Systems for User Authentication." International Journal of Information Processing and Management 2, no. 4 (2011): 10–21. http://dx.doi.org/10.4156/ijipm.vol2.issue4.2.
Full textIvanova, S. M., Z. V. Ilyichenkova, and A. A. Antonova. "User Authentication in Training Systems." INFORMACIONNYE TEHNOLOGII 26, no. 11 (2020): 648–54. http://dx.doi.org/10.17587/it.26.648-654.
Full textClark, Gradeigh D., and Janne Lindqvist. "Engineering Gesture-Based Authentication Systems." IEEE Pervasive Computing 14, no. 1 (2015): 18–25. http://dx.doi.org/10.1109/mprv.2015.6.
Full textTun, Naing Win, and Masahiro Mambo. "Secure PUF-Based Authentication Systems." Sensors 24, no. 16 (2024): 5295. http://dx.doi.org/10.3390/s24165295.
Full textGollmann, Dieter, Thomas Beth, and Frank Damm. "Authentication services in distributed systems." Computers & Security 12, no. 8 (1993): 753–64. http://dx.doi.org/10.1016/0167-4048(93)90041-3.
Full textMuthupandian.V. "Palm Vein Pattern Authentication Systems." International Journal of Multidisciplinary Research Transactions 5, no. 6 (2023): 314–24. https://doi.org/10.5281/zenodo.7900061.
Full textShrinivas Khedkar and Ronik Mahajan. "Optimized and Efficient Authentication in VANET using Blockchain." Management Journal for Advanced Research 2, no. 4 (2022): 35–41. http://dx.doi.org/10.54741/mjar.2.4.6.
Full textMishra, Pawan, ShubhamKumar Singh, Sonu Mishra, and Siddharth Singh. "User Authentication System Using Python." International Journal of Innovative Research in Advanced Engineering 11, no. 12 (2024): 957–63. https://doi.org/10.26562/ijirae.2024.v1112.11.
Full textBasher Hamza, Asmaa, and Rajaa K. Hasoun. "Review of Authentication Systems based on Electroencephalogram." Iraqi Journal for Computers and Informatics 50, no. 1 (2024): 208–19. http://dx.doi.org/10.25195/ijci.v50i1.477.
Full textAllafi, Randa, and Abdulbasit A. Darem. "Usability and security in online authentication systems." International Journal of ADVANCED AND APPLIED SCIENCES 12, no. 6 (2025): 1–12. https://doi.org/10.21833/ijaas.2025.06.001.
Full text