Academic literature on the topic 'Delegated authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Delegated authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Delegated authentication"
Khan, Mohsin, Philip Ginzboorg, and Valtteri Niemi. "AKMA: Delegated Authentication System of 5G." IEEE Communications Standards Magazine 5, no. 3 (2021): 56–61. http://dx.doi.org/10.1109/mcomstd.101.2100015.
Full textLoiselle, Mirka. "Multiple Authority Delegation in Art Authentication." Scientonomy: Journal for the Science of Science 1 (May 19, 2017): 41–53. http://dx.doi.org/10.33137/js.v1i0.28233.
Full textLin, Qun, Jianzhong Li, and Xuechang Ren. "A provably secure delegated authentication scheme and its applications." International Journal of Embedded Systems 11, no. 2 (2019): 139. http://dx.doi.org/10.1504/ijes.2019.098292.
Full textLin, Qun, Jianzhong Li, and Xuechang Ren. "A provably secure delegated authentication scheme and its applications." International Journal of Embedded Systems 11, no. 2 (2019): 139. http://dx.doi.org/10.1504/ijes.2019.10019710.
Full textChien, Hung-Yu, and Tzu-Hang Hsu. "Secure fast WLAN handoff using time-bound delegated authentication." International Journal of Communication Systems 22, no. 5 (2009): 565–84. http://dx.doi.org/10.1002/dac.983.
Full textZhang, Lei, Lifei Wei, Dongmei Huang, Kai Zhang, Mianxiong Dong, and Kaoru Ota. "MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing." Security and Communication Networks 9, no. 16 (2016): 3777–89. http://dx.doi.org/10.1002/sec.1490.
Full textLee, JoonYoung, MyeongHyun Kim, JiHyeon Oh, YoungHo Park, KiSung Park, and Sungkee Noh. "A Secure Key Aggregate Searchable Encryption with Multi Delegation in Cloud Data Sharing Service." Applied Sciences 11, no. 19 (2021): 8841. http://dx.doi.org/10.3390/app11198841.
Full textDumitru, Ionuț Cătălin, and Mihai Togan. "Client Module with Multifactor Authentication for Remote Electronic Signature Generation Using Cryptography API: Next Generation." Journal of Military Technology 3, no. 1 (2020): 5–10. http://dx.doi.org/10.32754/jmt.2020.1.01.
Full textPark, Jun-Cheol. "Delegated Provision of Personal Information and Storage of Provided Information on a Blockchain Ensuring Data Confidentiality." Korean Institute of Smart Media 11, no. 10 (2022): 76–88. http://dx.doi.org/10.30693/smj.2022.11.10.76.
Full textPavlov, Andrey S., Nikolay Yu Svistunov, Vyacheslav I. Petrenko, Fariza B. Tebueva, Vladimir V. Kopytov, and Evgeniy N. Tishchenko. "PROTOCOL FOR THE DELEGATED AUTHENTICATION OF NEW AGENTS WHEN THE NUMBER OF AGENTS IS SCALING IN SWARMING ROBOT SYSTEMS." Вестник ВГУ Серия Системный анализ и информационные технологии, no. 4 (2022): 23–38. http://dx.doi.org/10.17308/sait/1995-5499/2022/4/23-38.
Full textDissertations / Theses on the topic "Delegated authentication"
Delignat-Lavaud, Antoine. "On the security of authentication protocols on the web." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE018/document.
Full textSbai, Anass. "Contributions au proxy de re-chiffrement et à la délégation d'authentification." Electronic Thesis or Diss., Amiens, 2021. http://www.theses.fr/2021AMIE0032.
Full textOdyurt, Uraz. "Evaluation of Single Sign-On Frameworks, as a Flexible Authorization Solution : OAuth 2.0 Authorization Framework." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37097.
Full textLiu, Po-Shen, and 劉柏伸. "A Study on RFID Authentication and RFID Delegated-Authentication Application." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/41755985866189428843.
Full textBook chapters on the topic "Delegated authentication"
Jessup, Andrew, Henrique Z. Cochak, Guilherme P. Koslovski, et al. "DVID: Adding Delegated Authentication to SPIFFE Trusted Domains." In Advanced Information Networking and Applications. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57916-5_25.
Full textWei, Lifei, Lei Zhang, Kai Zhang, and Mianxiong Dong. "An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud." In Wireless Algorithms, Systems, and Applications. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21837-3_60.
Full textAlimomeni, Mohsen, and Reihaneh Safavi-Naini. "How to Prevent to Delegate Authentication." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-28865-9_26.
Full textMarwan, Mbarek, Ali Kartit, and Hassan Ouahmane. "A Framework to Secure Medical Image Storage in Cloud Computing Environment." In Cloud Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch016.
Full textConference papers on the topic "Delegated authentication"
Sbai, Anass, Cyril Drocourt, and Gilles Dequen. "A New Delegated Authentication Protocol based on PRE." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010542404680478.
Full textSbai, Anass, Cyril Drocourt, and Gilles Dequen. "A New Delegated Authentication Protocol based on PRE." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010542400002998.
Full textYoon, Daegeun, Taejoong Chung, and Yongdae Kim. "Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials." In ACSAC '23: Annual Computer Security Applications Conference. ACM, 2023. http://dx.doi.org/10.1145/3627106.3627144.
Full textLiang, Jinjin, Jian Jiang, Haixin Duan, Kang Li, Tao Wan, and Jianping Wu. "When HTTPS Meets CDN: A Case of Authentication in Delegated Service." In 2014 IEEE Symposium on Security and Privacy (SP). IEEE, 2014. http://dx.doi.org/10.1109/sp.2014.12.
Full textBeltran, Victoria, and Antonio F. Skarmeta. "An overview on delegated authorization for CoAP: Authentication and authorization for Constrained Environments (ACE)." In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, 2016. http://dx.doi.org/10.1109/wf-iot.2016.7845482.
Full textWei, Ribao, and Dingfeng Ye. "Delegate predicate encryption and its application to anonymous authentication." In the 4th International Symposium. ACM Press, 2009. http://dx.doi.org/10.1145/1533057.1533107.
Full text