Journal articles on the topic 'Delegated authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 42 journal articles for your research on the topic 'Delegated authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Khan, Mohsin, Philip Ginzboorg, and Valtteri Niemi. "AKMA: Delegated Authentication System of 5G." IEEE Communications Standards Magazine 5, no. 3 (2021): 56–61. http://dx.doi.org/10.1109/mcomstd.101.2100015.
Full textLoiselle, Mirka. "Multiple Authority Delegation in Art Authentication." Scientonomy: Journal for the Science of Science 1 (May 19, 2017): 41–53. http://dx.doi.org/10.33137/js.v1i0.28233.
Full textLin, Qun, Jianzhong Li, and Xuechang Ren. "A provably secure delegated authentication scheme and its applications." International Journal of Embedded Systems 11, no. 2 (2019): 139. http://dx.doi.org/10.1504/ijes.2019.098292.
Full textLin, Qun, Jianzhong Li, and Xuechang Ren. "A provably secure delegated authentication scheme and its applications." International Journal of Embedded Systems 11, no. 2 (2019): 139. http://dx.doi.org/10.1504/ijes.2019.10019710.
Full textChien, Hung-Yu, and Tzu-Hang Hsu. "Secure fast WLAN handoff using time-bound delegated authentication." International Journal of Communication Systems 22, no. 5 (2009): 565–84. http://dx.doi.org/10.1002/dac.983.
Full textZhang, Lei, Lifei Wei, Dongmei Huang, Kai Zhang, Mianxiong Dong, and Kaoru Ota. "MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing." Security and Communication Networks 9, no. 16 (2016): 3777–89. http://dx.doi.org/10.1002/sec.1490.
Full textLee, JoonYoung, MyeongHyun Kim, JiHyeon Oh, YoungHo Park, KiSung Park, and Sungkee Noh. "A Secure Key Aggregate Searchable Encryption with Multi Delegation in Cloud Data Sharing Service." Applied Sciences 11, no. 19 (2021): 8841. http://dx.doi.org/10.3390/app11198841.
Full textDumitru, Ionuț Cătălin, and Mihai Togan. "Client Module with Multifactor Authentication for Remote Electronic Signature Generation Using Cryptography API: Next Generation." Journal of Military Technology 3, no. 1 (2020): 5–10. http://dx.doi.org/10.32754/jmt.2020.1.01.
Full textPark, Jun-Cheol. "Delegated Provision of Personal Information and Storage of Provided Information on a Blockchain Ensuring Data Confidentiality." Korean Institute of Smart Media 11, no. 10 (2022): 76–88. http://dx.doi.org/10.30693/smj.2022.11.10.76.
Full textPavlov, Andrey S., Nikolay Yu Svistunov, Vyacheslav I. Petrenko, Fariza B. Tebueva, Vladimir V. Kopytov, and Evgeniy N. Tishchenko. "PROTOCOL FOR THE DELEGATED AUTHENTICATION OF NEW AGENTS WHEN THE NUMBER OF AGENTS IS SCALING IN SWARMING ROBOT SYSTEMS." Вестник ВГУ Серия Системный анализ и информационные технологии, no. 4 (2022): 23–38. http://dx.doi.org/10.17308/sait/1995-5499/2022/4/23-38.
Full textDíaz-Sánchez, Daniel, Andrés Marín-Lopez, Florina Almenárez Mendoza, and Patricia Arias Cabarcos. "DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †." Sensors 19, no. 15 (2019): 3292. http://dx.doi.org/10.3390/s19153292.
Full textRoss, Hana, Michael Eads, and Michael Yates. "Why governments cannot afford Codentify to support their track and trace solutions." Tobacco Control 27, no. 6 (2018): 706–8. http://dx.doi.org/10.1136/tobaccocontrol-2017-053970.
Full textSaraswathy, K. S., and S. S. Sujatha. "Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search." International journal of electrical and computer engineering systems 13, no. 7 (2022): 569–75. http://dx.doi.org/10.32985/ijeces.13.7.9.
Full textChen, Jiakai, Yishi Zhao, and Xiao Chen. "OSCMS: A Decentralized Open-Source Coordination Management System Using a Novel Triple-Blockchain Architecture." Applied Sciences 13, no. 11 (2023): 6580. http://dx.doi.org/10.3390/app13116580.
Full textFerry, Eugene, John O Raw, and Kevin Curran. "Security evaluation of the OAuth 2.0 framework." Information & Computer Security 23, no. 1 (2015): 73–101. http://dx.doi.org/10.1108/ics-12-2013-0089.
Full textNechaeva, M. L., and D. A. Kiotova. "Key vectors for improving the activity of regional bodies of the Federal Treasury given the integrated management of public finance." Finance and Credit 26, no. 10 (2020): 2364–84. http://dx.doi.org/10.24891/fc.26.10.2364.
Full textHong, Jun, Tao Wen, and Quan Guo. "Query Authentication of Outsourced Spatial Database." International Arab Journal of Information Technology 17, no. 4 (2020): 539–47. http://dx.doi.org/10.34028/iajit/17/4/12.
Full textShiuh-Pyng Shieh, Chern-Tang Lin, Wei-Bon Yang, and Hung-Min Sun. "Digital multisignature schemes for authenticating delegates in mobile code systems." IEEE Transactions on Vehicular Technology 49, no. 4 (2000): 1464–73. http://dx.doi.org/10.1109/25.875284.
Full textHung-Yu Chien, Jinn-Ke Jan, and Yuh-Min Tseng. "Forgery attacks on "multisignature schemes for authenticating mobile code delegates"." IEEE Transactions on Vehicular Technology 51, no. 6 (2002): 1669–71. http://dx.doi.org/10.1109/tvt.2002.804857.
Full textTzong-Chen Wu and Chien-Lung Hsu. "Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems." IEEE Transactions on Vehicular Technology 52, no. 2 (2003): 462–65. http://dx.doi.org/10.1109/tvt.2003.808786.
Full textSchmitz, Guido. "Privacy-preserving Web single sign-on: Formal security analysis and design." it - Information Technology 64, no. 1-2 (2022): 43–48. http://dx.doi.org/10.1515/itit-2022-0003.
Full textHamed, Naba, and Ali Yassin. "A Privacy-Preserving Scheme for Managing Secure Data in Healthcare System." Iraqi Journal for Electrical and Electronic Engineering 19, no. 2 (2023): 70–82. http://dx.doi.org/10.37917/ijeee.19.2.9.
Full textLee, JongHyup, and Taekyoung Kwon. "Distributed Watchdogs Based on Blockchain for Securing Industrial Internet of Things." Sensors 21, no. 13 (2021): 4393. http://dx.doi.org/10.3390/s21134393.
Full textTeuku, Ryan Firdaus. "Design of a web-based application for managing evidence data at the East Aceh District Prosecutor's Office." International Journal Of Computer Sciences and Mathematics Engineering 2, no. 2 (2023): 160–67. http://dx.doi.org/10.61306/ijecom.v2i2.38.
Full textXun Yi and Chee Kheong Siew. "Attacks on Shieh--Lin--Yang--Sun digital multisignature schemes for authenticating delegates in mobile code systems." IEEE Transactions on Vehicular Technology 51, no. 6 (2002): 1313–15. http://dx.doi.org/10.1109/tvt.2002.802982.
Full textSiddiqui, Maha. "Blockchain-Based Secure and Efficient Secret Image Sharing with Outsourcing Computation in Wireless Networks." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (2024): 1267–75. http://dx.doi.org/10.22214/ijraset.2024.59034.
Full textKumar, Anand, Dharmesh Dhabliya, Pankaj Agarwal, et al. "Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques." Computational Intelligence and Neuroscience 2022 (September 29, 2022): 1–13. http://dx.doi.org/10.1155/2022/8803586.
Full textBockelman, Brian, Andrew Hanushevsky, Oliver Keeble, et al. "Bootstrapping a New LHC Data Transfer Ecosystem." EPJ Web of Conferences 214 (2019): 04045. http://dx.doi.org/10.1051/epjconf/201921404045.
Full textNurzi, Farhan Ahmad, and Kasmawahida Ab Wahab. "Web-Based Student Task Management System." Engineering, Agriculture, Science and Technology Journal (EAST-J) 1, no. 1 (2022): 50–56. http://dx.doi.org/10.37698/eastj.v1i1.119.
Full textMishra*, Arjit, Surendra Gupta, and Swarnim Soni. "Designing Information System for Private Network using RBAC, FGAC and Micro service Architecture." International Journal of Engineering and Advanced Technology 10, no. 4 (2021): 195–200. http://dx.doi.org/10.35940/ijeat.d2474.0410421.
Full textChaudhari, Shilpa, R. Aparna, and Archana Rane. "A Survey on Proxy Re-Signature Schemes for Translating One Type of Signature to Another." Cybernetics and Information Technologies 21, no. 3 (2021): 24–49. http://dx.doi.org/10.2478/cait-2021-0028.
Full textMarwan, Mbarek, Ali Kartit, and Hassan Ouahmane. "A Framework to Secure Medical Image Storage in Cloud Computing Environment." Journal of Electronic Commerce in Organizations 16, no. 1 (2018): 1–16. http://dx.doi.org/10.4018/jeco.2018010101.
Full textLin, Cheng-Jun, Rui Xue, Shao-Jun Yang, Xinyi Huang, and Shimin Li. "Linearly Homomorphic Signatures from Lattices." Computer Journal 63, no. 12 (2020): 1871–85. http://dx.doi.org/10.1093/comjnl/bxaa034.
Full textMir, Omid, Daniel Slamanig, Balthazar Bauer, and René Mayrhofer. "Practical Delegatable Anonymous Credentials From Equivalence Class Signatures." Proceedings on Privacy Enhancing Technologies 2023, no. 3 (2023): 488–513. http://dx.doi.org/10.56553/popets-2023-0093.
Full textHieu, Phan Duong, and Moti Yung. "PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES." Journal of Computer Science and Cybernetics 37, no. 4 (2021): 429–51. http://dx.doi.org/10.15625/1813-9663/37/4/16104.
Full textMuslim, Shohib, Sri Hudiarini, Sholahuddin Al-Fatih, Khrisna Hadiwinata, and Nandaru Ramadhan. "Harmonization of Online Mortgage Regulations as a Form of Legal Certainty." Journal of Law and Sustainable Development 11, no. 12 (2023): e856. http://dx.doi.org/10.55908/sdgs.v11i12.856.
Full textDu, Jianming, Guofang Dong, Juangui Ning, Zhengnan Xu, and Ruicheng Yang. "Identity-based controlled delegated outsourcing data integrity auditing scheme." Scientific Reports 14, no. 1 (2024). http://dx.doi.org/10.1038/s41598-024-58325-y.
Full textHommel, Wolfgang, Michael Grabatin, Stefan Metzger, and Daniela Pöhn. "Level of Assurance Management Automation for Dynamic Identity Federations based on Vectors of Trust." PIK - Praxis der Informationsverarbeitung und Kommunikation 39, no. 3-4 (2016). http://dx.doi.org/10.1515/pik-2016-0003.
Full textHyam, Roger, Alan Elliott, and William Ulate. "Rhakhis: A workflow for managing the WFO taxonomic backbone." Biodiversity Information Science and Standards 6 (August 23, 2022). http://dx.doi.org/10.3897/biss.6.91432.
Full textNassar Kyriakidou, Chalima Dimitra, Athanasia Maria Papathanasiou, and George C. Polyzos. "Decentralized Identity With Applications to Security and Privacy for the Internet of Things." Computer Networks and Communications, August 28, 2023. http://dx.doi.org/10.37256/cnc.1220233048.
Full text"Data Protection in IoT using CoAP based on Enhanced DTLS." International Journal of Advanced Trends in Computer Science and Engineering 12, no. 4 (2023): 162–71. http://dx.doi.org/10.30534/ijatcse/2023/041242023.
Full textN, Deepika, Durga P, Gayathri N, and Murugesan M. "Proficient Justification of Data Accuracy for Cloud Storage Using Dual Protection." International Journal of Scientific Research in Science and Technology, March 22, 2019, 287–99. http://dx.doi.org/10.32628/ijsrst196250.
Full text