Academic literature on the topic 'LI. Authentication, and access control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'LI. Authentication, and access control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "LI. Authentication, and access control"
Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.
Full textSandhu, Ravi, and Pierangela Samarati. "Authentication, access control, and audit." ACM Computing Surveys 28, no. 1 (1996): 241–43. http://dx.doi.org/10.1145/234313.234412.
Full textLiu, Jing, Yang Xiao, and C. L. Philip Chen. "Internet of things' authentication and access control." International Journal of Security and Networks 7, no. 4 (2012): 228. http://dx.doi.org/10.1504/ijsn.2012.053461.
Full textHarn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.
Full textMa, Binhao, Xurui Zheng, Can Zhao, Yibing Wang, Dejun Wang, and Bo Meng. "A secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control based on federated blockchain." PLOS ONE 17, no. 9 (2022): e0274748. http://dx.doi.org/10.1371/journal.pone.0274748.
Full textZuva, T. "Hybridization of Bimodal Biometrics for Access Control Authentication." International Journal of Future Computer and Communication 3, no. 6 (2014): 444–51. http://dx.doi.org/10.7763/ijfcc.2014.v3.344.
Full textKakarla, Geeta, and S. Phani Kumar. "Blockchain Powered Mutual Authentication and Access Control Protocol." International Journal of Computer Networks and Applications 9, no. 1 (2022): 103. http://dx.doi.org/10.22247/ijcna/2022/211629.
Full textSUMI, Kazuhiko. "Biometrics Authentication and Application to Access Control Systems." Journal of The Institute of Electrical Engineers of Japan 129, no. 4 (2009): 237–40. http://dx.doi.org/10.1541/ieejjournal.129.237.
Full textGalka, Jakub, Mariusz Masior, and Michal Salasa. "Voice authentication embedded solution for secured access control." IEEE Transactions on Consumer Electronics 60, no. 4 (2014): 653–61. http://dx.doi.org/10.1109/tce.2014.7027339.
Full textKarger, Paul A. "Authentication and discretionary access control in computer networks." Computers & Security 5, no. 4 (1986): 314–24. http://dx.doi.org/10.1016/0167-4048(86)90052-0.
Full textDissertations / Theses on the topic "LI. Authentication, and access control"
SILVESTRE, BRUNO OLIVEIRA. "INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.
Full textJohnson, Henric. "Toward adjustable lightweight authentication for network access control /." Karlskrona : Blekinge Institute of Technology, 2005. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/30ef501d402539d3c12570f5005184f4?OpenDocument.
Full textBehrad, Shanay. "Slice specific authentication and access control for 5G." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS007.
Full textOLSSON, JOAKIM. "Method for gesture based authentication in physical access control." Thesis, KTH, Maskinkonstruktion (Inst.), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209339.
Full textBurdis, Keith Robert. "Distributed authentication for resource control." Thesis, Rhodes University, 2000. http://hdl.handle.net/10962/d1006512.
Full textSubils, Jean-Baptiste. "Authentication Via Multiple Associated Devices." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5778.
Full textMay, Brian 1975. "Scalable access control." Monash University, School of Computer Science and Software, 2001. http://arrow.monash.edu.au/hdl/1959.1/8043.
Full textYildirim, Merve. "Security and usability in password authentication." Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/71873/.
Full textShen, Ziyi. "Red Door: Firewall Based Access Control in ROS." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1752358/.
Full textCeccato, Silvia. "Security in Global Navigation Satellite Systems: authentication, integrity protection and access control." Doctoral thesis, Università degli studi di Padova, 2019. http://hdl.handle.net/11577/3425426.
Full textBooks on the topic "LI. Authentication, and access control"
Boonkrong, Sirapat. Authentication and Access Control. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6570-3.
Full textTricia, Ballad, and Banks Erin K, eds. Access control, authentication, and public key infrastructure. Jones & Bartlett Learning, 2011.
Find full textLibrary public access workstation authentication. Association of Research Libraries, Office of Leadership and Management Services, 2003.
Find full textNational Institute of Standards and Technology (U.S.) and RAND Homeland Security and Defense Center, eds. Influences on the adoption of multifactor authentication. RAND, 2011.
Find full textLibicki, Martin C. Influences on the adoption of multifactor authentication. RAND, 2011.
Find full textE, Koontz John, Devaney Judith E. 1943-, National Institute of Standards and Technology (U.S.), and United States. Dept. of Energy, eds. An authentication framework for Web access to remote hosts. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textNational Institute of Standards and Technology (U.S.). Entity authentication using public key cryptography. Information Technology Laboratory, National Institute of Standards and Technology, 1997.
Find full textBurnett, Mark. Perfect Passwords: Selection, Protection, Authentication. Syngress, 2005.
Find full textBook chapters on the topic "LI. Authentication, and access control"
Boonkrong, Sirapat. "Biometric Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_5.
Full textBoonkrong, Sirapat. "Password-Based Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_4.
Full textBoonkrong, Sirapat. "Multi-factor Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_6.
Full textBasin, David, Patrick Schaller, and Michael Schläpfer. "Authentication and Access Control." In Applied Information Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24474-2_4.
Full textBoonkrong, Sirapat. "Introduction to Cryptography." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_1.
Full textBoonkrong, Sirapat. "Public Key Infrastructure." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_2.
Full textBoonkrong, Sirapat. "Methods and Threats of Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_3.
Full textBoonkrong, Sirapat. "Authentication and Key Establishment Protocols." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_7.
Full textBoonkrong, Sirapat. "Current and Future Trends." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_8.
Full textKirkpatrick, Michael, and Elisa Bertino. "Context-Dependent Authentication and Access Control." In iNetSec 2009 – Open Research Problems in Network Security. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05437-2_6.
Full textConference papers on the topic "LI. Authentication, and access control"
Nabeel, Mohamed. "Session details: Access Control and Authentication." In CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy. ACM, 2018. http://dx.doi.org/10.1145/3258528.
Full textQi, Lin, and Li Zhi. "Authentication and Access Control in Satellite Network." In 2010 Third International Symposiums on Electronic Commerce and Security (ISECS). IEEE, 2010. http://dx.doi.org/10.1109/isecs.2010.12.
Full textCvrček, Tadeáš, and Petr Dzurenda. "Access Control System Using Multi-factor Authentication." In STUDENT EEICT 2022. Fakulta elektrotechniky a komunikacnich technologii VUT v Brne, 2022. http://dx.doi.org/10.13164/eeict.2022.190.
Full textFu, Zhi, and John C. Strassner. "Access Control and Authentication for Converged Wireless Networks." In 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services. IEEE, 2006. http://dx.doi.org/10.1109/mobiq.2006.340423.
Full textFu, Zhi, and John C. Strassner. "Access Control and Authentication for Converged Wireless Networks." In 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems. IEEE, 2006. http://dx.doi.org/10.1109/mobiqw.2006.361755.
Full textNick, William, Joseph Shelton, Cory Sabol, and Albert Esterline. "Federated protocol for biometric authentication and access control." In 2017 Computing Conference. IEEE, 2017. http://dx.doi.org/10.1109/sai.2017.8252195.
Full textde Oliveira, Adriana Esmeraldo, Gustavo Henrique Matos Bezerra Motta, and Leonardo Vidal Batista. "A multibiometric access control architecture for continuous authentication." In 2010 IEEE International Conference on Intelligence and Security Informatics. IEEE, 2010. http://dx.doi.org/10.1109/isi.2010.5484746.
Full textBao, Lichun. "Location Authentication Methods for Wireless Network Access Control." In 2008 IEEE International Performance Computing and Communications Conference (IPCCC). IEEE, 2008. http://dx.doi.org/10.1109/pccc.2008.4745118.
Full textXu, Cheng, Jianliang Xu, Haibo Hu, and Man Ho Au. "When Query Authentication Meets Fine-Grained Access Control." In SIGMOD/PODS '18: International Conference on Management of Data. ACM, 2018. http://dx.doi.org/10.1145/3183713.3183741.
Full text"CERTIFICATE-BASED ACCESS CONTROL AND AUTHENTICATION FOR DHCP." In 1st International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001396100990106.
Full textReports on the topic "LI. Authentication, and access control"
Narayan, K., and D. Nelson. Using Authentication, Authorization, and Accounting Services to Dynamically Provision View-Based Access Control Model User-to-Group Mappings. Edited by R. Presuhn. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6065.
Full text