Academic literature on the topic 'Local Authentication Protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Local Authentication Protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Local Authentication Protocols"
Yen, C. A., S. J. Horng, H. S. Goan, T. W. Kao, and Y. H. Chou. "Quantum direct communication with mutual authenticationQuantum direct communication with mutual authenticationQuantum direct communication with mutual authentication." Quantum Information and Computation 9, no. 5&6 (2009): 376–94. http://dx.doi.org/10.26421/qic9.5-6-2.
Full textAlangot, Bithin, Pawel Szalachowski, Tien Tuan Anh Dinh, et al. "Decentralized Identity Authentication with Auditability and Privacy." Algorithms 16, no. 1 (2022): 4. http://dx.doi.org/10.3390/a16010004.
Full textAkhter, A. F. M. Suaib, Mohiuddin Ahmed, A. F. M. Shahen Shah, Adnan Anwar, and Ahmet Zengin. "A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET." Sustainability 13, no. 1 (2021): 400. http://dx.doi.org/10.3390/su13010400.
Full textBossi, Masamila. "A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOBILE BANKING." International Journal of Network Security & Its Applications (IJNSA) 5, no. 6 (2013): 31–39. https://doi.org/10.5281/zenodo.5722859.
Full textLiu, Shanpeng, Xiong Li, Fan Wu, Junguo Liao, Jin Wang, and Dingbao Lin. "A Novel Authentication Protocol with Strong Security for Roaming Service in Global Mobile Networks." Electronics 8, no. 9 (2019): 939. http://dx.doi.org/10.3390/electronics8090939.
Full textLu, Yiqin, Meng Wang, and Pengsen Huang. "An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/5838657.
Full textVeeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "Building Scalable and Secure Multicast Delivery Infrastructure in a Local Area Network." Electronics 8, no. 10 (2019): 1162. http://dx.doi.org/10.3390/electronics8101162.
Full textAl-Refai, Hasan, and Ali Ahmad Alawneh. "User Authentication and Authorization Framework in IoT Protocols." Computers 11, no. 10 (2022): 147. http://dx.doi.org/10.3390/computers11100147.
Full textManwar, Prof S. R. "Desktop as a Service Using Local Computers." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 10 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem26436.
Full textHan, Daoqi, Xiaofeng Du, and Yueming Lu. "Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access." Sensors 20, no. 8 (2020): 2231. http://dx.doi.org/10.3390/s20082231.
Full textDissertations / Theses on the topic "Local Authentication Protocols"
Ramezani, Khosrow. "Coordinated Robust Authentication In Wireless Networks." Thesis, Griffith University, 2016. http://hdl.handle.net/10072/367051.
Full textAddanki, Kanthi Sree. "Secure and Lightweight Authentication Protocols for Devices in Internet of Things." Thesis, 2016. http://ethesis.nitrkl.ac.in/8607/1/2016_MT_214CS2143_Kanthi_Sree_Addanki.pdf.
Full textChandana, Inapagurthi. "Lightweight Anonymous Authentication Protocol in Wireless Sensor Networks." Thesis, 2018. http://ethesis.nitrkl.ac.in/9725/1/2018_MT_216CS2153_IChandana_Lightweight.pdf.
Full textKUO, Yen-Hung, and 郭彥宏. "An Authentication Mechanism Based on The Layer 2 Protocol of Local Area Network." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/vyvvyg.
Full textBook chapters on the topic "Local Authentication Protocols"
Thayer, F. Javier, Vipin Swarup, and Joshua D. Guttman. "Metric Strand Spaces for Locale Authentication Protocols." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13446-3_6.
Full textChenait, Manel. "LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-69403-8_27.
Full textChenait, Manel. "Erratum to: LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-69403-8_36.
Full textKostopoulos, Giorgos, Nicolas Sklavos, and Odysseas Koufopavlou. "Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks (LANs & MANs)." In Handbook of Research on Wireless Security. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch046.
Full textPulkkis, Göran. "WLAN Security Management." In Encyclopedia of Multimedia Technology and Networking, Second Edition. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch211.
Full textConference papers on the topic "Local Authentication Protocols"
Tang, Jin, and Xiaofeng Wang. "A Multi-Factor Certificateless Authenticated Key Agreement Protocol on ECC." In 4th International Conference on Natural Language Processing and Machine Learning. Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130816.
Full textXiong, Ting, Shaojin Fu, Xiaochun Luo, and Tao Xie. "LEA-DNS: DNS Resolution Validity and Timeliness Guarantee Local Authentication Extension with Public Blockchain." In 2nd International Conference on Blockchain and Internet of Things (BIoT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110801.
Full textR Ahmed, Muhammad, Ahmed Al Shihimi, Thirein Myo, Badar Al Baroomi, and M. Shamim Kaiser. "Internet of Things Network Architecture and Security Challenges." In 12th International Conference on Digital Image Processing and Vision. Academy & Industry Research Collaboration, 2023. http://dx.doi.org/10.5121/csit.2023.131313.
Full textHaifeng Niu, S. Jagannathan, and Eyad S. Taqieddin. "A Gen2v2 compliant RFID authentication and ownership management protocol." In 2014 IEEE 39th Conference on Local Computer Networks (LCN). IEEE, 2014. http://dx.doi.org/10.1109/lcn.2014.6925788.
Full textTaqieddin, Eyad, Hiba Al-Dahoud, Moad Mowafi, and Omar Banimelhem. "An Enhanced EPC Gen2v2 RFID Authentication and Ownership Management Protocol." In 2017 IEEE 42nd Conference on Local Computer Networks (LCN). IEEE, 2017. http://dx.doi.org/10.1109/lcn.2017.126.
Full textJung-Sik Cho and Sung Kwon Kim. "Robust local privacy problem: RFID tag authentication protocol." In 2009 Digest of Technical Papers International Conference on Consumer Electronics (ICCE). IEEE, 2009. http://dx.doi.org/10.1109/icce.2009.5012322.
Full textAboudagga, Nidal, Giacomo de Meulenaer, Mohamed Eltoweissy, and Jean-Jacques Quisquater. "IMAPS: Imbricated authentication protocol suite for mobile users and groups." In 2009 IEEE 34th Conference on Local Computer Networks (LCN 2009). IEEE, 2009. http://dx.doi.org/10.1109/lcn.2009.5355156.
Full textKing, Jeff, Andre dos Santos, and Chaoting Xuan. "KHAP: Using Keyed Hard AI Problems to Secure Human Interfaces." In Workshop em Segurança de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2004. http://dx.doi.org/10.5753/sbseg.2004.21241.
Full textKamarudin, Nazhatul Hafizah, Yusnani Mohd Yussoff, Nurhaflyza Marbukhari, Mustaffa Samad, and Habibah Hashim. "Development of Unique Identity for E-Health Sensor Node in EHEART Passwordless Authentication Protocol." In 2017 IEEE 42nd Conference on Local Computer Networks (LCN). IEEE, 2017. http://dx.doi.org/10.1109/lcn.2017.37.
Full textAl Shidhani, Ali, and Victor C. M. Leung. "Local fast re-authentication protocol for 3G-WLAN interworking architecture." In 2007 Wireless Telecommunications Symposium (WTS 2007). IEEE, 2007. http://dx.doi.org/10.1109/wts.2007.4563332.
Full textReports on the topic "Local Authentication Protocols"
Zorn, G., Q. Wu, and Y. Wang. The EAP Re-authentication Protocol (ERP) Local Domain Name DHCPv6 Option. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6440.
Full textAtwood, W., S. Islam, and M. Siami. Authentication and Confidentiality in Protocol Independent Multicast Sparse Mode (PIM-SM) Link-Local Messages. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5796.
Full textHousley, R., and T. Moore. Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN). RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3770.
Full textHousley, R., and T. Moore. Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4334.
Full text