Journal articles on the topic 'Local Authentication Protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Local Authentication Protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yen, C. A., S. J. Horng, H. S. Goan, T. W. Kao, and Y. H. Chou. "Quantum direct communication with mutual authenticationQuantum direct communication with mutual authenticationQuantum direct communication with mutual authentication." Quantum Information and Computation 9, no. 5&6 (2009): 376–94. http://dx.doi.org/10.26421/qic9.5-6-2.
Full textAlangot, Bithin, Pawel Szalachowski, Tien Tuan Anh Dinh, et al. "Decentralized Identity Authentication with Auditability and Privacy." Algorithms 16, no. 1 (2022): 4. http://dx.doi.org/10.3390/a16010004.
Full textAkhter, A. F. M. Suaib, Mohiuddin Ahmed, A. F. M. Shahen Shah, Adnan Anwar, and Ahmet Zengin. "A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET." Sustainability 13, no. 1 (2021): 400. http://dx.doi.org/10.3390/su13010400.
Full textBossi, Masamila. "A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOBILE BANKING." International Journal of Network Security & Its Applications (IJNSA) 5, no. 6 (2013): 31–39. https://doi.org/10.5281/zenodo.5722859.
Full textLiu, Shanpeng, Xiong Li, Fan Wu, Junguo Liao, Jin Wang, and Dingbao Lin. "A Novel Authentication Protocol with Strong Security for Roaming Service in Global Mobile Networks." Electronics 8, no. 9 (2019): 939. http://dx.doi.org/10.3390/electronics8090939.
Full textLu, Yiqin, Meng Wang, and Pengsen Huang. "An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/5838657.
Full textVeeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "Building Scalable and Secure Multicast Delivery Infrastructure in a Local Area Network." Electronics 8, no. 10 (2019): 1162. http://dx.doi.org/10.3390/electronics8101162.
Full textAl-Refai, Hasan, and Ali Ahmad Alawneh. "User Authentication and Authorization Framework in IoT Protocols." Computers 11, no. 10 (2022): 147. http://dx.doi.org/10.3390/computers11100147.
Full textManwar, Prof S. R. "Desktop as a Service Using Local Computers." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 10 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem26436.
Full textHan, Daoqi, Xiaofeng Du, and Yueming Lu. "Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access." Sensors 20, no. 8 (2020): 2231. http://dx.doi.org/10.3390/s20082231.
Full textVenčkauskas, Algimantas, Marius Taparauskas, Šarūnas Grigaliūnas, and Rasa Brūzgienė. "Enhancing Communication Security an In-Vehicle Wireless Sensor Network." Electronics 13, no. 6 (2024): 1003. http://dx.doi.org/10.3390/electronics13061003.
Full textLiu, Zhenpeng, Shuo Wang, Sichen Duan, Lele Ren, and Jianhang Wei. "Dynamic Data Integrity Auditing Based on Hierarchical Merkle Hash Tree in Cloud Storage." Electronics 12, no. 3 (2023): 717. http://dx.doi.org/10.3390/electronics12030717.
Full textDevi, Suman, and Avadhesh Kumar. "An artificial intelligence based authentication mechanism for wireless sensor networks using blockchain." Journal of Information and Optimization Sciences 45, no. 2 (2024): 581–94. http://dx.doi.org/10.47974/jios-1596.
Full textJeong, Yeonseon, Hyunghoon Kim, and Hyo Jin Jo. "ASD: ARP Spoofing Detector Using OpenWrt." Security and Communication Networks 2022 (March 29, 2022): 1–9. http://dx.doi.org/10.1155/2022/2196998.
Full textAl-Shareeda, Mahmood A., Ahmed Nader Jafer, Mohammed Tahseen Hashem, and Murtaza Salman Fajr. "Secure Offline Smart Office Automation System Using ESP32 and Bluetooth Control Architecture." Journal of Cyber Security and Risk Auditing 2024, no. 1 (2024): 3–13. https://doi.org/10.63180/jcsra.thestap.2024.1.2.
Full textChauhan, Ritu, and Gatha Tanwar. "A Machine Learning-Based Exploration of Relationship Between Security Vulnerabilities of IoT Devices and Manufacturers." International Journal of Data Analytics 1, no. 2 (2020): 1–12. http://dx.doi.org/10.4018/ijda.2020070101.
Full textAliwa, Emad, Omer Rana, Charith Perera, and Peter Burnap. "Cyberattacks and Countermeasures for In-Vehicle Networks." ACM Computing Surveys 54, no. 1 (2021): 1–37. http://dx.doi.org/10.1145/3431233.
Full textResearcher. "CYBERSECURITY IN AUTOMOTIVE NETWORKS: MITIGATING THREATS IN CAN, LIN AND AUTOMOTIVE ETHERNET SYSTEMS." International Journal of Computer Science and Engineering Research and Development (IJCSERD) 13, no. 2 (2025): 77–102. https://doi.org/10.5281/zenodo.14892661.
Full textFaraj, Sufyan T., and Firas R. Barjas. "DESIGN AND IMPLEMENTATION OF A TRANSPARENT SECURE LAN." Journal of Engineering 12, no. 04 (2006): 1063–76. http://dx.doi.org/10.31026/j.eng.2006.04.13.
Full textSong, Yubo, Bing Chen, Tianqi Wu, Tianyu Zheng, Hongyuan Chen, and Junbo Wang. "Enhancing Packet-Level Wi-Fi Device Authentication Protocol Leveraging Channel State Information." Wireless Communications and Mobile Computing 2021 (November 17, 2021): 1–12. http://dx.doi.org/10.1155/2021/2993019.
Full textLeung, D. W. "Quantum vernam cipher." Quantum Information and Computation 2, no. 1 (2002): 14–34. http://dx.doi.org/10.26421/qic2.1-2.
Full textDegefa, Fikadu, Jihyeon Ryu, Hyoungshick Kim, and Dongho Won. "MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks*^." PLOS ONE 17, no. 5 (2022): e0262696. http://dx.doi.org/10.1371/journal.pone.0262696.
Full textLi, Hui, Xuesong Pan, Xinluo Wang, Haonan Feng, and Chengjie Shi. "Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices." Wireless Communications and Mobile Computing 2020 (September 1, 2020): 1–14. http://dx.doi.org/10.1155/2020/8819790.
Full textDidik Aribowo, Jahra Damayanti, Muhamad Sadewa, Syafa Raihanun Nabila, and Sarnata. "Risiko Keamanan dan Kerentanan Jaringan Transmisi Listrik Terhadap Serangan Siber pada Infrastruktur Energi Terdistribusi." Jurnal Surya Teknika 11, no. 2 (2024): 710–16. https://doi.org/10.37859/jst.v11i2.8311.
Full textElMamy, Sidi Boubacar, Hichem Mrabet, Hassen Gharbi, Abderrazak Jemai, and Damien Trentesaux. "A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0." Sustainability 12, no. 21 (2020): 9179. http://dx.doi.org/10.3390/su12219179.
Full textB A , NITHYA, S. Kavya Sree , and B. Jashwanth Reddy. "Securing and Enhancing Productivity of BYOD In Classrooms at Schools." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40574.
Full textNath Mishra, Kamta. "A Proficient Mechanism for Cloud Security Supervision in Distributive Computing Environment." International Journal of Computer Network and Information Security 12, no. 6 (2020): 57–77. http://dx.doi.org/10.5815/ijcnis.2020.06.05.
Full textPuli, Srilakshmi, and Smitha Chowdary Chaparala. "An Efficient Swift Routing Model with Node Trust Identity Factor (SRM-NTIF) to Perform Secure Data Transmission Among IoT Gadgets." Revue d'Intelligence Artificielle 36, no. 1 (2022): 31–39. http://dx.doi.org/10.18280/ria.360104.
Full textShrinivasa, Shrinivasa, Chandrakala Beturpalya Muddaraju, and Annapurna Prashanth Patil. "Advancing integrity and privacy in cloud storage: challenges, current solutions, and future directions." IAES International Journal of Artificial Intelligence (IJ-AI) 14, no. 1 (2025): 12. http://dx.doi.org/10.11591/ijai.v14.i1.pp12-18.
Full textShrinivasa, Shrinivasa, Beturpalya Muddaraju Chandrakala, and Prashanth Patil Annapurna. "Advancing integrity and privacy in cloud storage: challenges, current solutions, and future directions." IAES International Journal of Artificial Intelligence (IJ-AI) 14, no. 1 (2025): 12–18. https://doi.org/10.11591/ijai.v14.i1.pp12-18.
Full textAlmakhi, Riyan, Ade Surya Budiman, and Rachmawati Darma Astuti. "Implementasi Protokol Keamanan Dan Segmentasi Jaringan Dalam Project Pembangunan WLAN Untuk PT Pan Pacific Insurance." Jurnal Sistem dan Teknologi Informasi (JustIN) 11, no. 1 (2023): 140. http://dx.doi.org/10.26418/justin.v11i1.53745.
Full textShakhnov, S. F., and S. V. Rudih. "THE CONCEPT OF BUILDING A TELECOMMUNICATIONS SUBSYSTEM OF A REMOTELY PILOTED SEA TUG." Quality. Innovation. Education, no. 6 (2022): 60–68. http://dx.doi.org/10.31145/1999-513x-2022-6-60-68.
Full textBrahma, Sudem, Banjai Mochahary, Mrinal Kalita, and Arvind Kumar Goyal. "Pharmacognostic and physicochemical characterisation of potential plants for antidiabetic herbal formulations." Plant Science Today 9, sp2 (2022): 1–7. http://dx.doi.org/10.14719/pst.1704.
Full textObermayer, Benedikt, Manuel Holtgrewe, Mikko Nieminen, Clemens Messerschmidt, and Dieter Beule. "SCelVis: exploratory single cell data analysis on the desktop and in the cloud." PeerJ 8 (February 19, 2020): e8607. http://dx.doi.org/10.7717/peerj.8607.
Full textBudi P, Ignasius Irawan. "Wireless access point protection from un-authorized user in an office environment." ACMIT Proceedings 1, no. 1 (2019): 90–98. http://dx.doi.org/10.33555/acmit.v1i1.11.
Full textOsinachi Deborah Segun-Falade, Olajide Soji Osundare, Wagobera Edgar Kedi, Patrick Azuka Okeleke, Tochukwu Ignatius Ijomah, and Oluwatosin Yetunde Abdul-Azeez. "Evaluating the role of cloud integration in mobile and desktop operating systems." International Journal of Scholarly Research in Engineering and Technology 4, no. 1 (2024): 019–31. http://dx.doi.org/10.56781/ijsret.2024.4.1.0019.
Full textKravets, Petro, Volodymyr Pasichnyk, and Mykola Prodaniuk. "Game Self-organization of Hamiltonian Cycle of the Graph." Vìsnik Nacìonalʹnogo unìversitetu "Lʹvìvsʹka polìtehnìka". Serìâ Ìnformacìjnì sistemi ta merežì 10 (December 2021): 13–32. http://dx.doi.org/10.23939/sisn2021.10.013.
Full textWang, Shibin, and Nianmin Yao. "LIAP: A local identity-based anonymous message authentication protocol in VANETs." Computer Communications 112 (November 2017): 154–64. http://dx.doi.org/10.1016/j.comcom.2017.09.005.
Full textTseng, Yuh-Min. "USIM-based EAP-TLS authentication protocol for wireless local area networks." Computer Standards & Interfaces 31, no. 1 (2009): 128–36. http://dx.doi.org/10.1016/j.csi.2007.11.014.
Full textTsai, Hao-Chuan, Chin-Chen Chang, and Kai-Jie Chang. "Roaming across wireless local area networks using SIM-based authentication protocol." Computer Standards & Interfaces 31, no. 2 (2009): 381–89. http://dx.doi.org/10.1016/j.csi.2008.05.002.
Full textKevin, Kusnardi, and Gunawan Dennis. "Guillou-quisquater protocol for user authentication based on zero knowledge proof." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 2 (2019): 826–34. https://doi.org/10.12928/TELKOMNIKA.v17i2.11754.
Full textFadrial, Rudy, Sujianto Sujianto, Harapan Tua Ricky Freddy Simanjuntak, Welly Wirman, and Wahyu Setiawan Wibowo. "Fostering Trust Through Bytes: Unravelling the Impact of E-Government on Public Trust in Indonesian Local Government." Interdisciplinary Journal of Information, Knowledge, and Management 19 (2024): 015. http://dx.doi.org/10.28945/5317.
Full textGuo, Gong-De, Li-Qin Zheng, Kai Yu, and Song Lin. "Authenticated Multi-Party Quantum Private Set Intersection with Single Particles." Mathematics 13, no. 12 (2025): 2019. https://doi.org/10.3390/math13122019.
Full textBuccafurri, Francesco, Vincenzo De Angelis, and Roberto Nardone. "Securing MQTT by Blockchain-Based OTP Authentication." Sensors 20, no. 7 (2020): 2002. http://dx.doi.org/10.3390/s20072002.
Full textJ., Jeya Praise, and Sam Silva A. "BI-LEVEL AUTHENTICATION FOR EFFECTIVE DATA SHARING IN CLOUD VIA PRIVACY-PRESERVING AUTHENTICATION PROTOCOL." International Journal of Advanced Trends in Engineering and Technology 2, no. 1 (2017): 23–30. https://doi.org/10.5281/zenodo.439232.
Full textWang, Xin Gong. "Research on the 802.1x Authentication Mechanism and Existing Defects." Applied Mechanics and Materials 192 (July 2012): 385–89. http://dx.doi.org/10.4028/www.scientific.net/amm.192.385.
Full textMasamila, Bossi. "A Need for Peer-To-Peer Strong Local Authentication Protocol (P2PSLAP) in Mobile Banking." International Journal of Network Security & Its Applications 5, no. 6 (2013): 31–39. http://dx.doi.org/10.5121/ijnsa.2013.5603.
Full textNanvakenari, Milad, and Monireh Houshmand. "An efficient controlled quantum secure direct communication and authentication by using four particle cluster states." International Journal of Quantum Information 15, no. 01 (2017): 1750002. http://dx.doi.org/10.1142/s0219749917500022.
Full textYavari, Mostafa, Masoumeh Safkhani, Saru Kumari, Sachin Kumar, and Chien-Ming Chen. "An Improved Blockchain-Based Authentication Protocol for IoT Network Management." Security and Communication Networks 2020 (October 26, 2020): 1–16. http://dx.doi.org/10.1155/2020/8836214.
Full textFeng, Tao, and Hong-Ru Bei. "Evaluation and Improvement of Internet Printing Protocol Based on HCPN Model Detection Method." Applied Sciences 13, no. 6 (2023): 3467. http://dx.doi.org/10.3390/app13063467.
Full text