Journal articles on the topic 'Login'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Login.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Salmasian, Hojjat, David Rubins, and David W. Bates. "Using the Electronic Health Record User Context in Clinical Decision Support Criteria." Applied Clinical Informatics 13, no. 04 (August 2022): 910–15. http://dx.doi.org/10.1055/s-0042-1756426.
Full textSchmeller, Rebecca. "In Strategy Simulations, Data Analysis Matters Most (More Than Number of Log Ins and More Than Time Spent Logged In)." Simulation & Gaming 50, no. 1 (January 9, 2019): 62–75. http://dx.doi.org/10.1177/1046878118821402.
Full textAït-Kaci, Hassan, and Roger Nasr. "Login: a logic programming language with built-in inheritance." Journal of Logic Programming 3, no. 3 (October 1986): 185–215. http://dx.doi.org/10.1016/0743-1066(86)90013-0.
Full textMalone, S. "Logout and Login." Seismological Research Letters 73, no. 4 (July 1, 2002): 518–19. http://dx.doi.org/10.1785/gssrl.73.4.518.
Full textIngle, Darshan, Varsha Patil, and Sanjay Talbat. "Password-Free Login." International Journal of Computer Applications 87, no. 17 (February 14, 2014): 26–30. http://dx.doi.org/10.5120/15301-4035.
Full textJackson, Corey Brian, Kevin Crowston, and Carsten Østerlund. "Did they login?" Proceedings of the ACM on Human-Computer Interaction 2, CSCW (November 2018): 1–16. http://dx.doi.org/10.1145/3274346.
Full textRaajan, N. R., G. Shiva, P. V. M. Vijayabhas, P. Mithun, and J. Peter Raj. "Secured Login System." Research Journal of Information Technology 5, no. 3 (March 1, 2013): 462–67. http://dx.doi.org/10.3923/rjit.2013.462.467.
Full textUtami, Hamdan Dian Jaya Rozi Hyang, Riza Arifudin, and Alamsyah Alamsyah. "Security Login System on Mobile Application with Implementation of Advanced Encryption Standard (AES) using 3 Keys Variation 128-bit, 192-bit, and 256-bit." Scientific Journal of Informatics 6, no. 1 (May 24, 2019): 34–44. http://dx.doi.org/10.15294/sji.v6i1.17589.
Full textZhang, Wenzhe, Chuyang Zeng, Yang Cao, Zuming Qin, and Haiguang Chen. "An abnormal user login behavior detection method of industrial control system based on multi-dimensional probability analysis." Journal of Physics: Conference Series 2246, no. 1 (April 1, 2022): 012082. http://dx.doi.org/10.1088/1742-6596/2246/1/012082.
Full textAini, Qurotul, Untung Rahardja, and Romzi Syauqi Naufal. "Penerapan Single Sign On dengan Google pada Website berbasis YII Framework." SISFOTENIKA 8, no. 1 (January 10, 2018): 57. http://dx.doi.org/10.30700/jst.v8i1.161.
Full textGafni, Ruti, and Dudu Nissim. "To Social Login or not Login? Exploring Factors Affecting the Decision." Issues in Informing Science and Information Technology 11 (2014): 057–72. http://dx.doi.org/10.28945/1980.
Full textSyahir, Ahmad, and Chuah Chai Wen. "Secure Login Mechanism for Online Banking." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (June 6, 2018): 179. http://dx.doi.org/10.30630/joiv.2.3-2.136.
Full textBagul, Yogita. "Secured Login with Networking." International Journal for Research in Applied Science and Engineering Technology 6, no. 3 (March 31, 2018): 3313–15. http://dx.doi.org/10.22214/ijraset.2018.3703.
Full textNugraha, Muhammad Adi, Desi Arisandi, and Novario Jaya Perdana. "PENGAMANAN WEBSITE E-COMMERCE MENGGUNAKAN MULTI-FACTOR AUTHENTICATION." Jurnal Ilmu Komputer dan Sistem Informasi 9, no. 1 (January 18, 2021): 158. http://dx.doi.org/10.24912/jiksi.v9i1.11588.
Full textSarumi, Jerry Abayomi. "Network Security Based On Two-Factor Authentication System." Advances in Multidisciplinary and scientific Research Journal Publication 9, no. 2 (June 30, 2021): 1–14. http://dx.doi.org/10.22624/aims/maths/v9n2p1.
Full textZHENG, DONGXI, SHAOHUA TANG, and SHAOFA LI. "WEB SERVICES SINGLE SIGN-ON PROTOCOL AND FORMAL ANALYSIS ON IT." Journal of Circuits, Systems and Computers 14, no. 05 (October 2005): 923–30. http://dx.doi.org/10.1142/s0218126605002714.
Full textRiadi, Imam, Herman, and Aulyah Zakilah Ifani. "Optimasi Keamanan Web Server terhadap Serangan Broken Authentication Menggunakan Teknologi Blockchain." JISKA (Jurnal Informatika Sunan Kalijaga) 6, no. 3 (September 22, 2021): 139–48. http://dx.doi.org/10.14421/jiska.2021.6.3.139-148.
Full textPlavsic, Vera, and Emil Secerov. "Modeling of login procedure for wireless application with interaction overview diagrams." Computer Science and Information Systems 5, no. 1 (2008): 87–108. http://dx.doi.org/10.2298/csis0801087p.
Full textListartha, I. Made Edy. "AUTOMASI WEBSITE BROWSER UNTUK MELAKUKAN AUTOLOGIN KE DALAM CAPTIVE PORTAL." Jurnal Ilmiah Informatika Komputer 25, no. 2 (2020): 98–106. http://dx.doi.org/10.35760/ik.2020.v25i2.2766.
Full textLi, Hai Jun. "The Page Flow Implements Business Logic in Web Applications." Applied Mechanics and Materials 347-350 (August 2013): 2536–40. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2536.
Full textHerzberg, Amir, and Ronen Margulies. "Forcing Johnny to login safely." Journal of Computer Security 21, no. 3 (July 12, 2013): 393–424. http://dx.doi.org/10.3233/jcs-130467.
Full textPerković, Toni, Mario Čagalj, and Nikola Rakić. "SSSL: Shoulder Surfing Safe Login." Journal of Communications Software and Systems 6, no. 2 (June 22, 2010): 65. http://dx.doi.org/10.24138/jcomss.v6i2.191.
Full textHilmi, Futuh, Rumani Mangkudjaja, and Budhi Irawan. "Analisis Performansi Autentikasi Single Sign On pada Web Menggunakan LDAP." Jurnal SIFO Mikroskil 13, no. 2 (October 20, 2012): 93–102. http://dx.doi.org/10.55601/jsm.v13i2.74.
Full textJia, Li. "Unified Login Authentication Method Based on Cloud Computing." Advanced Materials Research 926-930 (May 2014): 2245–48. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2245.
Full textYang, Yu Jing. "The Design of Unified Identity Authentication and Single Point Login System." Applied Mechanics and Materials 155-156 (February 2012): 391–95. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.391.
Full textWinata, Yuki Indragiri, Hermawaty Hermawaty, and Muh Mujib. "Data Format and Interface Design in Digital Identity Applications Using WSO2." CCIT Journal 15, no. 1 (February 7, 2022): 17–25. http://dx.doi.org/10.33050/ccit.v15i1.1365.
Full textVanitha, K. "Secured Login Authentication on Key Attackers." International Journal for Research in Applied Science and Engineering Technology V, no. IV (April 30, 2017): 1381–83. http://dx.doi.org/10.22214/ijraset.2017.4247.
Full textDutta, Shreya, Shalu Singh, and Pratiksha Ghodke. "Secure Login System Using QR-Image." International Journal of Computer Applications Technology and Research 8, no. 1 (January 1, 2019): 1–3. http://dx.doi.org/10.7753/ijcatr0801.1001.
Full text., Bhavana M. Bahikar. "ADAPTING SINGLET LOGIN IN DISTRIBUTED SYSTEMS." International Journal of Research in Engineering and Technology 03, no. 02 (February 25, 2014): 523–27. http://dx.doi.org/10.15623/ijret.2014.0302091.
Full textLim, Jung-Gun, Chang-Suk Choi, Tae-Eun Park, Hyo-Sun Ki, and Beongku An. "Android Based Mobile Combination Login Application." Journal of the Institute of Webcasting, Internet and Telecommunication 13, no. 3 (June 30, 2013): 151–56. http://dx.doi.org/10.7236/jiibc.2013.13.3.151.
Full textHan, Huiyi, Zhiyi Qu, and Weiwei Kang. "A LOGIN STRATEGY USING FINGERPRINT VERIFICATION." International Journal of Computer Science and Engineering 2, no. 7 (July 25, 2015): 1–5. http://dx.doi.org/10.14445/23488387/ijcse-v2i7p111.
Full textGritzalis, Dimitris, Sokratis Katsikas, and Stefanos Gritzalis. "A zero knowledge probabilistic login protocol." Computers & Security 11, no. 8 (December 1992): 733–45. http://dx.doi.org/10.1016/0167-4048(92)90129-f.
Full textShapiro, J., S. Vaidya, G. Kuperman, and N. Genes. "Adoption of Health Information Exchange by Emergency Physicians at Three Urban Academic Medical Centers." Applied Clinical Informatics 02, no. 03 (2011): 263–69. http://dx.doi.org/10.4338/aci-2011-02-cr-0010.
Full textPutra, M. Gilvy Langgawan, Sadriansyah Sadriansyah, Ahmad Maulana Fikri, Hendy Maulana Jaya Saputra, Brianto Rovi Harjanto, and Dimas Saputra. "Pembuatan Aplikasi Sinkronisasi Data Akademik dengan Feeder PDDIKTI Berbasis Web Service." SPECTA Journal of Technology 5, no. 1 (April 1, 2021): 13–21. http://dx.doi.org/10.35718/specta.v4i3.248.
Full textLombu, Dafirius, Siska Dame Tarihoran, and Irwan Gulo. "Kombinasi Mode Cipher Block Chaining Dengan Algoritma Triangle Chain Cipher Pada Penyandian Login Website." J-SAKTI (Jurnal Sains Komputer dan Informatika) 2, no. 1 (March 27, 2018): 1. http://dx.doi.org/10.30645/j-sakti.v2i1.51.
Full textMozahem, Najib Ali. "Using Learning Management System Activity Data to Predict Student Performance in Face-to-Face Courses." International Journal of Mobile and Blended Learning 12, no. 3 (July 2020): 20–31. http://dx.doi.org/10.4018/ijmbl.2020070102.
Full textPho, Kelvin Ky-Minh, Rong Lu, Samantha Gates, Jennifer Cai, Donglu Xie, Yang Xie, Simon Craddock Lee, and David E. Gerber. "Mobile device access to electronic patient portals in oncology: Potential implications for patient and practice experiences." Journal of Clinical Oncology 36, no. 30_suppl (October 20, 2018): 179. http://dx.doi.org/10.1200/jco.2018.36.30_suppl.179.
Full textZhang, Shu Guang, and Qiao Yun Sun. "User Passwords Sniffing and Defense in LANs." Applied Mechanics and Materials 427-429 (September 2013): 2728–31. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2728.
Full textMulyanto, Yudi, and Akbar Algi Fari. "ANALISIS KEAMANAN LOGIN ROUTER MIKROTIK DARI SERANGAN BRUTEFORCE MENGGUNAKAN METODE PENETRATION TESTING (Studi Kasus: SMK NEGERI 2 SUMBAWA)." Jurnal Informatika, Teknologi dan Sains 4, no. 3 (August 2, 2022): 145–55. http://dx.doi.org/10.51401/jinteks.v4i3.1897.
Full textYu, Hai Bo. "Internet Aided Teaching System Design and Implementation." Advanced Materials Research 1044-1045 (October 2014): 1615–18. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1615.
Full textSujana Eka Putra, I. Gede, and Ni Luh Putu Labasariyani. "Design and Development of Login Security System Using Radio Frequency Identification." Logic : Jurnal Rancang Bangun dan Teknologi 19, no. 1 (March 30, 2019): 41. http://dx.doi.org/10.31940/logic.v19i1.1301.
Full textAbraham Kalloor, Eric, Dr Manoj Kumar Mishra, and Prof Joy Paulose. "Phishfort – Anti-Phishing Framework." International Journal of Engineering & Technology 7, no. 3.4 (June 25, 2018): 42. http://dx.doi.org/10.14419/ijet.v7i3.4.14673.
Full textS.Kom, M.T.I, Khanna Tiara, Fella Megita Putri, and Heni Triyani. "Optimalisasi Single Sign On Untuk Meningkatkan Sistem Keamanan OJRS+." Technomedia Journal 1, no. 2 (March 1, 2017): 61–75. http://dx.doi.org/10.33050/tmj.v1i2.50.
Full textRiadi, Imam, Herman Herman, and Aulyah Zakilah Ifani. "Prototype Pengembangan Aplikasi Login menggunakan Teknologi Blockchain." Journal of Applied Informatics and Computing 5, no. 1 (February 7, 2021): 1–8. http://dx.doi.org/10.30871/jaic.v5i1.2411.
Full textPardi, S., E. Calloni, R. De Rosa, F. Garufi, L. Milano, and G. Russo. "A login shell interface for INFN-GRID." Journal of Physics: Conference Series 119, no. 6 (December 1, 2008): 062050. http://dx.doi.org/10.1088/1742-6596/119/6/062050.
Full textKobie, Nicole. "Brainwave login fails if you're tipsy… hick." New Scientist 233, no. 3110 (January 2017): 14. http://dx.doi.org/10.1016/s0262-4079(17)30162-8.
Full textArvin S. Lat, Joshua, Rod Xavier R. Bondoc, and Kevin Charles V. Atienza. "SOUL System: secure online USB login system." Information Management & Computer Security 21, no. 2 (June 7, 2013): 102–9. http://dx.doi.org/10.1108/imcs-08-2012-0042.
Full textHwang, M. S. "Cryptanalysis of a remote login authentication scheme." Computer Communications 22, no. 8 (May 1999): 742–44. http://dx.doi.org/10.1016/s0140-3664(99)00036-5.
Full textAli, Amir, and Eka Wilda Faida. "PENERAPAN ALGORITMA MESSAGE DIGGEST ALGORITHM 5 PADA LOGIN SISTEM INFORMASI MANAGEMEN RUMAH SAKIT." JOUTICA 7, no. 2 (September 15, 2022): 586. http://dx.doi.org/10.30736/informatika.v7i2.867.
Full textHe, Yi Hui. "Research on the Network Security and Identity Authentication Technology." Advanced Materials Research 926-930 (May 2014): 2819–22. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2819.
Full text