Academic literature on the topic 'Remote Login'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Remote Login.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Remote Login"

1

Hwang, M. S. "Cryptanalysis of a remote login authentication scheme." Computer Communications 22, no. 8 (1999): 742–44. http://dx.doi.org/10.1016/s0140-3664(99)00036-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bindu C, Shoba, Chandra Sekhar Reddy P, and Satya Narayana B. "A Novel Remote Login Authentication with Smart Card." i-manager's Journal on Software Engineering 2, no. 2 (2007): 22–27. http://dx.doi.org/10.26634/jse.2.2.545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maynard, Jeff. "Signature and gesture – dynamic biometrics for remote login." Biometric Technology Today 2010, no. 10 (2010): 9–11. http://dx.doi.org/10.1016/s0969-4765(10)70208-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chien, Hung-Yu, Jinn-Ke Jan, and Yuh-Min Tseng. "Impersonation attack on Tan-Zhu's remote login scheme." Electronics Letters 36, no. 14 (2000): 1202. http://dx.doi.org/10.1049/el:20000851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wu, Tzong-Chen. "Remote login authentication scheme based on a geometric approach." Computer Communications 18, no. 12 (1995): 959–63. http://dx.doi.org/10.1016/0140-3664(96)81595-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Das, Ashok Kumar, Vanga Odelu, and Adrijit Goswami. "A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function." Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/719470.

Full text
Abstract:
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication
APA, Harvard, Vancouver, ISO, and other styles
7

Yan, Hong Wei, Zi Ming Kou, and Bo Gao. "Research on Robot Arm Remote Control Experiment Based on Web." Advanced Materials Research 159 (December 2010): 51–55. http://dx.doi.org/10.4028/www.scientific.net/amr.159.51.

Full text
Abstract:
The networked and modularization has become the development orientation of experiment system. Aiming at the need for constructing remote laboratory, the paper focused on robot arm remote control experiment system. Based on the introduced of remote control technologies based on Web and Internet, the paper designed robot arm remote control experiment system structure based on Web. The detail working flow of client and server of the experiment system were also provided, which lies good foundation for the implementation of robot arm remote control experiment system. The constructed robot arm remot
APA, Harvard, Vancouver, ISO, and other styles
8

Ardianto, Feby, and Trianto Trianto. "JARINGAN HOTSPOT RADIUS (REMOTE ACCES DIAL-IN USER SERVICE) SERVER MIKROTIK." Jurnal Digital Teknologi Informasi 2, no. 1 (2019): 38. http://dx.doi.org/10.32502/digital.v2i1.2503.

Full text
Abstract:
Peningkatan pengguna ini juga dibarengi dengan peningkatan jumlah Hotspot di tempat-tempat umum, seperti kafe, mal, bandara, di perkantoran bahkan juga di kampus dan di sekolah-sekolah tetapi penyebarannya tidak merata ke daerah-daerah pinggiran kota. Tujuan penelitian rancang bangun sistem keamanan jaringan hotspot menggunakan radius server untuk mengontrol dan membatasi setiap user jaringan. Metode yang digunakan dalam penelitian ini menggunakan 4 tahpan, yaitu: 1). Indentifikasi, 2). Pengadaan perangkat hardware dan software, 3). Desain radius server berbasis mikrotik, 4). Pengujian radius
APA, Harvard, Vancouver, ISO, and other styles
9

Kumari, Shipra, and Hari Om. "Remote login password authentication scheme using tangent theorem on circle." International Journal of Convergence Computing 2, no. 1 (2016): 93. http://dx.doi.org/10.1504/ijconvc.2016.080403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chien, Hung-Yu, Jinn-Ke Jan, and Yuh-Min Tseng. "A modified remote login authentication scheme based on geometric approach." Journal of Systems and Software 55, no. 3 (2001): 287–90. http://dx.doi.org/10.1016/s0164-1212(00)00077-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Remote Login"

1

Herbig, Christopher Fred. "Use of OpenSSH support for remote login to a multilevel secure system." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FHerbig.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Dec. 2004.<br>Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 201-202). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

Danielson, David Robert. "Source equivocality and claim verifiability in remote product evaluation /." May be available electronically:, 2008. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Perez, Luis Ernesto. "A virtual supermarket for remote sensing data and images." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Boucher, Alexandre. "Downscaling of satellite remote sensing data : application to land cover mapping /." May be available electronically:, 2007. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Peter, William Bolton. "Quantitative measurement of lightning-induced electron precipitaion using VLF remote sensing /." May be available electronically:, 2007. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sarabandi, Pooya. "Development of algorithms for building inventory compilation through remote sensing and statistical inferencing /." May be available electronically:, 2007. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhu, Yingjun. "Remote control of multiple robots a wireless sensor network and virtual reality approach /." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Janugani, Swapna. "Directional analysis and filtering for dust storm detection in NOAA-AVHRR imagery." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Perez, Adriana Evangelina. "Application on integrated remote sensing and GIS technologies to geoenvironmental issues in far West Texas and southern New Mexico." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Osuna, Francisco. "Semi-automated frame transformations using FFT analysis on 2-D Images." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Remote Login"

1

Roundy, Shad. Energy scavenging for wireless sensor networks: With special focus on vibrations. Kluwer Academic Publishers, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Use of OpenSSH Support for Remote Login to a Multilevel Secure System. Storming Media, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bleecker, Inge De, and Rebecca Okoroji. Remote Usability Testing: Actionable insights in user behavior across geographies and time zones. Packt Publishing, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Munn, Luke. Logic of Feeling. The Rowman & Littlefield Publishers Group, 2020. https://doi.org/10.5040/9798881814472.

Full text
Abstract:
From the virulence of fake news to the rise of psychographic profiling, emotion has become ascendant. The new frontier of capitalization is not outward, but inward—the inner life of affect and emotion, desire and disposition. This book lays that new reality out with a series of close case studies. A new set of technologies are emerging, from facial coding to affective computing, that attempt to render the emotional into the machine-readable. At the same time, social media and smart home devices are becoming empathic, attempting to draw out our affective participation and elicit our emotional e
APA, Harvard, Vancouver, ISO, and other styles
5

Kenney, Rosanna, and Peter Smith, eds. Vagueness. The MIT Press, 1997. http://dx.doi.org/10.7551/mitpress/7064.001.0001.

Full text
Abstract:
Vagueness is currently the subject of vigorous debate in the philosophy of logic and language. Vague terms-such as "tall", "red", "bald", and "tadpole"—have borderline cases (arguably, someone may be neither tall nor not tall); and they lack well-defined extensions (there is no sharp boundary between tall people and the rest). The phenomenon of vagueness poses a fundamental challenge to classical logic and semantics, which assumes that propositions are either true or false and that extensions are determinate. Another striking problem to which vagueness gives rise is the sorites paradox. If you
APA, Harvard, Vancouver, ISO, and other styles
6

Markwica, Robin. The Cuban Missile Crisis, 1962. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198794349.003.0004.

Full text
Abstract:
Chapter 4 examines Nikita Khrushchev’s decision-making in the Cuban missile crisis. It posits that the logic of affect offers a more comprehensive explanation of the Soviet prime minister’s choice behavior. Specifically, the model shows that his defiance of John F. Kennedy’s demand to remove the missiles from Cuba during the first two days of the crisis was shaped by his sense of humiliation and anger at what he saw as the American president’s refusal to recognize him as the leader of a co-equal power. In the last four days of the crisis, however, the decline of Khrushchev’s anger and humiliat
APA, Harvard, Vancouver, ISO, and other styles
7

Wright, Paul Kenneth, Shad Roundy, and Jan M. Rabaey. Energy Scavenging for Wireless Sensor Networks: With Special Focus on Vibrations. Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Foster, Travis M. Genre and White Supremacy in the Postemancipation United States. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198838098.001.0001.

Full text
Abstract:
Even as Black Lives Matter thinkers underscore white supremacy’s manifestation in the unremarkable and all-too-often unnoticed unfolding of ordinary life, literary critical methods remain impeded by longstanding biases toward unconventional texts, visionary writers, and nonconforming ideas. The result is that we’re left without adequate methods, vocabularies, and archives for apprehending white supremacy’s urgent ordinariness. In Genre and White Supremacy in the Postemancipation United States, Travis M. Foster suggests that genre provides the best route out of this impasse. Through rigorous ne
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Remote Login"

1

Smith, Roger P., and Margaret J. A. Edwards. "Telnet and FTP: Remote Login and Retrieval of Information." In The Internet for Physicians. Springer New York, 1997. http://dx.doi.org/10.1007/978-1-4757-6744-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Edwards, Margaret J. A. "Telnet and FTP: Remote Login and Retrieval of Information." In The Internet for Nurses and Allied Health Professionals. Springer US, 1995. http://dx.doi.org/10.1007/978-1-4684-0243-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Edwards, Margaret J. A. "Telnet and FTP: Remote Login and Retrieval of Information." In The Internet for Nurses and Allied Health Professionals. Springer US, 1997. http://dx.doi.org/10.1007/978-1-4684-0494-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

An, Younghwa. "Improved Password Mutual Authentication Scheme for Remote Login Network Systems." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-27186-1_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Das, Manik Lal, Ashutosh Saxena, and V. P. Gulati. "A Novel Remote User Authentication Scheme Through Dynamic Login Identity." In Distributed Computing - IWDC 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30536-1_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kumari, Shipra, and Hari Om. "Remote Login Password Authentication Scheme Using Tangent Theorem on Circle." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-12012-6_80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar, Rajeev, Ruhul Amin, Arijit Karati, and G. P. Biswas. "Secure Remote Login Scheme with Password and Smart Card Update Facilities." In Advances in Intelligent Systems and Computing. Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2695-6_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kumari, Shipra, and Hari Om. "A Remote Login Password Authentication Scheme Using Row Vector with Biometric." In Advances in Intelligent Systems and Computing. Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2247-7_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Karuppiah, Marimuthu, Akshat Pradhan, Saru Kumari, Ruhul Amin, S. Rajkumar, and Rahul Kumar. "Security on “Secure Remote Login Scheme with Password and Smart Card Update Facilities”." In Communications in Computer and Information Science. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-4642-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Syverson, Paul. "Principles of Remote Sattestation." In Protocols, Strands, and Logic. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91631-2_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Remote Login"

1

Liu, Liping, and Hongfeng Qi. "Design of Programmable Logic Controller Remote Monitoring System Based on Industrial Internet." In 2024 International Conference on Artificial Intelligence and Power Systems (AIPS). IEEE, 2024. http://dx.doi.org/10.1109/aips64124.2024.00009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lastre, Jhury Kevin, Yongho Ko, Hoseok Kwon, Bonam Kim, and Ilsun You. "Formal Verification of Consumer Remote Sim Provisioning Common Mutual Authentication using BAN Logic." In 2025 1st International Conference on Consumer Technology (ICCT-Pacific). IEEE, 2025. https://doi.org/10.1109/icct-pacific63901.2025.11012784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Buecker, B. J. "Experience with a Dedicated, On-Line Boiler Water Monitoring System." In CORROSION 1992. NACE International, 1992. https://doi.org/10.5006/c1992-92418.

Full text
Abstract:
Abstract In March 1990, a dedicated, on-line boiler water and feedwater chemistry monitoring system was started up at City Water, Light and Power’s Dallman generating station. The system monitors three coal-fired units, two of which are at times cycled and one which is base loaded. The monitoring system was designed to supplement and improve upon previous analytical techniques which relied almost solely on grab sampling. One of the primary components of the monitoring system is a programmable logic controller (PLC) which performs a wide range of functions including sending analytical data to r
APA, Harvard, Vancouver, ISO, and other styles
4

Racoviteanu, Andrei, Artur Kazak, Nicolae Secrieru, and Mihai Ivanovici. "Fuzzy Logic-Based Visualization and Interpretation of NDVI Maps." In 2024 14th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing (WHISPERS). IEEE, 2024. https://doi.org/10.1109/whispers65427.2024.10876428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Martha Patricia, Valbuena Gaona, and Ferrucho Parra Cindy Carolina. "Fuzzy Logic, Artificial Intelligence, and Planet Scope Imagery for the Zonification of Wildfire Vulnerability." In IGARSS 2024 - 2024 IEEE International Geoscience and Remote Sensing Symposium. IEEE, 2024. http://dx.doi.org/10.1109/igarss53475.2024.10642446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Drozd, Sofiia, and Nataliia Kussul. "Assessing Ukraine’s Solar Power Potential: A Comprehensive Analysis Using Satellite Data and Fuzzy Logic." In IGARSS 2024 - 2024 IEEE International Geoscience and Remote Sensing Symposium. IEEE, 2024. http://dx.doi.org/10.1109/igarss53475.2024.10642285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Islam, S. K. Hafizul, and G. P. Biswas. "Improved remote login scheme based on ECC." In 2011 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, 2011. http://dx.doi.org/10.1109/icrtit.2011.5972366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kumari, Shipra, and Hari Om. "Remote Login Password Authentication Scheme Based on Cuboid Using Biometric." In 2014 International Conference on Information Technology (ICIT). IEEE, 2014. http://dx.doi.org/10.1109/icit.2014.48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tiwari, Minu, Soumyashree S. Panda, and G. P. Biswas. "An improved secure remote login protocol with three-factor authentication." In 2016 3rd International Conference on Recent Advances in Information Technology (RAIT). IEEE, 2016. http://dx.doi.org/10.1109/rait.2016.7507932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baoyuan Kang, Jinguang Han, and Qingju Wang. "Cryptanalysis and improvement on an IC-card-based remote login mechanism." In 2010 2nd International Conference on Computer Engineering and Technology. IEEE, 2010. http://dx.doi.org/10.1109/iccet.2010.5486299.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Remote Login"

1

Nguyen, Thuy D., and Timothy E. Levin. Policy Enforced Remote Login. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada412735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Huffer, M. SLAC Courier and Remote Login Facility. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1454028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Baader, Franz, Francesco Kriegel, Adrian Nuradiansyah, and Rafael Peñaloza. Repairing Description Logic Ontologies by Weakening Axioms. Technische Universität Dresden, 2018. http://dx.doi.org/10.25368/2022.238.

Full text
Abstract:
The classical approach for repairing a Description Logic ontology O in the sense of removing an unwanted consequence α is to delete a minimal number of axioms from O such that the resulting ontology O´ does not have the consequence α. However, the complete deletion of axioms may be too rough, in the sense that it may also remove consequences that are actually wanted. To alleviate this problem, we propose a more gentle way of repair in which axioms are not necessarily deleted, but only weakened. On the one hand, we investigate general properties of this gentle repair method. On the other hand,
APA, Harvard, Vancouver, ISO, and other styles
4

Choquette, Gary, Richard Rans, and Warren Peterson. PR000-22605-R06 Accurate Compressibility Estimates for Natural Gas. Pipeline Research Council International, Inc. (PRCI), 2024. http://dx.doi.org/10.55274/r0000068.

Full text
Abstract:
This document describes methods to calculate estimated gas compressibility without having the full gas composition. The purpose of these methods is for use cases where reasonable accuracy is required but not critical and the methods must be computationally efficient such that they can be used in programmable logic controllers, remote terminal units, and supervisory control and data acquisition systems; akin to the functionality of the NX-19 or AGA-8 Gross methods but with higher accuracy. Multiple simplified calculation methods were evaluated with one method performing significantly better tha
APA, Harvard, Vancouver, ISO, and other styles
5

Warin, Thierry. Not Efficient, Not Optimal: The Biases That Built Global Trade and the Data Tools That Could Fix It. CIRANO, 2025. https://doi.org/10.54932/zihs7852.

Full text
Abstract:
À la suite du regain des tensions commerciales et des réajustements géopolitiques — illustrés par la guerre commerciale de 2025 sous la présidence de Trump 2.0 — le discours dominant en matière de politique commerciale soutient que la mondialisation est allée « trop loin », sacrifiant la résilience et la sécurité nationale sur l’autel de l’efficacité économique. Cet article remet en question ce récit en déconstruisant les hypothèses implicites qui le sous-tendent, notamment la croyance selon laquelle le commerce mondial et les chaînes de valeur sont efficients. En mobilisant les littératures e
APA, Harvard, Vancouver, ISO, and other styles
6

Baader, Franz, and Francesco Kriegel. Pushing Optimal ABox Repair from EL Towards More Expressive Horn-DLs: Extended Version. Technische Universität Dresden, 2022. http://dx.doi.org/10.25368/2022.131.

Full text
Abstract:
Ontologies based on Description Logic (DL) represent general background knowledge in a terminology (TBox) and the actual data in an ABox. DL systems can then be used to compute consequences (such as answers to certain queries) from an ontology consisting of a TBox and an ABox. Since both human-made and machine-learned data sets may contain errors, which manifest themselves as unintuitive or obviously incorrect consequences, repairing DL-based ontologies in the sense of removing such unwanted consequences is an important topic in DL research. Most of the repair approaches described in the liter
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!