Academic literature on the topic 'Remote Login'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Remote Login.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Remote Login"
Hwang, M. S. "Cryptanalysis of a remote login authentication scheme." Computer Communications 22, no. 8 (1999): 742–44. http://dx.doi.org/10.1016/s0140-3664(99)00036-5.
Full textBindu C, Shoba, Chandra Sekhar Reddy P, and Satya Narayana B. "A Novel Remote Login Authentication with Smart Card." i-manager's Journal on Software Engineering 2, no. 2 (2007): 22–27. http://dx.doi.org/10.26634/jse.2.2.545.
Full textMaynard, Jeff. "Signature and gesture – dynamic biometrics for remote login." Biometric Technology Today 2010, no. 10 (2010): 9–11. http://dx.doi.org/10.1016/s0969-4765(10)70208-3.
Full textChien, Hung-Yu, Jinn-Ke Jan, and Yuh-Min Tseng. "Impersonation attack on Tan-Zhu's remote login scheme." Electronics Letters 36, no. 14 (2000): 1202. http://dx.doi.org/10.1049/el:20000851.
Full textWu, Tzong-Chen. "Remote login authentication scheme based on a geometric approach." Computer Communications 18, no. 12 (1995): 959–63. http://dx.doi.org/10.1016/0140-3664(96)81595-7.
Full textDas, Ashok Kumar, Vanga Odelu, and Adrijit Goswami. "A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function." Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/719470.
Full textYan, Hong Wei, Zi Ming Kou, and Bo Gao. "Research on Robot Arm Remote Control Experiment Based on Web." Advanced Materials Research 159 (December 2010): 51–55. http://dx.doi.org/10.4028/www.scientific.net/amr.159.51.
Full textArdianto, Feby, and Trianto Trianto. "JARINGAN HOTSPOT RADIUS (REMOTE ACCES DIAL-IN USER SERVICE) SERVER MIKROTIK." Jurnal Digital Teknologi Informasi 2, no. 1 (2019): 38. http://dx.doi.org/10.32502/digital.v2i1.2503.
Full textKumari, Shipra, and Hari Om. "Remote login password authentication scheme using tangent theorem on circle." International Journal of Convergence Computing 2, no. 1 (2016): 93. http://dx.doi.org/10.1504/ijconvc.2016.080403.
Full textChien, Hung-Yu, Jinn-Ke Jan, and Yuh-Min Tseng. "A modified remote login authentication scheme based on geometric approach." Journal of Systems and Software 55, no. 3 (2001): 287–90. http://dx.doi.org/10.1016/s0164-1212(00)00077-7.
Full textDissertations / Theses on the topic "Remote Login"
Herbig, Christopher Fred. "Use of OpenSSH support for remote login to a multilevel secure system." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FHerbig.pdf.
Full textDanielson, David Robert. "Source equivocality and claim verifiability in remote product evaluation /." May be available electronically:, 2008. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textPerez, Luis Ernesto. "A virtual supermarket for remote sensing data and images." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textBoucher, Alexandre. "Downscaling of satellite remote sensing data : application to land cover mapping /." May be available electronically:, 2007. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textPeter, William Bolton. "Quantitative measurement of lightning-induced electron precipitaion using VLF remote sensing /." May be available electronically:, 2007. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textSarabandi, Pooya. "Development of algorithms for building inventory compilation through remote sensing and statistical inferencing /." May be available electronically:, 2007. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textZhu, Yingjun. "Remote control of multiple robots a wireless sensor network and virtual reality approach /." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textJanugani, Swapna. "Directional analysis and filtering for dust storm detection in NOAA-AVHRR imagery." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textPerez, Adriana Evangelina. "Application on integrated remote sensing and GIS technologies to geoenvironmental issues in far West Texas and southern New Mexico." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textOsuna, Francisco. "Semi-automated frame transformations using FFT analysis on 2-D Images." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textBooks on the topic "Remote Login"
Roundy, Shad. Energy scavenging for wireless sensor networks: With special focus on vibrations. Kluwer Academic Publishers, 2004.
Find full textUse of OpenSSH Support for Remote Login to a Multilevel Secure System. Storming Media, 2004.
Find full textBleecker, Inge De, and Rebecca Okoroji. Remote Usability Testing: Actionable insights in user behavior across geographies and time zones. Packt Publishing, 2018.
Find full textMunn, Luke. Logic of Feeling. The Rowman & Littlefield Publishers Group, 2020. https://doi.org/10.5040/9798881814472.
Full textKenney, Rosanna, and Peter Smith, eds. Vagueness. The MIT Press, 1997. http://dx.doi.org/10.7551/mitpress/7064.001.0001.
Full textMarkwica, Robin. The Cuban Missile Crisis, 1962. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198794349.003.0004.
Full textWright, Paul Kenneth, Shad Roundy, and Jan M. Rabaey. Energy Scavenging for Wireless Sensor Networks: With Special Focus on Vibrations. Springer, 2003.
Find full textFoster, Travis M. Genre and White Supremacy in the Postemancipation United States. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198838098.001.0001.
Full textBook chapters on the topic "Remote Login"
Smith, Roger P., and Margaret J. A. Edwards. "Telnet and FTP: Remote Login and Retrieval of Information." In The Internet for Physicians. Springer New York, 1997. http://dx.doi.org/10.1007/978-1-4757-6744-5_5.
Full textEdwards, Margaret J. A. "Telnet and FTP: Remote Login and Retrieval of Information." In The Internet for Nurses and Allied Health Professionals. Springer US, 1995. http://dx.doi.org/10.1007/978-1-4684-0243-8_5.
Full textEdwards, Margaret J. A. "Telnet and FTP: Remote Login and Retrieval of Information." In The Internet for Nurses and Allied Health Professionals. Springer US, 1997. http://dx.doi.org/10.1007/978-1-4684-0494-4_5.
Full textAn, Younghwa. "Improved Password Mutual Authentication Scheme for Remote Login Network Systems." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-27186-1_34.
Full textDas, Manik Lal, Ashutosh Saxena, and V. P. Gulati. "A Novel Remote User Authentication Scheme Through Dynamic Login Identity." In Distributed Computing - IWDC 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30536-1_59.
Full textKumari, Shipra, and Hari Om. "Remote Login Password Authentication Scheme Using Tangent Theorem on Circle." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-12012-6_80.
Full textKumar, Rajeev, Ruhul Amin, Arijit Karati, and G. P. Biswas. "Secure Remote Login Scheme with Password and Smart Card Update Facilities." In Advances in Intelligent Systems and Computing. Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2695-6_41.
Full textKumari, Shipra, and Hari Om. "A Remote Login Password Authentication Scheme Using Row Vector with Biometric." In Advances in Intelligent Systems and Computing. Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2247-7_21.
Full textKaruppiah, Marimuthu, Akshat Pradhan, Saru Kumari, Ruhul Amin, S. Rajkumar, and Rahul Kumar. "Security on “Secure Remote Login Scheme with Password and Smart Card Update Facilities”." In Communications in Computer and Information Science. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-4642-1_3.
Full textSyverson, Paul. "Principles of Remote Sattestation." In Protocols, Strands, and Logic. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91631-2_23.
Full textConference papers on the topic "Remote Login"
Liu, Liping, and Hongfeng Qi. "Design of Programmable Logic Controller Remote Monitoring System Based on Industrial Internet." In 2024 International Conference on Artificial Intelligence and Power Systems (AIPS). IEEE, 2024. http://dx.doi.org/10.1109/aips64124.2024.00009.
Full textLastre, Jhury Kevin, Yongho Ko, Hoseok Kwon, Bonam Kim, and Ilsun You. "Formal Verification of Consumer Remote Sim Provisioning Common Mutual Authentication using BAN Logic." In 2025 1st International Conference on Consumer Technology (ICCT-Pacific). IEEE, 2025. https://doi.org/10.1109/icct-pacific63901.2025.11012784.
Full textBuecker, B. J. "Experience with a Dedicated, On-Line Boiler Water Monitoring System." In CORROSION 1992. NACE International, 1992. https://doi.org/10.5006/c1992-92418.
Full textRacoviteanu, Andrei, Artur Kazak, Nicolae Secrieru, and Mihai Ivanovici. "Fuzzy Logic-Based Visualization and Interpretation of NDVI Maps." In 2024 14th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing (WHISPERS). IEEE, 2024. https://doi.org/10.1109/whispers65427.2024.10876428.
Full textMartha Patricia, Valbuena Gaona, and Ferrucho Parra Cindy Carolina. "Fuzzy Logic, Artificial Intelligence, and Planet Scope Imagery for the Zonification of Wildfire Vulnerability." In IGARSS 2024 - 2024 IEEE International Geoscience and Remote Sensing Symposium. IEEE, 2024. http://dx.doi.org/10.1109/igarss53475.2024.10642446.
Full textDrozd, Sofiia, and Nataliia Kussul. "Assessing Ukraine’s Solar Power Potential: A Comprehensive Analysis Using Satellite Data and Fuzzy Logic." In IGARSS 2024 - 2024 IEEE International Geoscience and Remote Sensing Symposium. IEEE, 2024. http://dx.doi.org/10.1109/igarss53475.2024.10642285.
Full textIslam, S. K. Hafizul, and G. P. Biswas. "Improved remote login scheme based on ECC." In 2011 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, 2011. http://dx.doi.org/10.1109/icrtit.2011.5972366.
Full textKumari, Shipra, and Hari Om. "Remote Login Password Authentication Scheme Based on Cuboid Using Biometric." In 2014 International Conference on Information Technology (ICIT). IEEE, 2014. http://dx.doi.org/10.1109/icit.2014.48.
Full textTiwari, Minu, Soumyashree S. Panda, and G. P. Biswas. "An improved secure remote login protocol with three-factor authentication." In 2016 3rd International Conference on Recent Advances in Information Technology (RAIT). IEEE, 2016. http://dx.doi.org/10.1109/rait.2016.7507932.
Full textBaoyuan Kang, Jinguang Han, and Qingju Wang. "Cryptanalysis and improvement on an IC-card-based remote login mechanism." In 2010 2nd International Conference on Computer Engineering and Technology. IEEE, 2010. http://dx.doi.org/10.1109/iccet.2010.5486299.
Full textReports on the topic "Remote Login"
Nguyen, Thuy D., and Timothy E. Levin. Policy Enforced Remote Login. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada412735.
Full textHuffer, M. SLAC Courier and Remote Login Facility. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1454028.
Full textBaader, Franz, Francesco Kriegel, Adrian Nuradiansyah, and Rafael Peñaloza. Repairing Description Logic Ontologies by Weakening Axioms. Technische Universität Dresden, 2018. http://dx.doi.org/10.25368/2022.238.
Full textChoquette, Gary, Richard Rans, and Warren Peterson. PR000-22605-R06 Accurate Compressibility Estimates for Natural Gas. Pipeline Research Council International, Inc. (PRCI), 2024. http://dx.doi.org/10.55274/r0000068.
Full textWarin, Thierry. Not Efficient, Not Optimal: The Biases That Built Global Trade and the Data Tools That Could Fix It. CIRANO, 2025. https://doi.org/10.54932/zihs7852.
Full textBaader, Franz, and Francesco Kriegel. Pushing Optimal ABox Repair from EL Towards More Expressive Horn-DLs: Extended Version. Technische Universität Dresden, 2022. http://dx.doi.org/10.25368/2022.131.
Full text