Journal articles on the topic 'Remote Login'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Remote Login.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hwang, M. S. "Cryptanalysis of a remote login authentication scheme." Computer Communications 22, no. 8 (1999): 742–44. http://dx.doi.org/10.1016/s0140-3664(99)00036-5.
Full textBindu C, Shoba, Chandra Sekhar Reddy P, and Satya Narayana B. "A Novel Remote Login Authentication with Smart Card." i-manager's Journal on Software Engineering 2, no. 2 (2007): 22–27. http://dx.doi.org/10.26634/jse.2.2.545.
Full textMaynard, Jeff. "Signature and gesture – dynamic biometrics for remote login." Biometric Technology Today 2010, no. 10 (2010): 9–11. http://dx.doi.org/10.1016/s0969-4765(10)70208-3.
Full textChien, Hung-Yu, Jinn-Ke Jan, and Yuh-Min Tseng. "Impersonation attack on Tan-Zhu's remote login scheme." Electronics Letters 36, no. 14 (2000): 1202. http://dx.doi.org/10.1049/el:20000851.
Full textWu, Tzong-Chen. "Remote login authentication scheme based on a geometric approach." Computer Communications 18, no. 12 (1995): 959–63. http://dx.doi.org/10.1016/0140-3664(96)81595-7.
Full textDas, Ashok Kumar, Vanga Odelu, and Adrijit Goswami. "A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function." Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/719470.
Full textYan, Hong Wei, Zi Ming Kou, and Bo Gao. "Research on Robot Arm Remote Control Experiment Based on Web." Advanced Materials Research 159 (December 2010): 51–55. http://dx.doi.org/10.4028/www.scientific.net/amr.159.51.
Full textArdianto, Feby, and Trianto Trianto. "JARINGAN HOTSPOT RADIUS (REMOTE ACCES DIAL-IN USER SERVICE) SERVER MIKROTIK." Jurnal Digital Teknologi Informasi 2, no. 1 (2019): 38. http://dx.doi.org/10.32502/digital.v2i1.2503.
Full textKumari, Shipra, and Hari Om. "Remote login password authentication scheme using tangent theorem on circle." International Journal of Convergence Computing 2, no. 1 (2016): 93. http://dx.doi.org/10.1504/ijconvc.2016.080403.
Full textChien, Hung-Yu, Jinn-Ke Jan, and Yuh-Min Tseng. "A modified remote login authentication scheme based on geometric approach." Journal of Systems and Software 55, no. 3 (2001): 287–90. http://dx.doi.org/10.1016/s0164-1212(00)00077-7.
Full textCheng, Ting-Fang, Jung-San Lee, and Chin-Chen Chang. "Security enhancement of an IC-card-based remote login mechanism." Computer Networks 51, no. 9 (2007): 2280–87. http://dx.doi.org/10.1016/j.comnet.2007.01.013.
Full textDang, Guo Qing, and Xiao Yan Cheng. "The Research of Embedded Remote Monitoring System Based on B/S Framework." Applied Mechanics and Materials 713-715 (January 2015): 508–11. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.508.
Full textLi, Chun-Ta, Cheng-Chi Lee, and Chi-Yao Weng. "A dynamic identity-based user authentication scheme for remote login systems." Security and Communication Networks 8, no. 18 (2015): 3372–82. http://dx.doi.org/10.1002/sec.1264.
Full textTohirin, Tohirin. "PENERAPAN KEAMANAN REMOTE SERVER MELALUI SSH DENGAN KOMBINASI KRIPTOGRAFI ASIMETRIS DAN AUTENTIKASI DUA LANGKAH." Jurnal Teknologi Informasi 4, no. 1 (2020): 133–38. http://dx.doi.org/10.36294/jurti.v4i1.1262.
Full textHawedi, Hadya S., Omran Ali Bentaher, and Kaled E. I. Abodhir. "REMOTE ACCESS TO A ROUTER SECURELY USING SSH." Journal of the Academic Forum 5, no. 1 (2021): 174–89. https://doi.org/10.59743/jaf.v5i1.177.
Full textQu, Juan, and Li-min Zou. "An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme." Journal of Electrical and Computer Engineering 2013 (2013): 1–5. http://dx.doi.org/10.1155/2013/786587.
Full textZhang, Kai. "Research of Remote Access System to the Digital Resources Based on Cloud Computing." Applied Mechanics and Materials 543-547 (March 2014): 3606–9. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3606.
Full textYang, Jun, Wen Long Li, Ruo Xin Zhu, and Guang Hui Cai. "Design and Implementation of Remote Intelligent Control System Based on Cortex-M3." Applied Mechanics and Materials 513-517 (February 2014): 3336–39. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.3336.
Full textWu, Wei Chen. "A New Remote User Authentication Scheme on Three Dimensions." Advanced Materials Research 846-847 (November 2013): 1707–10. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1707.
Full textAlamsyah, Zaenal, Gina Purnama Insany, and Friendly Jihad Taqwana. "PERANCANGAN DAN IMPLEMENTASI APLIKASI KEAMANAN UJIAN ONLINE MENGGUNAKAN ALGORITMA RIJNDAEL DAN REMOTE DESKTOP PROTOCOL." SKANIKA: Sistem Komputer dan Teknik Informatika 7, no. 2 (2024): 119–32. http://dx.doi.org/10.36080/skanika.v7i2.3185.
Full textChang, Chin-Chen, and Iuon-Chang Lin. "Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach." Informatica 16, no. 1 (2005): 37–44. http://dx.doi.org/10.15388/informatica.2005.082.
Full textZhong, Xiaoyan. "Application of Multi-lens Video Editing Technology in Multi-media Interactive Teaching of "Aerobics"." International Journal of Emerging Technologies in Learning (iJET) 12, no. 02 (2017): 27. http://dx.doi.org/10.3991/ijet.v12i02.6484.
Full textBuhari, Bello A., Afolayan A. Obiniyi, Sahalu B. Junaidu, and Armand F. Donfack Kana. "Comparative analysis of remote user authentication schemes based on external memory." Dutse Journal of Pure and Applied Sciences 10, no. 3c (2024): 313–22. http://dx.doi.org/10.4314/dujopas.v10i3c.30.
Full textHasan, Mokhtar Mohammed, and Noor Adnan Ibraheem. "APPLYING ADAPTIVE FUZZY NEURAL ALGORITHM FOR INTRUSION DETECTION." Journal of Engineering 16, no. 01 (2010): 4488–509. http://dx.doi.org/10.31026/j.eng.2010.01.08.
Full textLee, Yung Cheng, and Pei Ju Lee. "Cryptanalysis of Ahirwal-Sonwanshi ID-Based Remote User Authentication Scheme." Applied Mechanics and Materials 764-765 (May 2015): 858–62. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.858.
Full textShin, Soobok, Kangseok Kim, Ki-Hyung Kim, and Hongjin Yeh. "A Remote User Authentication Scheme with Anonymity for Mobile Devices." International Journal of Advanced Robotic Systems 9, no. 1 (2012): 13. http://dx.doi.org/10.5772/50912.
Full textSubangi, Dr M. C., Dr M. Kumaran, and Mr M. Mohan. "A Web Based Remote Access in Tamil Nadu Agricultural University E-Library on Overview." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem39684.
Full textOm, Hari, Vishavdeep Goyal, and Kunal Gupta. "A 3-D Geometry based Remote Login 2-Way Authentication Scheme using Smart Card." International Journal of Computer Network and Information Security 7, no. 8 (2015): 72–79. http://dx.doi.org/10.5815/ijcnis.2015.08.08.
Full textKerta, Johan Muliadi, Panji Adiprabowo, Eva Kusmiyati, and Sylvia Astri Wulandari Rahardjo. "Penggunaan Single Sign On (SSO) pada Jaringan Internet Badan Pengkajian dan Penerapan Teknologi (BPPT)." ComTech: Computer, Mathematics and Engineering Applications 2, no. 2 (2011): 880. http://dx.doi.org/10.21512/comtech.v2i2.2838.
Full textOMOLOLA AKINOLA. "Robust authentication mechanisms integrating biometrics and AI for securing remote access to cloud-based healthcare services." World Journal of Advanced Research and Reviews 23, no. 3 (2024): 034–44. http://dx.doi.org/10.30574/wjarr.2024.23.3.2642.
Full textOMOLOLA, AKINOLA. "Robust authentication mechanisms integrating biometrics and AI for securing remote access to cloud-based healthcare services." World Journal of Advanced Research and Reviews 23, no. 3 (2024): 034–44. https://doi.org/10.5281/zenodo.14908946.
Full textManikam, Karthikeyan Manikam. "Optimizing Remote Workforce Productivity: A Non-Invasive Monitoring Framework." International Journal of Computing and Engineering 6, no. 7 (2024): 40–51. https://doi.org/10.47941/ijce.2432.
Full textZhang, Da Wei, and Xiao Jian Xie. "Research on Network Virtual Instrument." Applied Mechanics and Materials 432 (September 2013): 603–8. http://dx.doi.org/10.4028/www.scientific.net/amm.432.603.
Full textHidayat, Arif. "ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG." IJISCS (International Journal of Information System and Computer Science) 3, no. 2 (2019): 64. http://dx.doi.org/10.56327/ijiscs.v3i2.742.
Full textLi, Wei Jing, Ping Zhu, Hua Zhang, and Zheng Ping Jin. "A Robust and Efficient Password Authentication Scheme Using Smart Cards." Applied Mechanics and Materials 571-572 (June 2014): 1172–75. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.1172.
Full textDr.M Ananthalakshmi, C Banumathy, T Harish, and S Kaviya. "Efficient and Secure Authentication Scheme for IoMT – Based Healthcare." International Research Journal on Advanced Engineering and Management (IRJAEM) 3, no. 05 (2025): 1577–79. https://doi.org/10.47392/irjaem.2025.0255.
Full textNarkhede, Puja. "College Automation System Using IOT." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 654–58. http://dx.doi.org/10.22214/ijraset.2022.45361.
Full textM, Mohan Tej, Mahabaleshwara Rao, and Shivananda Bhat K. "Enabling OpenAthens Single Sign On (SSO) Remote Access Authentication to eResources." DESIDOC Journal of Library & Information Technology 43, no. 05 (2023): 347–53. http://dx.doi.org/10.14429/djlit.43.05.18872.
Full textMarcel, Marcel, and Garpepi Hanief Aotearoa. "Enhancing IT Service Desk for Hybrid Work: Insight from a TOE and TTF Case Study." Journal of Information Systems and Informatics 7, no. 1 (2025): 848–69. https://doi.org/10.51519/journalisi.v7i1.971.
Full textChen, Shao-Jui, Jing-Ying Huang, Cheng-Ta Huang, and Wei-Jen Wang. "SAMEVED." International Journal of Grid and High Performance Computing 5, no. 2 (2013): 27–42. http://dx.doi.org/10.4018/jghpc.2013040102.
Full textKamiński, Kamil Adam, Andrzej Piotr Dobrowolski, Zbigniew Piotrowski, and Przemysław Ścibiorek. "Enhancing Web Application Security: Advanced Biometric Voice Verification for Two-Factor Authentication." Electronics 12, no. 18 (2023): 3791. http://dx.doi.org/10.3390/electronics12183791.
Full textSyed, Abbas Ali, Raheela Asif, Saman Hina, and Zainab Fatima. "Cloud Based Remote FPGA Lab Platform: An Application of Internet of Things." October 2018 37, no. 4 (2018): 535–44. http://dx.doi.org/10.22581/muet1982.1804.08.
Full textGiguère, Marlene. "The Internet: A Selective Annotated Bibliography of Print Material." Education Libraries 17, no. 2 (2017): 13. http://dx.doi.org/10.26443/el.v17i2.45.
Full textMattigiri, Mohan Teja, Mahabaleshwara Rao, and Shivananda Bhat K. "A Comparative Analysis of Single Sign-On and Proxy Solutions for Facilitating Remote Access to Electronic Resources in Academic Libraries." DESIDOC Journal of Library & Information Technology 45, no. 1 (2025): 16–21. https://doi.org/10.14429/djlit.19823.
Full textSrinivasan, R. "Mahindra Powerol: powering entrepreneurial growth within a corporate group." Emerald Emerging Markets Case Studies 5, no. 4 (2015): 1–13. http://dx.doi.org/10.1108/eemcs-09-2014-0235.
Full textShen, Dawei, Dongxing Pei, and Tiehua Ma. "Design of MultiChannel Parallel Dynamic Testing Virtual Instrument Based on Dynamic Measurement." Wireless Communications and Mobile Computing 2022 (February 9, 2022): 1–9. http://dx.doi.org/10.1155/2022/9936626.
Full textHuang, Chang Biao, Kai Yong Jiang, and Xi Peng Xu. "A New Approach to the Communication of the Distributed Collaborative System Based on COM+." Materials Science Forum 532-533 (December 2006): 1148–51. http://dx.doi.org/10.4028/www.scientific.net/msf.532-533.1148.
Full textWu, Zhuo Kui, and Tao Zeng. "Design of On-Off Control System for Electric Equipment Based on WiFi." Applied Mechanics and Materials 536-537 (April 2014): 1157–60. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.1157.
Full textKalimuthu, P., and A. Justin Diraviam. "Simple Authentication Technique for Session Management Using Odd and Even Pair of Random Text and Color Password in Cloud Computing." Asian Journal of Computer Science and Technology 1, no. 1 (2012): 130–34. http://dx.doi.org/10.51983/ajcst-2012.1.1.1691.
Full textBaig, Mirza Jabbar Aziz, M. Tariq Iqbal, Mohsin Jamil, and Jahangir Khan. "A Low-Cost, Open-Source Peer-to-Peer Energy Trading System for a Remote Community Using the Internet-of-Things, Blockchain, and Hypertext Transfer Protocol." Energies 15, no. 13 (2022): 4862. http://dx.doi.org/10.3390/en15134862.
Full text