Journal articles on the topic 'Single Sign-On'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Single Sign-On.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shaer, Caroline. "Single sign-on." Network Security 1995, no. 8 (1995): 11–15. http://dx.doi.org/10.1016/1353-4858(96)89743-1.
Full textPandey, Prashant, and T. N. Nisha. "Challenges in Single Sign-On." Journal of Physics: Conference Series 1964, no. 4 (2021): 042016. http://dx.doi.org/10.1088/1742-6596/1964/4/042016.
Full textOrmancey, E. "CERN single sign on solution." Journal of Physics: Conference Series 119, no. 8 (2008): 082008. http://dx.doi.org/10.1088/1742-6596/119/8/082008.
Full textTing, David. "Biometrics and single sign-on." Biometric Technology Today 13, no. 8 (2005): 8–9. http://dx.doi.org/10.1016/s0969-4765(05)70387-8.
Full textRoßnagel, Heiko, and Jan Zibuschka. "Single Sign On mit Signaturen." Datenschutz und Datensicherheit - DuD 30, no. 12 (2006): 773–77. http://dx.doi.org/10.1007/s11623-006-0238-7.
Full textMeyer, Helen. "Servers get single sign-on." Computers & Security 15, no. 4 (1996): 318. http://dx.doi.org/10.1016/0167-4048(96)88945-0.
Full textKim, Hyun-Jin, and Im-Yeong Lee. "A Study on Secure and Improved Single Sign-On Authentication System against Replay Attack." Journal of the Korea Institute of Information Security and Cryptology 24, no. 5 (2014): 769–80. http://dx.doi.org/10.13089/jkiisc.2014.24.5.769.
Full textSuhartanta, I. Wayan Manik, and Nyoman Putra Sastra. "Survey Tingkat Penggunaan Single Sign On pada 500 Situs Peringkat Teratas Alexa.com." Majalah Ilmiah Teknologi Elektro 16, no. 1 (2017): 49–52. http://dx.doi.org/10.24843/mite.1601.07.
Full textLei, Wen, Xing Jian Liang, and Hong Zhang. "Design on a Single Sign-On Scheme." Applied Mechanics and Materials 40-41 (November 2010): 531–36. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.531.
Full textFink, Glenn, and Ivan Miller. "Digital Afterthoughts on Single Sign-on Technology." Emergency Medicine News 29, no. 4 (2007): 20–21. http://dx.doi.org/10.1097/01.eem.0000269590.03994.0b.
Full textRadha, V., and D. Hitha Reddy. "A Survey on Single Sign-On Techniques." Procedia Technology 4 (2012): 134–39. http://dx.doi.org/10.1016/j.protcy.2012.05.019.
Full textMir, Omid, Michael Roland, and René Mayrhofer. "Decentralized, Privacy-Preserving, Single Sign-On." Security and Communication Networks 2022 (January 22, 2022): 1–18. http://dx.doi.org/10.1155/2022/9983995.
Full textLin, Ping, Sunil Menon, Shailesh Patel, and Lin Lin. "Single Sign-On for Unified Communications." International Journal of Intelligent Computing Research 3, no. 3 (2012): 255–62. http://dx.doi.org/10.20533/ijicr.2042.4655.2012.0033.
Full textGoldis, Peter D. "Single Sign-on: Problems and Solutions." Information Systems Security 4, no. 2 (1995): 42–54. http://dx.doi.org/10.1080/10658989509342498.
Full textGoth, G. "Single Sign-on and Social Networks." IEEE Distributed Systems Online 9, no. 12 (2008): 1. http://dx.doi.org/10.1109/mdso.2008.35.
Full textHardy, Gary. "The truth behind single sign-on." Information Security Technical Report 1, no. 2 (1996): 46–55. http://dx.doi.org/10.1016/s1363-4127(97)89356-9.
Full textDai, Guiping, and Yong Wang. "Single Sign-On Under Quantum Cryptography." International Journal of Theoretical Physics 53, no. 1 (2013): 188–93. http://dx.doi.org/10.1007/s10773-013-1796-8.
Full textWANG, Guo-wei, and Man-jun XUE. "Token-based cross domain single sign on." Journal of Computer Applications 32, no. 6 (2013): 1766–68. http://dx.doi.org/10.3724/sp.j.1087.2012.01766.
Full textAishwarya U et al.,, Aishwarya U. et al ,. "Review of Single Sign-On Authentication Framework." International Journal of Mechanical and Production Engineering Research and Development 10, no. 3 (2020): 4387–94. http://dx.doi.org/10.24247/ijmperdjun2020417.
Full textGellert, George A., Ricardo Ramirez, Walter J. Jacobs, and Gabriel Maciaz. "Electronic Health Record Workstation Single Sign-on." JONA: The Journal of Nursing Administration 50, no. 9 (2020): 462–67. http://dx.doi.org/10.1097/nna.0000000000000917.
Full textBeltran, Victoria. "Characterization of web single sign-on protocols." IEEE Communications Magazine 54, no. 7 (2016): 24–30. http://dx.doi.org/10.1109/mcom.2016.7514160.
Full textChinitz, Jonathan. "Single Sign-On: Is It Really Possible?" Information Systems Security 9, no. 3 (2000): 1–14. http://dx.doi.org/10.1201/1086/43310.9.3.20000708/31359.5.
Full textMansfield-Devine, Steve. "Single Sign-On: matching convenience with security." Biometric Technology Today 2011, no. 7 (2011): 7–11. http://dx.doi.org/10.1016/s0969-4765(11)70134-5.
Full textGuntoro, Guntoro, and Muhammad Fikri. "Perancangan Aplikasi Single Sign-On Menggunakan Autentikasi Gambar." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 9, no. 1 (2018): 12–21. http://dx.doi.org/10.31849/digitalzone.v9i1.648.
Full textGuntoro, Guntoro, and Muhammad Fikri. "Perancangan Aplikasi Single Sign-On Menggunakan Autentikasi Gambar." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 9, no. 1 (2018): 12–21. http://dx.doi.org/10.31849/dz.v9i1.648.
Full textI, Putu Arie Pratama, Linawati, and Putra Sastra Nyoman. "Token-based Single Sign-on with JWT as Information System Dashboard for Government." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 4 (2018): 1745–51. https://doi.org/10.12928/TELKOMNIKA.v16i4.8388.
Full textYinglan, Fang, Jin Hao, and Han Bing. "Single Sign-On Research and Expansion Based On CAS." Open Cybernetics & Systemics Journal 8, no. 1 (2015): 200–207. http://dx.doi.org/10.2174/1874110x01408010200.
Full textRamamoorthi, Lokesh Saravanan, and Dilip Sarkar. "Single Sign-On: A Solution Approach to Address Inefficiencies During Sign-Out Process." IEEE Access 8 (2020): 195675–91. http://dx.doi.org/10.1109/access.2020.3033570.
Full textAhmad, Adeel, Asier Aguado Corman, Maria Fava, et al. "The new (and improved!) CERN Single-Sign-On." EPJ Web of Conferences 251 (2021): 02015. http://dx.doi.org/10.1051/epjconf/202125102015.
Full text., Priyanka Patil. "CROSS CLOUD SINGLE SIGN ON (SSO) USING TOKENS." International Journal of Research in Engineering and Technology 03, no. 02 (2014): 308–11. http://dx.doi.org/10.15623/ijret.2014.0302055.
Full textV. Thomas, Manoj, Anand Dhole, and K. Chandrasekaran. "Single Sign-On in Cloud Federation using CloudSim." International Journal of Computer Network and Information Security 7, no. 6 (2015): 50–58. http://dx.doi.org/10.5815/ijcnis.2015.06.06.
Full textMüller, Johannes, and Jan Oupický. "Post-quantum XML and SAML Single Sign-On." Proceedings on Privacy Enhancing Technologies 2024, no. 4 (2024): 525–43. http://dx.doi.org/10.56553/popets-2024-0128.
Full textSuriadi, Suriadi, Ernest Foo, and Audun Jøsang. "A user-centric federated single sign-on system." Journal of Network and Computer Applications 32, no. 2 (2009): 388–401. http://dx.doi.org/10.1016/j.jnca.2008.02.016.
Full textHan, Jinguang, Liqun Chen, Steve Schneider, Helen Treharne, Stephan Wesemeyer, and Nick Wilson. "Anonymous Single Sign-On With Proxy Re-Verification." IEEE Transactions on Information Forensics and Security 15 (2020): 223–36. http://dx.doi.org/10.1109/tifs.2019.2919926.
Full textSun, San-Tsai, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, and Konstantin Beznosov. "Investigating Users’ Perspectives of Web Single Sign-On." ACM Transactions on Internet Technology 13, no. 1 (2013): 1–35. http://dx.doi.org/10.1145/2532639.
Full textDai, Guiping, and Yong Wang. "A Non-entanglement Quantum Single Sign-On Solution." International Journal of Theoretical Physics 53, no. 4 (2013): 1143–49. http://dx.doi.org/10.1007/s10773-013-1909-4.
Full textDai, Guiping, and Yong Wang. "A Non-Entanglement Quantum Single Sign-On Protocol." International Journal of Theoretical Physics 53, no. 8 (2014): 2587–92. http://dx.doi.org/10.1007/s10773-014-2057-1.
Full textKroschewski, Maximilian, Anja Lehmann, and Cavit Özbay. "OPPID: Single Sign-On with Oblivious Pairwise Pseudonyms." Proceedings on Privacy Enhancing Technologies 2025, no. 2 (2025): 629–49. https://doi.org/10.56553/popets-2025-0080.
Full textBazaz, Tayibia, and Aqeel Khalique. "A Review on Single Sign on Enabling Technologies and Protocols." International Journal of Computer Applications 151, no. 11 (2016): 18–25. http://dx.doi.org/10.5120/ijca2016911938.
Full textMecca, Giansalvatore, Michele Santomauro, Donatello Santoro, and Enzo Veltri. "On federated single sign-on in e-government interoperability frameworks." International Journal of Electronic Governance 8, no. 1 (2016): 6. http://dx.doi.org/10.1504/ijeg.2016.076684.
Full textRen, Xingtian, Yong Wang, and Guiping Dai. "A Quantum Single Sign-On Protocol Based on GHZ States." International Journal of Theoretical Physics 54, no. 10 (2015): 3733–38. http://dx.doi.org/10.1007/s10773-015-2611-5.
Full textS.Kom, M.T.I, Khanna Tiara, Fella Megita Putri, and Heni Triyani. "Optimalisasi Single Sign On Untuk Meningkatkan Sistem Keamanan OJRS+." Technomedia Journal 1, no. 2 (2017): 61–75. http://dx.doi.org/10.33050/tmj.v1i2.50.
Full textKakizaki, Yoshio, Kazunari Maeda, and Keiichi Iwamura. "Identifier Migration for Identity Continuance in Single Sign-On." Journal of Information Security 03, no. 04 (2012): 307–13. http://dx.doi.org/10.4236/jis.2012.34037.
Full textPfitzmann, B., and M. Waidner. "Analysis of liberty single-sign-on with enabled clients." IEEE Internet Computing 7, no. 6 (2003): 38–44. http://dx.doi.org/10.1109/mic.2003.1250582.
Full textFan, Li. "Design of A Ticket-Based Single Sign-On Protocol." Procedia Engineering 23 (2011): 537–42. http://dx.doi.org/10.1016/j.proeng.2011.11.2544.
Full textLordan, F., J. Jensen, and R. M. Badia. "Towards Mobile Cloud Computing with Single Sign-on Access." Journal of Grid Computing 16, no. 4 (2017): 627–46. http://dx.doi.org/10.1007/s10723-017-9413-3.
Full textHarding, P., L. Johansson, and N. Klingenstein. "Dynamic Security Assertion Markup Language: Simplifying Single Sign-On." IEEE Security & Privacy Magazine 6, no. 2 (2008): 83–85. http://dx.doi.org/10.1109/msp.2008.31.
Full textGellert, George A., John F. Crouch, Lynn A. Gibson, George S. Conklin, S. Luke Webster, and John A. Gillean. "Clinical impact and value of workstation single sign-on." International Journal of Medical Informatics 101 (May 2017): 131–36. http://dx.doi.org/10.1016/j.ijmedinf.2017.02.008.
Full text., K. karthika. "SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT." International Journal of Research in Engineering and Technology 03, no. 19 (2014): 137–41. http://dx.doi.org/10.15623/ijret.2014.0319026.
Full textLiu, Xing, Jiqiang Liu, Wei Wang, and Sencun Zhu. "Android single sign-on security: Issues, taxonomy and directions." Future Generation Computer Systems 89 (December 2018): 402–20. http://dx.doi.org/10.1016/j.future.2018.06.049.
Full text