Academic literature on the topic 'Use of strong authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Use of strong authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Use of strong authentication"
Ju, Seung-hwan, Hee-suk Seo, Sung-hyu Han, Jae-cheol Ryou, and Jin Kwak. "A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information." BioMed Research International 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/427542.
Full textHan, Jinho. "Fingerprint Authentication Schemes for Mobile Devices." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 3 (2015): 579. http://dx.doi.org/10.11591/ijece.v5i3.pp579-585.
Full textde Almeida, Marcone, Rafael de Sousa Júnior, Luis García Villalba, and Tai-Hoon Kim. "New DoS Defense Method Based on Strong Designated Verifier Signatures." Sensors 18, no. 9 (2018): 2813. http://dx.doi.org/10.3390/s18092813.
Full textLeaby, Akeel Kassim, A. Yassin, Mushtaq Hasson, and Abdullah Rashid. "Towards design strong emergency and COVID-19 authentication scheme in VANET." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1808. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1808-1819.
Full textZhang, LiMing, and XinGang Zhang. "New Authentication Method for Vector Geographic Data Based on Perceptual Hash." Abstracts of the ICA 1 (July 15, 2019): 1–2. http://dx.doi.org/10.5194/ica-abs-1-431-2019.
Full textAGUIAR, JONAS JOSÉ MENDES, JEAN CARLOS SANTOS, and MARIA VIRGINIA URSO-GUIMARÃES. "On the use of photography in science and taxonomy: how images can provide a basis for their own authentication." Bionomina 12, no. 1 (2017): 44–47. http://dx.doi.org/10.11646/bionomina.12.1.4.
Full textTanwar, Sarvesh, and Anil Kumar. "A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority." International Journal of Information Security and Privacy 11, no. 3 (2017): 1–14. http://dx.doi.org/10.4018/ijisp.2017070101.
Full textYU, Jiang, Jin-hai SU, and Yong-fu ZHANG. "Design and analysis of USB-Key based strong password authentication scheme." Journal of Computer Applications 31, no. 2 (2011): 511–13. http://dx.doi.org/10.3724/sp.j.1087.2011.00511.
Full textRefish, Salah H. Abbdal, and Salam Waley Shneen. "E-PAC: efficient password authentication code based RMPN method and diffie-hellman algorithm." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 1 (2020): 485. http://dx.doi.org/10.11591/ijeecs.v19.i1.pp485-491.
Full textV. Sampangi, Raghav, and Srinivas Sampalli. "RFID Mutual Authentication Protocols based on Gene Mutation and Transfer." Journal of Communications Software and Systems 9, no. 1 (2013): 44. http://dx.doi.org/10.24138/jcomss.v9i1.157.
Full textDissertations / Theses on the topic "Use of strong authentication"
Haraldsson, Emil. "Strong user authentication mechanisms." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2688.
Full textSharma, Seema. "Location Based Authentication." ScholarWorks@UNO, 2005. http://scholarworks.uno.edu/td/141.
Full textKunning, Mao. "Strong Authentication Protocol using PIV Card with Mobile Devices." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128418.
Full textLunde, Lars, and Audun Wangensteen. "Using SIM for strong end-to-end Application Authentication." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9294.
Full textEdwards, Benjamin. "On the use of Micro-Earthquakes to Predict Strong Ground-Motion." Thesis, University of Liverpool, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.490603.
Full textMezzetti, Cristian. "Progettazione e implementazione di un servizio di autenticazione a più fattori per i servizi dell'ateneo." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/9593/.
Full textCarbone, Felipe José. "Uma solução de autenticação forte para ambientes de saúde baseados em sensores." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2014. http://hdl.handle.net/10183/95674.
Full textYang, Xi. "The Use of One-Time Password and RADIUS Authentication in a GSS-API Architecture." Thesis, KTH, Kommunikationssystem, CoS, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92210.
Full textCowan, David Thomas. "Treatment of patients with chronic non-cancer pain : an investigation of strong opioid analgesic use." Thesis, King's College London (University of London), 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.396229.
Full textEdwards, Jared F. "Use of a pre-organizer and recall of the Strong Interest Inventory : does preparation improve memory? /." Available to subscribers only, 2006. http://proquest.umi.com/pqdweb?did=1212795351&sid=19&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Full textBooks on the topic "Use of strong authentication"
), National Institute of Standards and Technology (U S. Guideline for the use of advanced authentication technology alternatives. Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 1994.
Find full textComputer Systems Laborotory (U.S.), ed. Guideline for the use of advanced authentication technology alternatives. Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 1994.
Find full textLyons-Burke, Kathy. Federal agency use of public key technology for digital signatures and authentication. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.
Find full textGriffiths, José-Marie. A strong future for public library use and employment. American Library Association, 2011.
Find full textGrutter, Judith. Strong interest inventory user's guide: Practitioner's tool for understanding, interpretation, and use of the Strong profile and interpretive report. CPP, 2005.
Find full textCampbell, Andrew, 1950 Aug. 3- and Koch Richard 1950-, eds. Breakup!: How companies use spin-offs to gain focus and grow strong. Free Press, 1997.
Find full textStatus of Women Council of the Northwest Territories. Keeping women and communities strong: Women, substance abuse and FAS/FAE : an NWT needs assessment. The Council, 1996.
Find full textUlrich, Gail. Herbs to boost immunity: Herbal tonics to keep you healthy and strong including echinacea, Siberian ginseng, astragalus, and more. Keats Pub., 1997.
Find full textAlberta Alcohol and Drug Abuse Commission. Own your zone: Strong, smart and addiction-free : lesson plans. Alberta Alcohol and Drug Abuse Commission, 2002.
Find full textBook chapters on the topic "Use of strong authentication"
Lee, Jong-hu, and Jae-cheol Ryou. "Strong User Authentication in IEEE802.11 Wireless LAN." In Web and Communication Technologies and Internet-Related Social Issues — HSI 2003. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-45036-x_68.
Full textSchwartz, Michael, and Maciej Machulak. "Strong Authentication." In Securing the Perimeter. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-2601-8_7.
Full textBinu, Sumitra, Mohammed Misbahuddin, and Pethuru Raj. "A Strong Single Sign-on User Authentication Scheme Using Mobile Token Without Verifier Table for Cloud Based Services." In Computer and Network Security Essentials. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_14.
Full textAvoine, Gildas, Xavier Carpent, and Benjamin Martin. "Strong Authentication and Strong Integrity (SASI) Is Not That Strong." In Radio Frequency Identification: Security and Privacy Issues. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16822-2_5.
Full textSuoranta, Sanna, André Andrade, and Tuomas Aura. "Strong Authentication with Mobile Phone." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33383-5_5.
Full textSuoranta, Sanna, Lari Haataja, and Tuomas Aura. "Electronic Citizen Identities and Strong Authentication." In Secure IT Systems. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26502-5_16.
Full textTuyls, Pim, and Boris Škorić. "Strong Authentication with Physical Unclonable Functions." In Security, Privacy, and Trust in Modern Data Management. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-69861-6_10.
Full textClarke, Nathan. "Current Use of User Authentication." In Transparent User Authentication. Springer London, 2011. http://dx.doi.org/10.1007/978-0-85729-805-8_1.
Full textNolan, Deborah, and Duncan Temple Lang. "Authentication for Web Services via OAuth." In Use R! Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7900-0_13.
Full textChang, Ya-Fen, and Chin-Chen Chang. "An Improvement on Strong-Password Authentication Protocols." In Embedded Software and Systems. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11599555_60.
Full textConference papers on the topic "Use of strong authentication"
Choudhury, Amlan Jyoti, Pardeep Kumar, Mangal Sain, Hyotaek Lim, and Hoon Jae-Lee. "A Strong User Authentication Framework for Cloud Computing." In 2011 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2011. http://dx.doi.org/10.1109/apscc.2011.14.
Full textLiu, Yanfei, Ziming Zhao, Hui Li, Qun Luo, and Yixian Yang. "An Efficient Remote User Authentication Scheme with Strong Anonymity." In 2008 International Conference on Cyberworlds (CW). IEEE, 2008. http://dx.doi.org/10.1109/cw.2008.23.
Full textWei-Chi Ku and Maw-Jinn Tsaur. "A Remote User Authentication Scheme Using Strong Graphical Passwords." In The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l. IEEE, 2005. http://dx.doi.org/10.1109/lcn.2005.16.
Full textKambou, Samy, and Ahmed Bouabdallah. "Improving Strong Mobile Authentication with Structural Diversity and User-Friendliness." In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2019. http://dx.doi.org/10.1109/ntms.2019.8763821.
Full textLatze, Carolin, Ulrich Ultes-Nitsche, and Florian Baumgartner. "Strong mutual authentication in a user-friendly way in EAP-TLS." In 2007 15th International Conference on Software, Telecommunications and Computer Networks. IEEE, 2007. http://dx.doi.org/10.1109/softcom.2007.4446137.
Full textYu, Jiang, and Chuan-fu Zhang. "Design and Analysis of a USB-Key Based Strong Password Authentication Scheme." In 2010 International Conference on Computational Intelligence and Software Engineering (CiSE). IEEE, 2010. http://dx.doi.org/10.1109/cise.2010.5676914.
Full textXu, Chengbo. "Cryptanalysis of a strong authentication scheme with user privacy for wireless sensor networks." In 2016 4th International Conference on Sensors, Mechatronics and Automation (ICSMA 2016). Atlantis Press, 2016. http://dx.doi.org/10.2991/icsma-16.2016.76.
Full textKayode Alese, Boniface, Adewumi Adewale Omojowo, Tosin Akinwale Adesuyi, Aderonke Favour-Bethy Thompson, Sunday Olumide Adewale, and Festus A. Osuolale. "An Enhanced Graphical Password Technique Using Fake Pointers." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2221.
Full textJiang Huiping. "Strong password authentication protocols." In 2010 4th International Conference on Distance Learning and Education (ICDLE). IEEE, 2010. http://dx.doi.org/10.1109/icdle.2010.5606044.
Full textDostalek, Libor, and Jiri Safarik. "Strong password authentication with AKA authentication mechanism." In 2017 International Conference on Applied Electronics (AE). IEEE, 2017. http://dx.doi.org/10.23919/ae.2017.8053581.
Full textReports on the topic "Use of strong authentication"
Selander, G., M. Mani, and S. Kumar. Use Cases for Authentication and Authorization in Constrained Environments. Edited by L. Seitz and S. Gerdes. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7744.
Full textBarnes, R. Use Cases and Requirements for DNS-Based Authentication of Named Entities (DANE). RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6394.
Full textLyons-Burke, Kathy. Federal agency use of public key technology for digital signatures and authentication. National Institute of Standards and Technology, 2000. http://dx.doi.org/10.6028/nist.sp.800-25.
Full textMcGrew, D., and J. Viega. The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4543.
Full textDeKok, A. Use of Status-Server Packets in the Remote Authentication Dial In User Service (RADIUS) Protocol. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5997.
Full textWeis, B. The Use of RSA/SHA-1 Signatures within Encapsulating Security Payload (ESP) and Authentication Header (AH). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4359.
Full textVan Gundy, Karen, and Meghan Mills. Teen stress and substance use problems in Coös: Survey shows strong community attachment can offset risk. University of New Hampshire Libraries, 2011. http://dx.doi.org/10.34051/p/2020.153.
Full textBaugher, M., and E. Carrara. The Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in the Secure Real-time Transport Protocol (SRTP). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4383.
Full textRoca, V., A. Francillon, and S. Faurite. Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) Protocols. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5776.
Full textKostarakos, Ilias, and Petros Varthalitis. Effective tax rates in Ireland. ESRI, 2020. http://dx.doi.org/10.26504/rs110.
Full text