Academic literature on the topic 'Use of strong authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Use of strong authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Use of strong authentication"

1

Ju, Seung-hwan, Hee-suk Seo, Sung-hyu Han, Jae-cheol Ryou, and Jin Kwak. "A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information." BioMed Research International 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/427542.

Full text
Abstract:
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But
APA, Harvard, Vancouver, ISO, and other styles
2

Han, Jinho. "Fingerprint Authentication Schemes for Mobile Devices." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 3 (2015): 579. http://dx.doi.org/10.11591/ijece.v5i3.pp579-585.

Full text
Abstract:
In certain applications, fingerprint authentication systems require templates to be stored in databases. The possible leakage of these fingerprint templates can lead to serious security and privacy threats. Therefore, with the frequent use of fingerprint authentication on mobile devices, it has become increasingly important to keep fingerprint data safe. Due to rapid developments in optical equipment, biometric systems are now able to gain the same biometric images repeatedly, so strong features can be selected with precision. Strong features refer to high-quality features which can be easily
APA, Harvard, Vancouver, ISO, and other styles
3

de Almeida, Marcone, Rafael de Sousa Júnior, Luis García Villalba, and Tai-Hoon Kim. "New DoS Defense Method Based on Strong Designated Verifier Signatures." Sensors 18, no. 9 (2018): 2813. http://dx.doi.org/10.3390/s18092813.

Full text
Abstract:
We present a novel technique for source authentication of a packet stream in a network, which intends to give guarantees that a specific network flow really comes from a claimed origin. This mechanism, named packet level authentication (PLA), can be an essential tool for addressing Denial of Service (DoS) attacks. Based on designated verifier signature schemes, our proposal is an appropriate and unprecedented solution applying digital signatures for DoS prevention. Our scheme does not rely on an expensive public-key infrastructure and makes use of light cryptography machinery that is suitable
APA, Harvard, Vancouver, ISO, and other styles
4

Leaby, Akeel Kassim, A. Yassin, Mushtaq Hasson, and Abdullah Rashid. "Towards design strong emergency and COVID-19 authentication scheme in VANET." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1808. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1808-1819.

Full text
Abstract:
The wide use of vehicular ad hoc networks (VANETs) in the last decade hasled many researchers to find efficient and reliable methods to obtain the desired benefits and offer services, such as healthcare and traffic management. However, VANETs suffer from security issues represented by authentication and data integrity. In thispaper, we propose a robust mutual authentication scheme based on elliptic curve cryptography (ECC), cryptography hash function, and a pseudonym. The proposed work was twofold in focus: first, on healthcare in emergency cars which use VANETs, and second, on overcoming secu
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, LiMing, and XinGang Zhang. "New Authentication Method for Vector Geographic Data Based on Perceptual Hash." Abstracts of the ICA 1 (July 15, 2019): 1–2. http://dx.doi.org/10.5194/ica-abs-1-431-2019.

Full text
Abstract:
<p><strong>Abstract.</strong> In the Internet era, vector data can conveniently be stored, distributed and disseminated. This make it convenience for people to use them, and also make it easier for people to edit or modify them, which can reduce the credibility of Geo-information. Traditionally, authentication is done by using a hash function to generate a digital signature for data authentication. However, this method is very sensitive for change even one bit and it is appropriate for accurate authentication such as text. For geographic data, it may experience lossy compress
APA, Harvard, Vancouver, ISO, and other styles
6

AGUIAR, JONAS JOSÉ MENDES, JEAN CARLOS SANTOS, and MARIA VIRGINIA URSO-GUIMARÃES. "On the use of photography in science and taxonomy: how images can provide a basis for their own authentication." Bionomina 12, no. 1 (2017): 44–47. http://dx.doi.org/10.11646/bionomina.12.1.4.

Full text
Abstract:
Photography has, since its inception, significantly contributed as a tool to many areas of scientific research and consequently, has been able to achieve a high level of prestige in the scientific field. In recent years, there has been an increasing debate within the scientific community regarding the need for the deposition of type specimens when describing new species. Recently, Marshall & Evenhuis (2015) described a new species of Diptera, based exclusively on a few photographs. Even if one withholds judgement about whether the photographs used present sufficient characteristics for the
APA, Harvard, Vancouver, ISO, and other styles
7

Tanwar, Sarvesh, and Anil Kumar. "A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority." International Journal of Information Security and Privacy 11, no. 3 (2017): 1–14. http://dx.doi.org/10.4018/ijisp.2017070101.

Full text
Abstract:
PKI offers authentication via digital certificates, which are signed and provided by Certificate Authority (CA). A certificate can be signed by single CA or multiple CAs. A document signed by multiple CAs has less probability to be forged as compared to signed by a single CA. CA is a single point of failure, if CA issue forged certificate intentionally or maliciously the whole PKI system effected. Still PKI ensures a secure method for exchanging sensitive information over unsecured channels through the use of cryptographic public private key pair, issued by Certification Authority (CA) but eve
APA, Harvard, Vancouver, ISO, and other styles
8

YU, Jiang, Jin-hai SU, and Yong-fu ZHANG. "Design and analysis of USB-Key based strong password authentication scheme." Journal of Computer Applications 31, no. 2 (2011): 511–13. http://dx.doi.org/10.3724/sp.j.1087.2011.00511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Refish, Salah H. Abbdal, and Salam Waley Shneen. "E-PAC: efficient password authentication code based RMPN method and diffie-hellman algorithm." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 1 (2020): 485. http://dx.doi.org/10.11591/ijeecs.v19.i1.pp485-491.

Full text
Abstract:
<p>Users need more efficient and more secure when they use the Internet. Password authentication code (PAC) is the critical issue in many applications such as web-sites and data base systems etc. In this paper, PAC between two users to confirm authentication between them based two factors has presented.. Two factors is the most good solution in this field. A legitimate user needs to make sure about his partner to ensure their communication. So, this solution produces two important algorithms, the first one is utilized the Diffie-Hellman which considered the base of this work. The second
APA, Harvard, Vancouver, ISO, and other styles
10

V. Sampangi, Raghav, and Srinivas Sampalli. "RFID Mutual Authentication Protocols based on Gene Mutation and Transfer." Journal of Communications Software and Systems 9, no. 1 (2013): 44. http://dx.doi.org/10.24138/jcomss.v9i1.157.

Full text
Abstract:
Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to a range of security attacks. Such vulnerability often results in the loss of privacy of the tag owner and other attacks on tags. Previous research in RFID security has mainly focused on authenticating entities such as readers / servers, which communicate with the tag. Any security mechanism is only
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Use of strong authentication"

1

Haraldsson, Emil. "Strong user authentication mechanisms." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2688.

Full text
Abstract:
<p>For Siemens Industrial Turbomachinery to meet its business objectives a modular authentication concept has to be implemented. Such a mechanism must be cost- effective while providing a well-balanced level of security, easy maintenance and be as user-friendly as possible. </p><p>Authenticating users securely involves the combination of two fields, theory of authentication mechanisms in information systems and human computer interaction. To construct a strong user authentication system the correlations of these fields has to be understood and provide guidance in the design. </p><p>Strong user
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Seema. "Location Based Authentication." ScholarWorks@UNO, 2005. http://scholarworks.uno.edu/td/141.

Full text
Abstract:
With the growth of wireless technologies in sectors like the military, aviation, etc, there is a need to determine the authenticity of a genuine user. Today's conventional authentication mechanisms are based on three factors: knowledge, possession and biometrics. These factors are prone to theft, hardware failure, expensive, etc. Consequently, there is a need of a stronger solution. One such solution is Location Based Authentication that considers the location information of a user. The location information is time based and thus hard to steal. However, accuracy of the GPS, signal str
APA, Harvard, Vancouver, ISO, and other styles
3

Kunning, Mao. "Strong Authentication Protocol using PIV Card with Mobile Devices." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128418.

Full text
Abstract:
Nowadays weak single-factor authentication mechanisms like passwords or passphrases are commonly used. Static passwords are easy to use, just remember them in mind. However it has many security weaknesses and even strong passwords are not strong enough. For example, strong secrets are difficult to remember, and people tend to share authentication credentials across systems, which reduce the overall security tremendously. Thus, for security sensitive environment we need strong multi-factors authentication. Smart card based certificate strong authentication solution can be used as a replacement
APA, Harvard, Vancouver, ISO, and other styles
4

Lunde, Lars, and Audun Wangensteen. "Using SIM for strong end-to-end Application Authentication." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9294.

Full text
Abstract:
<p>Today the Internet is mostly used for services that require low or none security. The commercial and governmental applications have started to emerge but met problems since they require strong authentication, which is both difficult and costly to realize. The SIM card used in mobile phones is a tamper resistant device that contains strong authentication mechanisms. It would be very convenient and cost-efficient if Internet services could use authentication methods based on the SIM. This master thesis presents an analysis and a design of a generic authentication system based on SIM, togethe
APA, Harvard, Vancouver, ISO, and other styles
5

Edwards, Benjamin. "On the use of Micro-Earthquakes to Predict Strong Ground-Motion." Thesis, University of Liverpool, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.490603.

Full text
Abstract:
Since the prediction of earthquakes is, at least at present. not possible, the understanding of energy propagation from an earthquake is important in terms of mitigating structural and human losses. The physical manifestation of an earthquake is ground shaking and it is this that ultimately causes structural failure, and in the worst case scenario. loss of life. A commonly used measure of damage likelihood to a particular structure is the peak ground acceleration or velocity (PGA or PGV respectively). Typically. the prediction of PGA and PGV from a particular earthquake scenario is performed t
APA, Harvard, Vancouver, ISO, and other styles
6

Mezzetti, Cristian. "Progettazione e implementazione di un servizio di autenticazione a più fattori per i servizi dell'ateneo." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/9593/.

Full text
Abstract:
I sistemi di autenticazione con secondo fattore permettono una migliore protezione dell'identità digitale degli utenti. Questo lavoro descrive l'analisi e progettazione della soluzione di autenticazione a più fattori da integrare nel sistema di Ateneo, conclusasi con lo sviluppo del modulo di integrazione tra il servizio di autenticazione Web Single Sign-On dell'Università di Bologna (ADFS 3.0) e la piattaforma scelta per la fornitura (Time4ID). L'integrazione è stata effettuata programmando un Authentication Provider, costituito da una libreria di integrazione scritta in C#, capace di integr
APA, Harvard, Vancouver, ISO, and other styles
7

Carbone, Felipe José. "Uma solução de autenticação forte para ambientes de saúde baseados em sensores." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2014. http://hdl.handle.net/10183/95674.

Full text
Abstract:
Equipamentos médicos equipados com interface de rede, classificados como sensores, transmitem informações sensíveis sobre a rede, constituindo uma rede de sensores. Essa rede pode ser utilizada para o acompanhamento remoto de pacientes a domicílio, com a finalidade de propiciar comodidade ao paciente. As informações provenientes desses sensores são vulneráveis, necessitando assim de fortes mecanismos de segurança. Devido às vulnerabilidades, métodos mais eficazes de autenticação vêm sendo desenvolvidos. Porém, as soluções de autenticação existentes obrigam a interação direta dos usuários com o
APA, Harvard, Vancouver, ISO, and other styles
8

Yang, Xi. "The Use of One-Time Password and RADIUS Authentication in a GSS-API Architecture." Thesis, KTH, Kommunikationssystem, CoS, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92210.

Full text
Abstract:
The Generic Security Service Application Program Interface (GSS-API) is an architecture that facilitates applications using distributed security services in a mechanism-independent fashion. GSS-API is supported by various underlying mechanisms and technologies such as Kerberos version 5 and public-key technologies. However, no one-time password based GSS-API mechanism existed. This thesis focuses on an investigation using one-time passwords together with RADIUS authentication as a protection facility for a GSS-API mechanism. This thesis presents a security architecture using one-time passwords
APA, Harvard, Vancouver, ISO, and other styles
9

Cowan, David Thomas. "Treatment of patients with chronic non-cancer pain : an investigation of strong opioid analgesic use." Thesis, King's College London (University of London), 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.396229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Edwards, Jared F. "Use of a pre-organizer and recall of the Strong Interest Inventory : does preparation improve memory? /." Available to subscribers only, 2006. http://proquest.umi.com/pqdweb?did=1212795351&sid=19&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Use of strong authentication"

1

), National Institute of Standards and Technology (U S. Guideline for the use of advanced authentication technology alternatives. Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Computer Systems Laborotory (U.S.), ed. Guideline for the use of advanced authentication technology alternatives. Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lyons-Burke, Kathy. Federal agency use of public key technology for digital signatures and authentication. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Griffiths, José-Marie. A strong future for public library use and employment. American Library Association, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Grutter, Judith. Strong interest inventory user's guide: Practitioner's tool for understanding, interpretation, and use of the Strong profile and interpretive report. CPP, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Campbell, Andrew, 1950 Aug. 3- and Koch Richard 1950-, eds. Breakup!: How companies use spin-offs to gain focus and grow strong. Free Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

The strong arm of the law: Armed and public-order policing. Clarendon Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Status of Women Council of the Northwest Territories. Keeping women and communities strong: Women, substance abuse and FAS/FAE : an NWT needs assessment. The Council, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ulrich, Gail. Herbs to boost immunity: Herbal tonics to keep you healthy and strong including echinacea, Siberian ginseng, astragalus, and more. Keats Pub., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alberta Alcohol and Drug Abuse Commission. Own your zone: Strong, smart and addiction-free : lesson plans. Alberta Alcohol and Drug Abuse Commission, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Use of strong authentication"

1

Lee, Jong-hu, and Jae-cheol Ryou. "Strong User Authentication in IEEE802.11 Wireless LAN." In Web and Communication Technologies and Internet-Related Social Issues — HSI 2003. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-45036-x_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schwartz, Michael, and Maciej Machulak. "Strong Authentication." In Securing the Perimeter. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-2601-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Binu, Sumitra, Mohammed Misbahuddin, and Pethuru Raj. "A Strong Single Sign-on User Authentication Scheme Using Mobile Token Without Verifier Table for Cloud Based Services." In Computer and Network Security Essentials. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Avoine, Gildas, Xavier Carpent, and Benjamin Martin. "Strong Authentication and Strong Integrity (SASI) Is Not That Strong." In Radio Frequency Identification: Security and Privacy Issues. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16822-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Suoranta, Sanna, André Andrade, and Tuomas Aura. "Strong Authentication with Mobile Phone." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33383-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Suoranta, Sanna, Lari Haataja, and Tuomas Aura. "Electronic Citizen Identities and Strong Authentication." In Secure IT Systems. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26502-5_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tuyls, Pim, and Boris Škorić. "Strong Authentication with Physical Unclonable Functions." In Security, Privacy, and Trust in Modern Data Management. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-69861-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Clarke, Nathan. "Current Use of User Authentication." In Transparent User Authentication. Springer London, 2011. http://dx.doi.org/10.1007/978-0-85729-805-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nolan, Deborah, and Duncan Temple Lang. "Authentication for Web Services via OAuth." In Use R! Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7900-0_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chang, Ya-Fen, and Chin-Chen Chang. "An Improvement on Strong-Password Authentication Protocols." In Embedded Software and Systems. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11599555_60.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Use of strong authentication"

1

Choudhury, Amlan Jyoti, Pardeep Kumar, Mangal Sain, Hyotaek Lim, and Hoon Jae-Lee. "A Strong User Authentication Framework for Cloud Computing." In 2011 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2011. http://dx.doi.org/10.1109/apscc.2011.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Yanfei, Ziming Zhao, Hui Li, Qun Luo, and Yixian Yang. "An Efficient Remote User Authentication Scheme with Strong Anonymity." In 2008 International Conference on Cyberworlds (CW). IEEE, 2008. http://dx.doi.org/10.1109/cw.2008.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wei-Chi Ku and Maw-Jinn Tsaur. "A Remote User Authentication Scheme Using Strong Graphical Passwords." In The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l. IEEE, 2005. http://dx.doi.org/10.1109/lcn.2005.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kambou, Samy, and Ahmed Bouabdallah. "Improving Strong Mobile Authentication with Structural Diversity and User-Friendliness." In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2019. http://dx.doi.org/10.1109/ntms.2019.8763821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Latze, Carolin, Ulrich Ultes-Nitsche, and Florian Baumgartner. "Strong mutual authentication in a user-friendly way in EAP-TLS." In 2007 15th International Conference on Software, Telecommunications and Computer Networks. IEEE, 2007. http://dx.doi.org/10.1109/softcom.2007.4446137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yu, Jiang, and Chuan-fu Zhang. "Design and Analysis of a USB-Key Based Strong Password Authentication Scheme." In 2010 International Conference on Computational Intelligence and Software Engineering (CiSE). IEEE, 2010. http://dx.doi.org/10.1109/cise.2010.5676914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xu, Chengbo. "Cryptanalysis of a strong authentication scheme with user privacy for wireless sensor networks." In 2016 4th International Conference on Sensors, Mechatronics and Automation (ICSMA 2016). Atlantis Press, 2016. http://dx.doi.org/10.2991/icsma-16.2016.76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kayode Alese, Boniface, Adewumi Adewale Omojowo, Tosin Akinwale Adesuyi, Aderonke Favour-Bethy Thompson, Sunday Olumide Adewale, and Festus A. Osuolale. "An Enhanced Graphical Password Technique Using Fake Pointers." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2221.

Full text
Abstract:
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the determination of a user being allowed access to a resource(s) is done cautiously. Alphanumeric password has been used for authentication, however, it is inherently limited. Graphical password is a possible alternative. Consequently, this paper designs a new graphical password technique based on images, rather than alphanumeric strings. Although, graphical password technique is more secure than textual password. It is al
APA, Harvard, Vancouver, ISO, and other styles
9

Jiang Huiping. "Strong password authentication protocols." In 2010 4th International Conference on Distance Learning and Education (ICDLE). IEEE, 2010. http://dx.doi.org/10.1109/icdle.2010.5606044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dostalek, Libor, and Jiri Safarik. "Strong password authentication with AKA authentication mechanism." In 2017 International Conference on Applied Electronics (AE). IEEE, 2017. http://dx.doi.org/10.23919/ae.2017.8053581.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Use of strong authentication"

1

Selander, G., M. Mani, and S. Kumar. Use Cases for Authentication and Authorization in Constrained Environments. Edited by L. Seitz and S. Gerdes. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Barnes, R. Use Cases and Requirements for DNS-Based Authentication of Named Entities (DANE). RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lyons-Burke, Kathy. Federal agency use of public key technology for digital signatures and authentication. National Institute of Standards and Technology, 2000. http://dx.doi.org/10.6028/nist.sp.800-25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

McGrew, D., and J. Viega. The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

DeKok, A. Use of Status-Server Packets in the Remote Authentication Dial In User Service (RADIUS) Protocol. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Weis, B. The Use of RSA/SHA-1 Signatures within Encapsulating Security Payload (ESP) and Authentication Header (AH). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Van Gundy, Karen, and Meghan Mills. Teen stress and substance use problems in Coös: Survey shows strong community attachment can offset risk. University of New Hampshire Libraries, 2011. http://dx.doi.org/10.34051/p/2020.153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Baugher, M., and E. Carrara. The Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in the Secure Real-time Transport Protocol (SRTP). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4383.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Roca, V., A. Francillon, and S. Faurite. Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) Protocols. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kostarakos, Ilias, and Petros Varthalitis. Effective tax rates in Ireland. ESRI, 2020. http://dx.doi.org/10.26504/rs110.

Full text
Abstract:
This article provides estimates of the effective tax rates in Ireland for the 1995-2017 period. We use these aggregate tax indicators to compare the developments in the Irish tax policy mix with the rest of the European Union countries and investigate any potential relation with Ireland’s macroeconomic performance. Our findings show that distortionary taxes, e.g. on factors of production, are significantly lower while less distortionary taxes, e.g. on consumption, are higher in Ireland than most European countries. Thus, the distribution of tax burden falls relatively more on consumption and t
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!