Journal articles on the topic 'Use of strong authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Use of strong authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ju, Seung-hwan, Hee-suk Seo, Sung-hyu Han, Jae-cheol Ryou, and Jin Kwak. "A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information." BioMed Research International 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/427542.
Full textHan, Jinho. "Fingerprint Authentication Schemes for Mobile Devices." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 3 (2015): 579. http://dx.doi.org/10.11591/ijece.v5i3.pp579-585.
Full textde Almeida, Marcone, Rafael de Sousa Júnior, Luis García Villalba, and Tai-Hoon Kim. "New DoS Defense Method Based on Strong Designated Verifier Signatures." Sensors 18, no. 9 (2018): 2813. http://dx.doi.org/10.3390/s18092813.
Full textLeaby, Akeel Kassim, A. Yassin, Mushtaq Hasson, and Abdullah Rashid. "Towards design strong emergency and COVID-19 authentication scheme in VANET." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1808. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1808-1819.
Full textZhang, LiMing, and XinGang Zhang. "New Authentication Method for Vector Geographic Data Based on Perceptual Hash." Abstracts of the ICA 1 (July 15, 2019): 1–2. http://dx.doi.org/10.5194/ica-abs-1-431-2019.
Full textAGUIAR, JONAS JOSÉ MENDES, JEAN CARLOS SANTOS, and MARIA VIRGINIA URSO-GUIMARÃES. "On the use of photography in science and taxonomy: how images can provide a basis for their own authentication." Bionomina 12, no. 1 (2017): 44–47. http://dx.doi.org/10.11646/bionomina.12.1.4.
Full textTanwar, Sarvesh, and Anil Kumar. "A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority." International Journal of Information Security and Privacy 11, no. 3 (2017): 1–14. http://dx.doi.org/10.4018/ijisp.2017070101.
Full textYU, Jiang, Jin-hai SU, and Yong-fu ZHANG. "Design and analysis of USB-Key based strong password authentication scheme." Journal of Computer Applications 31, no. 2 (2011): 511–13. http://dx.doi.org/10.3724/sp.j.1087.2011.00511.
Full textRefish, Salah H. Abbdal, and Salam Waley Shneen. "E-PAC: efficient password authentication code based RMPN method and diffie-hellman algorithm." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 1 (2020): 485. http://dx.doi.org/10.11591/ijeecs.v19.i1.pp485-491.
Full textV. Sampangi, Raghav, and Srinivas Sampalli. "RFID Mutual Authentication Protocols based on Gene Mutation and Transfer." Journal of Communications Software and Systems 9, no. 1 (2013): 44. http://dx.doi.org/10.24138/jcomss.v9i1.157.
Full textJain, Ayush. "Secure Authentication for Banking Using Face Recognition." Journal of Informatics Electrical and Electronics Engineering (JIEEE) 2, no. 2 (2021): 1–8. http://dx.doi.org/10.54060/jieee/002.02.001.
Full textKim, HyunGon, and Jong-Hyouk Lee. "Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6." Mobile Information Systems 6, no. 1 (2010): 107–21. http://dx.doi.org/10.1155/2010/934286.
Full textBibak, Khodakhast, Robert Ritchie, and Behrouz Zolfaghari. "Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash." quantum Information and Computation 21, no. 3&4 (2021): 0181–202. http://dx.doi.org/10.26421/qic21.3-4-1.
Full textCao, Lai Cheng, and Wei Han. "An Advanced ECC Dynamic Password-Based Remote Authentication Scheme for Cloud Computing." Applied Mechanics and Materials 571-572 (June 2014): 34–38. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.34.
Full textLi, Jian Bing, Xiao Ping Li, Fan Yang, and Qing Kuan Dong. "An IPv6 Security Multicast System Based on CA Authentication." Advanced Materials Research 989-994 (July 2014): 4519–23. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4519.
Full textHan, Gang, and Hui Li. "An Authentication and Data Protection Scheme Research for Mass Storage Devices." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 36, no. 3 (2018): 550–57. http://dx.doi.org/10.1051/jnwpu/20183630550.
Full textKim, Hanvit, Haena Kim, Se Chun, et al. "A Wearable Wrist Band-Type System for Multimodal Biometrics Integrated with Multispectral Skin Photomatrix and Electrocardiogram Sensors." Sensors 18, no. 8 (2018): 2738. http://dx.doi.org/10.3390/s18082738.
Full textChoudhary, Karanjeet, Gurjot Singh Gaba, Ismail Butun, and Pardeep Kumar. "MAKE-IT—A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things." Sensors 20, no. 18 (2020): 5166. http://dx.doi.org/10.3390/s20185166.
Full textTeh, Pin Shen, Ning Zhang, Andrew Beng Jin Teoh, and Ke Chen. "TDAS: a touch dynamics based multi-factor authentication solution for mobile devices." International Journal of Pervasive Computing and Communications 12, no. 1 (2016): 127–53. http://dx.doi.org/10.1108/ijpcc-01-2016-0005.
Full textJohnson, Korey, and Steffen Werner. "Memorability of Alphanumeric and Composite Scene Authentication (CSA) Passcodes Over Extended Retention Intervals." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 51, no. 5 (2007): 434–38. http://dx.doi.org/10.1177/154193120705100502.
Full textDrahansky, Martin, Michal Dolezel, Jaroslav Urbanek, Eva Brezinova, and Tai-hoon Kim. "Influence of Skin Diseases on Fingerprint Recognition." Journal of Biomedicine and Biotechnology 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/626148.
Full textCastiglione, Aniello, Francesco Palmieri, Chin-Ling Chen, and Yao-Chung Chang. "A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment." International Journal of Data Warehousing and Mining 12, no. 1 (2016): 34–48. http://dx.doi.org/10.4018/ijdwm.2016010103.
Full textMartins, Patrícia, Manuel Madeira, Fernando Monteiro, Raúl Bruno de Sousa, António Sérgio Curvelo-Garcia, and Sofía Catarino. "87sr/86sr ratio in vineyard soils from Portuguese denominations of origin and its potential for origin authentication." OENO One 48, no. 1 (2014): 21. http://dx.doi.org/10.20870/oeno-one.2014.48.1.1652.
Full textUmaroh, Lia, and Machsun Rifauddin. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG." BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, no. 2 (2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.
Full textYang, Xiao-Dong, Li-Kun Xiao, Chun-Lin Chen, and Cai-Fen Wang. "A Strong Designated Verifier Proxy Re-Signature Scheme for IoT Environments." Symmetry 10, no. 11 (2018): 580. http://dx.doi.org/10.3390/sym10110580.
Full textChia, Jason, Ji-Jian Chin, and Sook-Chin Yip. "Digital signature schemes with strong existential unforgeability." F1000Research 10 (September 16, 2021): 931. http://dx.doi.org/10.12688/f1000research.72910.1.
Full textLin, Tsung-Hung, Cheng-Chi Lee, Chwei-Shyong Tsai, and Shin-Dong Guo. "A tabular steganography scheme for graphical password authentication." Computer Science and Information Systems 7, no. 4 (2010): 823–41. http://dx.doi.org/10.2298/csis081223028l.
Full textHan, Jinho. "How to Use Bit-string Representation of the Face in a Multi-factor Authentication System." International Journal of Computing and Digital Systems 10, no. 1 (2021): 47–51. http://dx.doi.org/10.12785/ijcds/100105.
Full textGunson, Nancie, Diarmid Marshall, Fergus McInnes, Hazel Morton, and Mervyn Jack. "Usability Evaluation of Dialogue Designs for Voiceprint Authentication in Automated Telephone Banking." International Journal of Technology and Human Interaction 10, no. 2 (2014): 59–77. http://dx.doi.org/10.4018/ijthi.2014040104.
Full textProdanovic, Radomir, and Dejan Simic. "Holistic approach to Wep protocol in securing wireless network infrastructure." Computer Science and Information Systems 3, no. 2 (2006): 97–113. http://dx.doi.org/10.2298/csis0602097p.
Full textNita, Stefania, Marius Mihailescu, and Valentin Pau. "Security and Cryptographic Challenges for Authentication Based on Biometrics Data." Cryptography 2, no. 4 (2018): 39. http://dx.doi.org/10.3390/cryptography2040039.
Full textHuang, Bin Wen, and Jie Yu Li. "A Teaching Resources Platform Based on Cloud Computing Technology." Applied Mechanics and Materials 687-691 (November 2014): 3074–77. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.3074.
Full textDas, Sanchari, Joshua Streiff, Lesa L. Huber, and L. Jean Camp. "WHY DON’T ELDERS ADOPT TWO-FACTOR AUTHENTICATION? BECAUSE THEY ARE EXCLUDED BY DESIGN." Innovation in Aging 3, Supplement_1 (2019): S325—S326. http://dx.doi.org/10.1093/geroni/igz038.1186.
Full textAgustina, Esti Rahmawati, Magdalena Christine, and Irma Fitriani. "Analisis Protokol CryptO-0N2 dengan Menggunakan Scyther Tool." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 1 (2019): 107. http://dx.doi.org/10.25126/jtiik.2019611303.
Full textIvanov, Alexander, and Alexeiy Sulavko. "Draft of the Third National Standard of Russia for Fast Automatic Learning of Large Correlation Neural Networks on Small Training Samples of Biometric Data." Voprosy kiberbezopasnosti, no. 3(43) (2021): 84–93. http://dx.doi.org/10.21681/2311-3456-2021-3-84-93.
Full textHaidar, Ali N., Stefan J. Zasada, Peter V. Coveney, Ali E. Abdallah, Bruce Beckles, and Mike A. S. Jones. "Audited credential delegation: a usable security solution for the virtual physiological human toolkit." Interface Focus 1, no. 3 (2011): 462–73. http://dx.doi.org/10.1098/rsfs.2010.0026.
Full textZhang, Yuanyuan, and Zhibo Zhai. "An efficient and provably secure key agreement scheme for satellite communication systems." PLOS ONE 16, no. 4 (2021): e0250205. http://dx.doi.org/10.1371/journal.pone.0250205.
Full textRai, Laxmisha, Zhiyuan Wang, Amila Rodrigo, Zhaopeng Deng, and Haiqing Liu. "Software Development Framework for Real-Time Face Detection and Recognition in Mobile Devices." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 04 (2020): 103. http://dx.doi.org/10.3991/ijim.v14i04.12077.
Full textRenuka, Km, Sachin Kumar, Saru Kumari, and Chien-Ming Chen. "Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks." Sensors 19, no. 21 (2019): 4625. http://dx.doi.org/10.3390/s19214625.
Full textLee, Yun Seok, Eun Kim, Sung Jin Kim, and Min Soo Jung. "Efficient Mobile Payment System Using a near Field Communication (NFC)." Applied Mechanics and Materials 263-266 (December 2012): 2785–91. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2785.
Full textKhobragade, Shrutika, Rohini Bhosale, and Rahul Jiwahe. "High Security Mechanism: Fragmentation and Replication in the Cloud with Auto Update in the System." APTIKOM Journal on Computer Science and Information Technologies 5, no. 2 (2020): 54–59. http://dx.doi.org/10.34306/csit.v5i2.138.
Full textSingh, Yogendra Narain, Sanjay Kumar Singh, and Amit Kumar Ray. "Bioelectrical Signals as Emerging Biometrics: Issues and Challenges." ISRN Signal Processing 2012 (July 26, 2012): 1–13. http://dx.doi.org/10.5402/2012/712032.
Full textKhobragade, Shrutika, Rohini Bhosale, and Rahul Jiwane. "High security mechanism: fragmentation and replication in the cloud with auto update in the system." Computer Science and Information Technologies 1, no. 2 (2020): 78–83. http://dx.doi.org/10.11591/csit.v1i2.p78-83.
Full textWilliams, GL, J. Gray, and J. Beynon. "Cancer Genetics Clinics and the Surgeon: A Valuable Role for Family History Screening." Annals of The Royal College of Surgeons of England 89, no. 2 (2007): 127–29. http://dx.doi.org/10.1308/003588407x155789.
Full textTarmizi, Auni Aqilah Ahmad, Alina Wagiran, Faezah Mohd Salleh, et al. "Integrated Approach for Species Identification and Quality Analysis for Labisia pumila Using DNA Barcoding and HPLC." Plants 10, no. 4 (2021): 717. http://dx.doi.org/10.3390/plants10040717.
Full textKeikavousi, Mohammad Reza, Farkhondeh Asadi, Somayeh Paydar, and Fariba Khounraz. "Development of Inflammatory Bowel Diseases Registry Software." Middle East Journal of Digestive Diseases 13, no. 2 (2021): 145–52. http://dx.doi.org/10.34172/mejdd.2021.218.
Full textMouly, Daniel. "Strong User Authentication." Information Systems Security 11, no. 2 (2002): 47–53. http://dx.doi.org/10.1201/1086/43320.11.2.20020501/36769.8.
Full textRehan, Mohammed. "An Analysis of Public e-Procurement System." International Journal of Technology Diffusion 4, no. 4 (2013): 66–81. http://dx.doi.org/10.4018/ijtd.2013100104.
Full textR.K, Nadesh, Srinivasa Perumal R, Shynu P.G, and Gaurav Sharma. "Enhancing security for end users in cloud computing environment using hybrid encryption technique." International Journal of Engineering & Technology 7, no. 1.8 (2018): 152. http://dx.doi.org/10.14419/ijet.v7i1.8340.
Full textHung-Yu Chien. "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity." IEEE Transactions on Dependable and Secure Computing 4, no. 4 (2007): 337–40. http://dx.doi.org/10.1109/tdsc.2007.70226.
Full text