Littérature scientifique sur le sujet « LI. Authentication, and access control »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « LI. Authentication, and access control ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "LI. Authentication, and access control"
A.Karunamurthy,, Dr. "LOCATION- BASED SECURITY FOR PREVENTING DATA EXPOSURE IN CORPORATE ENVIRNOMENT." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49363.
Texte intégralJunquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.
Texte intégralSandhu, Ravi, and Pierangela Samarati. "Authentication, access control, and audit." ACM Computing Surveys 28, no. 1 (1996): 241–43. http://dx.doi.org/10.1145/234313.234412.
Texte intégralZyryanova, Svetlana A., Yuliya Yu Vassunova, and Irina V. Chumak. "INNOVATIVE AUTHENTICATION AND ACCESS CONTROL TECHNOLOGIES." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 4/9, no. 145 (2024): 115–21. http://dx.doi.org/10.36871/ek.up.p.r.2024.04.09.018.
Texte intégralMa, Binhao, Xurui Zheng, Can Zhao, Yibing Wang, Dejun Wang, and Bo Meng. "A secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control based on federated blockchain." PLOS ONE 17, no. 9 (2022): e0274748. http://dx.doi.org/10.1371/journal.pone.0274748.
Texte intégralS, Krishnarajan, and A. Rengarajan. "Surveying Authentication and Authorization Mechanisms in Today's Web Technology Landscape." International Journal of Innovative Research in Computer and Communication Engineering 12, no. 05 (2024): 6337–40. http://dx.doi.org/10.15680/ijircce.2024.1205198.
Texte intégralChoubisa, Mukesh, and Brijesh Jajal. "Analysis of Secure Authentication for IoT using Token-based access control." International Journal of Scientific Research in Computer Science and Engineering 13, no. 1 (2025): 21–25. https://doi.org/10.26438/ijsrcse.v13i1.609.
Texte intégralLiu, Jing, Yang Xiao, and C. L. Philip Chen. "Internet of things' authentication and access control." International Journal of Security and Networks 7, no. 4 (2012): 228. http://dx.doi.org/10.1504/ijsn.2012.053461.
Texte intégralHarn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.
Texte intégralKang, Jeong Hwa, and Minhye Seo. "Enhanced Authentication for Decentralized IoT Access Control Architecture." Cryptography 7, no. 3 (2023): 42. http://dx.doi.org/10.3390/cryptography7030042.
Texte intégralThèses sur le sujet "LI. Authentication, and access control"
SILVESTRE, BRUNO OLIVEIRA. "INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.
Texte intégralJohnson, Henric. "Toward adjustable lightweight authentication for network access control /." Karlskrona : Blekinge Institute of Technology, 2005. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/30ef501d402539d3c12570f5005184f4?OpenDocument.
Texte intégralBehrad, Shanay. "Slice specific authentication and access control for 5G." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS007.
Texte intégralOLSSON, JOAKIM. "Method for gesture based authentication in physical access control." Thesis, KTH, Maskinkonstruktion (Inst.), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209339.
Texte intégralBurdis, Keith Robert. "Distributed authentication for resource control." Thesis, Rhodes University, 2000. http://hdl.handle.net/10962/d1006512.
Texte intégralSubils, Jean-Baptiste. "Authentication Via Multiple Associated Devices." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5778.
Texte intégralMay, Brian 1975. "Scalable access control." Monash University, School of Computer Science and Software, 2001. http://arrow.monash.edu.au/hdl/1959.1/8043.
Texte intégralYildirim, Merve. "Security and usability in password authentication." Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/71873/.
Texte intégralShen, Ziyi. "Red Door: Firewall Based Access Control in ROS." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1752358/.
Texte intégralCeccato, Silvia. "Security in Global Navigation Satellite Systems: authentication, integrity protection and access control." Doctoral thesis, Università degli studi di Padova, 2019. http://hdl.handle.net/11577/3425426.
Texte intégralLivres sur le sujet "LI. Authentication, and access control"
Boonkrong, Sirapat. Authentication and Access Control. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6570-3.
Texte intégralTricia, Ballad, and Banks Erin K, eds. Access control, authentication, and public key infrastructure. Jones & Bartlett Learning, 2011.
Trouver le texte intégralBrown, Edwin Lyle. 802.1X Port-Based Authentication. Taylor and Francis, 2006.
Trouver le texte intégralLibicki, Martin C. Influences on the adoption of multifactor authentication. RAND, 2011.
Trouver le texte intégralE, Koontz John, Devaney Judith E. 1943-, National Institute of Standards and Technology (U.S.), and United States. Dept. of Energy, eds. An authentication framework for Web access to remote hosts. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Trouver le texte intégralNational Institute of Standards and Technology (U.S.). Entity authentication using public key cryptography. Information Technology Laboratory, National Institute of Standards and Technology, 1997.
Trouver le texte intégralBurnett, Mark. Perfect Passwords: Selection, Protection, Authentication. Syngress, 2005.
Trouver le texte intégral), National Institute of Standards and Technology (U S. Guideline for the use of advanced authentication technology alternatives. Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 1994.
Trouver le texte intégralTodorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Auerbach Pub, 2007.
Trouver le texte intégralNational Computer Security Center (U.S.), ed. A Guide to understanding identification and authentication in trusted systems. National Computer Security Center, 1991.
Trouver le texte intégralChapitres de livres sur le sujet "LI. Authentication, and access control"
Boonkrong, Sirapat. "Biometric Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_5.
Texte intégralBoonkrong, Sirapat. "Password-Based Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_4.
Texte intégralBoonkrong, Sirapat. "Multi-factor Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_6.
Texte intégralBasin, David, Patrick Schaller, and Michael Schläpfer. "Authentication and Access Control." In Applied Information Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24474-2_4.
Texte intégralBoonkrong, Sirapat. "Introduction to Cryptography." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_1.
Texte intégralBoonkrong, Sirapat. "Public Key Infrastructure." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_2.
Texte intégralBoonkrong, Sirapat. "Methods and Threats of Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_3.
Texte intégralBoonkrong, Sirapat. "Authentication and Key Establishment Protocols." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_7.
Texte intégralBoonkrong, Sirapat. "Current and Future Trends." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_8.
Texte intégralKirkpatrick, Michael, and Elisa Bertino. "Context-Dependent Authentication and Access Control." In iNetSec 2009 – Open Research Problems in Network Security. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05437-2_6.
Texte intégralActes de conférences sur le sujet "LI. Authentication, and access control"
S, Kanagamalliga, Rajalingam S, Karthikeyan M, and Kannan A. "Arduino-Powered Fingerprint Authentication for Door Access Control." In 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2024. http://dx.doi.org/10.1109/icesc60852.2024.10689965.
Texte intégralMartinez, Andrea, Cem Topcuoglu, Abbas Acar, Selcuk Uluagac, and Engin Kirda. "Diversity Perspectives on Access Control and Authentication in Shared IoT Devices." In 2025 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2025. https://doi.org/10.1109/icce63647.2025.10929960.
Texte intégralKrishna, R. Satya, and V. Murali Mohan. "A Novel User Authentication and Access Control Model in Enhancing Cloud Security." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724423.
Texte intégralBappy, Faisal Haque, Joon S. Park, Kamrul Hasan, and Tariqul Islam. "ChainGuard: A Blockchain-Based Authentication and Access Control Scheme for Distributed Networks." In 2025 IEEE 22nd Consumer Communications & Networking Conference (CCNC). IEEE, 2025. https://doi.org/10.1109/ccnc54725.2025.10976009.
Texte intégralNabeel, Mohamed. "Session details: Access Control and Authentication." In CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy. ACM, 2018. http://dx.doi.org/10.1145/3258528.
Texte intégralQi, Lin, and Li Zhi. "Authentication and Access Control in Satellite Network." In 2010 Third International Symposiums on Electronic Commerce and Security (ISECS). IEEE, 2010. http://dx.doi.org/10.1109/isecs.2010.12.
Texte intégralCvrček, Tadeáš, and Petr Dzurenda. "Access Control System Using Multi-factor Authentication." In STUDENT EEICT 2022. Fakulta elektrotechniky a komunikacnich technologii VUT v Brne, 2022. http://dx.doi.org/10.13164/eeict.2022.190.
Texte intégralFu, Zhi, and John C. Strassner. "Access Control and Authentication for Converged Wireless Networks." In 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services. IEEE, 2006. http://dx.doi.org/10.1109/mobiq.2006.340423.
Texte intégralFu, Zhi, and John C. Strassner. "Access Control and Authentication for Converged Wireless Networks." In 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems. IEEE, 2006. http://dx.doi.org/10.1109/mobiqw.2006.361755.
Texte intégralNick, William, Joseph Shelton, Cory Sabol, and Albert Esterline. "Federated protocol for biometric authentication and access control." In 2017 Computing Conference. IEEE, 2017. http://dx.doi.org/10.1109/sai.2017.8252195.
Texte intégralRapports d'organisations sur le sujet "LI. Authentication, and access control"
Narayan, K., and D. Nelson. Using Authentication, Authorization, and Accounting Services to Dynamically Provision View-Based Access Control Model User-to-Group Mappings. Edited by R. Presuhn. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6065.
Texte intégral