Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Attribute authentication“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Attribute authentication" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Attribute authentication"
Dolev, Shlomi, Łukasz Krzywiecki, Nisha Panwar und Michael Segal. „Dynamic attribute based vehicle authentication“. Wireless Networks 23, Nr. 4 (30.01.2016): 1045–62. http://dx.doi.org/10.1007/s11276-016-1203-5.
Der volle Inhalt der QuelleYu, Ping, Wei Ni, Guangsheng Yu, Hua Zhang, Ren Ping Liu und Qiaoyan Wen. „Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks“. Security and Communication Networks 2021 (22.02.2021): 1–14. http://dx.doi.org/10.1155/2021/6638453.
Der volle Inhalt der QuelleZhu, Xianwei, ChaoWen Chang, Qin Xi und ZhiBin Zuo. „Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking“. Security and Communication Networks 2020 (10.01.2020): 1–18. http://dx.doi.org/10.1155/2020/6302739.
Der volle Inhalt der QuelleKIYOMOTO, Shinsaku, Kazuhide FUKUSHIMA und Toshiaki TANAKA. „Design of Anonymous Attribute Authentication Mechanism“. IEICE Transactions on Communications E92-B, Nr. 4 (2009): 1112–18. http://dx.doi.org/10.1587/transcom.e92.b.1112.
Der volle Inhalt der QuelleGupta, Brij B., und Shaifali Narayan. „A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server“. Journal of Organizational and End User Computing 33, Nr. 2 (Juli 2021): 1–16. http://dx.doi.org/10.4018/joeuc.20210301.oa1.
Der volle Inhalt der QuelleZhang, Qikun, Yongjiao Li Zhigang Li, Junling Yuan, Yong Gan und Xiangyang Luo. „Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things“. Sensors 19, Nr. 23 (28.11.2019): 5237. http://dx.doi.org/10.3390/s19235237.
Der volle Inhalt der QuelleSu Jeong, Yoon, Yong Tae Kim und Gil Cheol Park. „Attribute-based multiuser authentication scheme between IoT devices for 5G environment“. International Journal of Engineering & Technology 7, Nr. 2.12 (03.04.2018): 11. http://dx.doi.org/10.14419/ijet.v7i2.12.11026.
Der volle Inhalt der QuelleLi, Peng, Junzuo Lai und Yongdong Wu. „Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting“. Security and Communication Networks 2021 (04.08.2021): 1–17. http://dx.doi.org/10.1155/2021/6611518.
Der volle Inhalt der QuelleLakshmiPraveena, T., V. Ramachandran und CH Rupa. „Attribute based Multifactor Authentication for Cloud Applications“. International Journal of Computer Applications 80, Nr. 17 (18.10.2013): 37–40. http://dx.doi.org/10.5120/13971-1474.
Der volle Inhalt der QuelleYoo, Hye-Joung. „Attribute-Based Authentication for Secure Cloud Computing“. Journal of Korean Institute of Information Technology 13, Nr. 1 (31.01.2015): 59. http://dx.doi.org/10.14801/jkiit.2015.13.1.59.
Der volle Inhalt der QuelleDissertationen zum Thema "Attribute authentication"
Khader, Dalia. „Attribute based authentication schemes“. Thesis, University of Bath, 2009. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.500716.
Der volle Inhalt der QuelleSchläger, Christian. „Attribute based infrastructures for authentication and authorisation /“. Lohmar ; Köln : Eul, 2008. http://d-nb.info/987834134/04.
Der volle Inhalt der QuelleCasto, Matthew James. „Multi-Attribute Design for Authentication and Reliability (MADAR)“. The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1512009861557857.
Der volle Inhalt der QuelleStrakoš, Jan. „Atributová autentizace na platformě Android“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442393.
Der volle Inhalt der QuelleVillar, Melissa Vieira Fernandes. „Modelo de autenticaÃÃo e autorizaÃÃo baseado em certificados de atributos para controle de acesso de aplicaÃÃes em ambiente distribuÃdo utilizando redes de petri coloridas“. Universidade Federal do CearÃ, 2007. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=2047.
Der volle Inhalt der QuelleDue to increasing threats inherent to the information systems, the use of authentication and authorization mechanisms based in login and password does not enough to assure the information security. This work proposes a new model of authentication and authorization for distributed applications, based in hash and attributes certificates. Hash is used in the application authentication process, while certificates of attributes specify privileges and other authorization information. Its use is managed by the privilege management infrastructure (PMI). In this work, we describe the architecture and the functioning of the model, as well the processes of the attributes certificates generation, authentication and authorization of the application. The proposed model was specified in Coloured Petri Nets and validated by simulation.
Malík, Ondrej. „Kryptografie a ochrana soukromí“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442402.
Der volle Inhalt der QuelleDzurenda, Petr. „Kryptografická ochrana digitální identity“. Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403859.
Der volle Inhalt der QuelleKouicem, Djamel Eddine. „Sécurité de l’Internet des objets pour les systèmes de systèmes“. Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2518.
Der volle Inhalt der QuelleThe Internet of things (IoT) is a new technology that aims to connect billions of physical devices to the Internet. The components of IoT communicate and collaborate between each other in distributed and dynamic environments, which are facing several security challenges. In addition, the huge number of connected objects and the limitation of their resources make the security in IoT very difficult to achieve. In this thesis, we focus on the application of lightweight cryptographic approaches and blockchain technology to address security problems in IoT, namely : authentication and trust management. First, we were interested on some kind of IoT applications where we need to control remotely the execution of smart actuators using IoT devices. To solve this problem, we proposed an efficient and fine-grained access controlsolution, based on the Attribute Based Encryption (ABE) mechanism and oneway hash chains. Using formal security tools, we demonstrated the security of our scheme against malicious attacks. Second, we tackled the problem of authentication in IoT based fog computing environments. Existing authentication techniques do not consider latency constraints introduced in the context of fog computing architecture. In addition, some of them do not provide mutual authentication between devices and fog servers. To overcome these challenges, we proposed a novel, efficient and lightweight mutual authentication scheme based on blockchain technologyand secret sharing technique. We demonstrated the efficiency of our authentication scheme through extensive simulations. The third problem treated in this work is the trust management in IoT. Existing trust management protocols do not meet the new requirements introduced in IoT such as heterogeneity, mobility and scalability. To address these challenges, we proposed a new scalable trust management protocol based on consortium blockchain technology and fog computing paradigm, with mobility support. Our solution allows IoT devices to accurately assess and share trust recommendations about other devices in a scalable way without referring to any pre-trusted entity. We confirmed the efficiency of our proposal through theoretical analysis and extensive simulations. Finally, we showed that our protocol outperforms existing solutions especially in terms of scalability, mobility support, communication and computation
Adnan, Adnan [Verfasser]. „Evaluation of near infrared spectroscopy for prediction of quality attributes and authentication of green coffee beans / Adnan Adnan“. Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2020. http://d-nb.info/1219731692/34.
Der volle Inhalt der QuelleCwiertnia, Elke. „Using analytical techniques for the study and authentication of works of art attributed to Francis Bacon (1909-1992)“. Thesis, Northumbria University, 2014. http://nrl.northumbria.ac.uk/36127/.
Der volle Inhalt der QuelleBuchteile zum Thema "Attribute authentication"
Khader, Dalia, Liqun Chen und James H. Davenport. „Certificate-Free Attribute Authentication“. In Cryptography and Coding, 301–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10868-6_18.
Der volle Inhalt der QuelleYang, Huihui, und Vladimir A. Oleshchuk. „A Dynamic Attribute-Based Authentication Scheme“. In Lecture Notes in Computer Science, 106–18. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18681-8_9.
Der volle Inhalt der QuelleKim, Tiffany Hyun-Jin, Virgil Gligor und Adrian Perrig. „Street-Level Trust Semantics for Attribute Authentication“. In Lecture Notes in Computer Science, 96–115. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35694-0_12.
Der volle Inhalt der QuelleLee, Jaeil, Inkyoung Jeun und Seoklae lee. „Efficient Attribute Authentication in Wireless Mobile Networks“. In Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops, 1080–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11942634_111.
Der volle Inhalt der QuelleYang, Huihui, und Vladimir A. Oleshchuk. „An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees“. In Secure IT Systems, 123–35. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26502-5_9.
Der volle Inhalt der QuelleCovington, Michael J., Manoj R. Sastry und Deepak J. Manohar. „Attribute-Based Authentication Model for Dynamic Mobile Environments“. In Security in Pervasive Computing, 227–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11734666_17.
Der volle Inhalt der QuelleBrunner, Clemens, Fabian Knirsch und Dominik Engel. „SPROOF: A Decentralized Platform for Attribute-Based Authentication“. In Communications in Computer and Information Science, 1–23. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49443-8_1.
Der volle Inhalt der QuelleCamenisch, Jan, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin und Franz-Stefan Preiss. „Concepts and Languages for Privacy-Preserving Attribute-Based Authentication“. In Policies and Research in Identity Management, 34–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37282-7_4.
Der volle Inhalt der QuelleGligor, Virgil. „Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion)“. In Lecture Notes in Computer Science, 116–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35694-0_13.
Der volle Inhalt der QuelleSchläger, Christian, Manuel Sojer, Björn Muschall und Günther Pernul. „Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers“. In E-Commerce and Web Technologies, 132–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11823865_14.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Attribute authentication"
Dolev, Shlomi, Lukasz Krzywiecki, Nisha Panwar und Michael Segal. „Dynamic Attribute Based Vehicle Authentication“. In 2014 IEEE 13th International Symposium on Network Computing and Applications (NCA). IEEE, 2014. http://dx.doi.org/10.1109/nca.2014.5.
Der volle Inhalt der QuelleYun, Jong Pil, Hyoseung Kim und Dong Hoon Lee. „An Improved Fuzzy Attribute-Based Authentication“. In 2015 5th International Conference on IT Convergence and Security (ICITCS). IEEE, 2015. http://dx.doi.org/10.1109/icitcs.2015.7292946.
Der volle Inhalt der QuelleHongbin, Wang, und Ren Yan. „An Attribute-Based Anonymous Authentication Scheme“. In 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT). IEEE, 2013. http://dx.doi.org/10.1109/eidwt.2013.102.
Der volle Inhalt der QuelleHyun-A Park, Dong Hoon Lee und Justin Zhan. „Attribute-based access control using combined authentication technologies“. In 2008 IEEE International Conference on Granular Computing (GrC-2008). IEEE, 2008. http://dx.doi.org/10.1109/grc.2008.4664774.
Der volle Inhalt der QuelleThaler, Stefan, Jerry Den Hartog, Dhouha Ayed, Dieter Sommer und Michael Hitchens. „Cross-Domain Attribute Conversion for Authentication and Authorization“. In 2015 10th International Conference on Availability, Reliability and Security (ARES). IEEE, 2015. http://dx.doi.org/10.1109/ares.2015.41.
Der volle Inhalt der QuelleSamangouei, Pouya, Vishal M. Patel und Rama Chellappa. „Attribute-based continuous user authentication on mobile devices“. In 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, 2015. http://dx.doi.org/10.1109/btas.2015.7358748.
Der volle Inhalt der QuelleAghapour, Saeed, Mohammad Hassan Ameri und Javad Mohajeri. „A multi sender attribute-based broadcast authentication scheme“. In 2016 8th International Symposium on Telecommunications (IST). IEEE, 2016. http://dx.doi.org/10.1109/istel.2016.7881787.
Der volle Inhalt der QuelleYang, Huihui, und Vladimir A. Oleshchuk. „Traceable hierarchical attribute-based authentication for the cloud“. In 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 2015. http://dx.doi.org/10.1109/cns.2015.7346888.
Der volle Inhalt der QuelleShinsaku Kiyomoto und Toshiaki Tanaka. „Anonymous attribute authentication scheme using self-blindable certificates“. In 2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008). IEEE, 2008. http://dx.doi.org/10.1109/isi.2008.4565060.
Der volle Inhalt der QuellePremarathne, Uthpala S. „PROAASEL: Prospect theory based continuous authentication attribute selection model“. In 2016 Moratuwa Engineering Research Conference (MERCon). IEEE, 2016. http://dx.doi.org/10.1109/mercon.2016.7480120.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Attribute authentication"
Yegin, A., und R. Cragie. Encrypting the Protocol for Carrying Authentication for Network Access (PANA) Attribute-Value Pairs. RFC Editor, November 2012. http://dx.doi.org/10.17487/rfc6786.
Der volle Inhalt der QuelleHartman, S., und J. Howlett. Name Attributes for the GSS-API Extensible Authentication Protocol (EAP) Mechanism. RFC Editor, Dezember 2013. http://dx.doi.org/10.17487/rfc7056.
Der volle Inhalt der QuelleValmikam, R., und R. Koodli. Extensible Authentication Protocol (EAP) Attributes for Wi-Fi Integration with the Evolved Packet Core. RFC Editor, Februar 2015. http://dx.doi.org/10.17487/rfc7458.
Der volle Inhalt der QuelleHousley, R., und T. Moore. Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN). RFC Editor, Mai 2004. http://dx.doi.org/10.17487/rfc3770.
Der volle Inhalt der QuelleHousley, R., und T. Moore. Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN). RFC Editor, Februar 2006. http://dx.doi.org/10.17487/rfc4334.
Der volle Inhalt der QuelleDroms, R., und J. Schnizlein. Remote Authentication Dial-In User Service (RADIUS) Attributes Suboption for the Dynamic Host Configuration Protocol (DHCP) Relay Agent Information Option. RFC Editor, Februar 2005. http://dx.doi.org/10.17487/rfc4014.
Der volle Inhalt der Quelle