Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Attribute-based authentication“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Attribute-based authentication" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Attribute-based authentication"
Dolev, Shlomi, Łukasz Krzywiecki, Nisha Panwar, and Michael Segal. "Dynamic attribute based vehicle authentication." Wireless Networks 23, no. 4 (2016): 1045–62. http://dx.doi.org/10.1007/s11276-016-1203-5.
Der volle Inhalt der QuelleZhu, Xianwei, ChaoWen Chang, Qin Xi, and ZhiBin Zuo. "Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking." Security and Communication Networks 2020 (January 10, 2020): 1–18. http://dx.doi.org/10.1155/2020/6302739.
Der volle Inhalt der QuelleLakshmiPraveena, T., V. Ramachandran, and CH Rupa. "Attribute based Multifactor Authentication for Cloud Applications." International Journal of Computer Applications 80, no. 17 (2013): 37–40. http://dx.doi.org/10.5120/13971-1474.
Der volle Inhalt der QuelleYoo, Hye-Joung. "Attribute-Based Authentication for Secure Cloud Computing." Journal of Korean Institute of Information Technology 13, no. 1 (2015): 59. http://dx.doi.org/10.14801/jkiit.2015.13.1.59.
Der volle Inhalt der QuelleUsha, S., and P. Sangeetha. "Multiple Attribute Authority based Access Control and Anonymous Authentication in Decentralized Cloud." Bonfring International Journal of Data Mining 6, no. 3 (2016): 24–29. http://dx.doi.org/10.9756/bijdm.7019.
Der volle Inhalt der QuelleSu Jeong, Yoon, Yong Tae Kim, and Gil Cheol Park. "Attribute-based multiuser authentication scheme between IoT devices for 5G environment." International Journal of Engineering & Technology 7, no. 2.12 (2018): 11. http://dx.doi.org/10.14419/ijet.v7i2.12.11026.
Der volle Inhalt der QuelleZhang, Zhiqiang, Suzhen Cao, Longbo Han, and Xueyan Liu. "Attribute-Based Identity Authentication Scheme Based on Linear Codes." Journal of Physics: Conference Series 1631 (September 2020): 012139. http://dx.doi.org/10.1088/1742-6596/1631/1/012139.
Der volle Inhalt der QuelleLi, Peng, Junzuo Lai, and Yongdong Wu. "Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting." Security and Communication Networks 2021 (August 4, 2021): 1–17. http://dx.doi.org/10.1155/2021/6611518.
Der volle Inhalt der QuelleZeng, Yongbin, Hui Guang, and Guangsong Li. "Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks." Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/8470949.
Der volle Inhalt der QuelleLee, Ji-Seon, and Hyo-Dong Kim. "Attribute-based authentication scheme in IPTV broadcasting system." Journal of Broadcast Engineering 14, no. 3 (2009): 280–87. http://dx.doi.org/10.5909/jbe.2009.14.3.280.
Der volle Inhalt der QuelleDissertationen zum Thema "Attribute-based authentication"
Khader, Dalia. "Attribute based authentication schemes." Thesis, University of Bath, 2009. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.500716.
Der volle Inhalt der QuelleSchläger, Christian. "Attribute based infrastructures for authentication and authorisation /." Lohmar ; Köln : Eul, 2008. http://d-nb.info/987834134/04.
Der volle Inhalt der QuelleStrakoš, Jan. "Atributová autentizace na platformě Android." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442393.
Der volle Inhalt der QuelleDzurenda, Petr. "Kryptografická ochrana digitální identity." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403859.
Der volle Inhalt der QuelleAu, Wai Ki Richard. "Agent-based one-shot authorisation scheme in a commercial extranet environment." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16708/.
Der volle Inhalt der QuelleKouicem, Djamel Eddine. "Sécurité de l’Internet des objets pour les systèmes de systèmes." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2518.
Der volle Inhalt der QuelleImine, Youcef. "Cloud computing security." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.
Der volle Inhalt der QuelleShih, Wei-Yao, and 施惟堯. "A4: An Authentication, Authorization and Access Control Scheme for Electronic Health Records using Attribute-based Encryption Algorithm." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/9222vz.
Der volle Inhalt der Quelle(6620474), Denis A. Ulybyshev. "Data Protection in Transit and at Rest with Leakage Detection." Thesis, 2019.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Attribute-based authentication"
Yang, Huihui, and Vladimir A. Oleshchuk. "A Dynamic Attribute-Based Authentication Scheme." In Lecture Notes in Computer Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18681-8_9.
Der volle Inhalt der QuelleCovington, Michael J., Manoj R. Sastry, and Deepak J. Manohar. "Attribute-Based Authentication Model for Dynamic Mobile Environments." In Security in Pervasive Computing. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11734666_17.
Der volle Inhalt der QuelleBrunner, Clemens, Fabian Knirsch, and Dominik Engel. "SPROOF: A Decentralized Platform for Attribute-Based Authentication." In Communications in Computer and Information Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49443-8_1.
Der volle Inhalt der QuelleYang, Huihui, and Vladimir A. Oleshchuk. "An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees." In Secure IT Systems. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26502-5_9.
Der volle Inhalt der QuelleCamenisch, Jan, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, and Franz-Stefan Preiss. "Concepts and Languages for Privacy-Preserving Attribute-Based Authentication." In Policies and Research in Identity Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37282-7_4.
Der volle Inhalt der QuelleSchläger, Christian, Manuel Sojer, Björn Muschall, and Günther Pernul. "Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers." In E-Commerce and Web Technologies. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11823865_14.
Der volle Inhalt der QuelleZhu, Shuhua, Li Zhan, Hengchang Qiang, Danlong Fu, Wei Sun, and Yong Tang. "A Fuzzy Attribute-Based Authentication Scheme on the Basis of Lagrange Polynomial Interpolation." In Human Centered Computing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15554-8_57.
Der volle Inhalt der QuelleXu, YuHua, and ZhiXin Sun. "Achieving Data Security, Access Control and Authentication of Controllers in Hierarchical Software Defined Networking with Attribute Based Encryption." In Cyberspace Safety and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_16.
Der volle Inhalt der QuelleYang, Piyi, and Tanveer A. Zia. "An Efficient Attribute-Based Signature with Application to Secure Attribute-Based Messaging System." In Theory and Practice of Cryptography Solutions for Secure Information Systems. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4030-6.ch007.
Der volle Inhalt der QuelleNamli, Tuncay, and Asuman Dogac. "Using SAML and XACML for Web Service Security&Privacy." In Securing Web Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-639-6.ch008.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Attribute-based authentication"
Dolev, Shlomi, Lukasz Krzywiecki, Nisha Panwar, and Michael Segal. "Dynamic Attribute Based Vehicle Authentication." In 2014 IEEE 13th International Symposium on Network Computing and Applications (NCA). IEEE, 2014. http://dx.doi.org/10.1109/nca.2014.5.
Der volle Inhalt der QuelleYun, Jong Pil, Hyoseung Kim, and Dong Hoon Lee. "An Improved Fuzzy Attribute-Based Authentication." In 2015 5th International Conference on IT Convergence and Security (ICITCS). IEEE, 2015. http://dx.doi.org/10.1109/icitcs.2015.7292946.
Der volle Inhalt der QuelleHongbin, Wang, and Ren Yan. "An Attribute-Based Anonymous Authentication Scheme." In 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT). IEEE, 2013. http://dx.doi.org/10.1109/eidwt.2013.102.
Der volle Inhalt der QuelleHyun-A Park, Dong Hoon Lee, and Justin Zhan. "Attribute-based access control using combined authentication technologies." In 2008 IEEE International Conference on Granular Computing (GrC-2008). IEEE, 2008. http://dx.doi.org/10.1109/grc.2008.4664774.
Der volle Inhalt der QuelleSamangouei, Pouya, Vishal M. Patel, and Rama Chellappa. "Attribute-based continuous user authentication on mobile devices." In 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, 2015. http://dx.doi.org/10.1109/btas.2015.7358748.
Der volle Inhalt der QuelleAghapour, Saeed, Mohammad Hassan Ameri, and Javad Mohajeri. "A multi sender attribute-based broadcast authentication scheme." In 2016 8th International Symposium on Telecommunications (IST). IEEE, 2016. http://dx.doi.org/10.1109/istel.2016.7881787.
Der volle Inhalt der QuelleYang, Huihui, and Vladimir A. Oleshchuk. "Traceable hierarchical attribute-based authentication for the cloud." In 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 2015. http://dx.doi.org/10.1109/cns.2015.7346888.
Der volle Inhalt der QuellePremarathne, Uthpala S. "PROAASEL: Prospect theory based continuous authentication attribute selection model." In 2016 Moratuwa Engineering Research Conference (MERCon). IEEE, 2016. http://dx.doi.org/10.1109/mercon.2016.7480120.
Der volle Inhalt der QuellePonomarev, K. Y., and O. V. Nissenbaum. "Attribute-Based Encryption with Authentication Provider in FIWARE Platform." In 2018 Dynamics of Systems, Mechanisms and Machines (Dynamics). IEEE, 2018. http://dx.doi.org/10.1109/dynamics.2018.8601461.
Der volle Inhalt der QuellePortnoi, Marcos, and Chien-Chung Shen. "Loc-Auth: Location-enabled authentication through attribute-based encryption." In 2015 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2015. http://dx.doi.org/10.1109/iccnc.2015.7069321.
Der volle Inhalt der Quelle