Journal articles on the topic 'Attribute authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Attribute authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dolev, Shlomi, Łukasz Krzywiecki, Nisha Panwar, and Michael Segal. "Dynamic attribute based vehicle authentication." Wireless Networks 23, no. 4 (January 30, 2016): 1045–62. http://dx.doi.org/10.1007/s11276-016-1203-5.
Full textYu, Ping, Wei Ni, Guangsheng Yu, Hua Zhang, Ren Ping Liu, and Qiaoyan Wen. "Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks." Security and Communication Networks 2021 (February 22, 2021): 1–14. http://dx.doi.org/10.1155/2021/6638453.
Full textZhu, Xianwei, ChaoWen Chang, Qin Xi, and ZhiBin Zuo. "Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking." Security and Communication Networks 2020 (January 10, 2020): 1–18. http://dx.doi.org/10.1155/2020/6302739.
Full textKIYOMOTO, Shinsaku, Kazuhide FUKUSHIMA, and Toshiaki TANAKA. "Design of Anonymous Attribute Authentication Mechanism." IEICE Transactions on Communications E92-B, no. 4 (2009): 1112–18. http://dx.doi.org/10.1587/transcom.e92.b.1112.
Full textGupta, Brij B., and Shaifali Narayan. "A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server." Journal of Organizational and End User Computing 33, no. 2 (July 2021): 1–16. http://dx.doi.org/10.4018/joeuc.20210301.oa1.
Full textZhang, Qikun, Yongjiao Li Zhigang Li, Junling Yuan, Yong Gan, and Xiangyang Luo. "Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things." Sensors 19, no. 23 (November 28, 2019): 5237. http://dx.doi.org/10.3390/s19235237.
Full textSu Jeong, Yoon, Yong Tae Kim, and Gil Cheol Park. "Attribute-based multiuser authentication scheme between IoT devices for 5G environment." International Journal of Engineering & Technology 7, no. 2.12 (April 3, 2018): 11. http://dx.doi.org/10.14419/ijet.v7i2.12.11026.
Full textLi, Peng, Junzuo Lai, and Yongdong Wu. "Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting." Security and Communication Networks 2021 (August 4, 2021): 1–17. http://dx.doi.org/10.1155/2021/6611518.
Full textLakshmiPraveena, T., V. Ramachandran, and CH Rupa. "Attribute based Multifactor Authentication for Cloud Applications." International Journal of Computer Applications 80, no. 17 (October 18, 2013): 37–40. http://dx.doi.org/10.5120/13971-1474.
Full textYoo, Hye-Joung. "Attribute-Based Authentication for Secure Cloud Computing." Journal of Korean Institute of Information Technology 13, no. 1 (January 31, 2015): 59. http://dx.doi.org/10.14801/jkiit.2015.13.1.59.
Full textZeng, Yongbin, Hui Guang, and Guangsong Li. "Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks." Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/8470949.
Full textMuraharirao, Siva Charan, and Manik Lal Das. "Digital Image Protection using Keyed Hash Function." International Journal of Computer Vision and Image Processing 2, no. 2 (April 2012): 36–47. http://dx.doi.org/10.4018/ijcvip.2012040103.
Full textCao, Dan, Baokang Zhao, Xiaofeng Wang, and Jinshu Su. "Flexible Multi-Authority Attribute-Based Signature Schemes for Expressive Policy." Mobile Information Systems 8, no. 3 (2012): 255–74. http://dx.doi.org/10.1155/2012/736764.
Full textLee, Ji-Seon, and Hyo-Dong Kim. "Attribute-based authentication scheme in IPTV broadcasting system." Journal of Broadcast Engineering 14, no. 3 (May 30, 2009): 280–87. http://dx.doi.org/10.5909/jbe.2009.14.3.280.
Full textYoo, Hye-Joung. "Attribute based User Authentication for Contents Distribution Environments." International Journal of Contents 8, no. 3 (September 28, 2012): 79–82. http://dx.doi.org/10.5392/ijoc.2012.8.3.079.
Full textLijun Sang. "Attribute-policy handshake for Remote User Authentication Scheme." International Journal of Digital Content Technology and its Applications 5, no. 12 (December 31, 2011): 332–38. http://dx.doi.org/10.4156/jdcta.vol5.issue12.41.
Full textLiu, Xin, Man Guo, Xuzhou Li, and Bin Zhang. "An online/offline distributed attribute-based authentication scheme." Journal of Physics: Conference Series 1607 (August 2020): 012044. http://dx.doi.org/10.1088/1742-6596/1607/1/012044.
Full textWei, Jianghong, Xuexian Hu, and Wenfen Liu. "Two-factor authentication scheme using attribute and password." International Journal of Communication Systems 30, no. 1 (December 29, 2014): e2915. http://dx.doi.org/10.1002/dac.2915.
Full textLiu, Xin, Man Guo, Bin Zhang, and Xuzhou Li. "A lightweight attribute-based authentication system with DAA." Journal of Physics: Conference Series 1601 (July 2020): 032025. http://dx.doi.org/10.1088/1742-6596/1601/3/032025.
Full textUsha, S., and P. Sangeetha. "Multiple Attribute Authority based Access Control and Anonymous Authentication in Decentralized Cloud." Bonfring International Journal of Data Mining 6, no. 3 (June 30, 2016): 24–29. http://dx.doi.org/10.9756/bijdm.7019.
Full textLiu, Yan Bing, and Wen Jing Ren. "Attribute-Based Authentication Protocol of the Internet of Things." Advanced Materials Research 765-767 (September 2013): 1726–29. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1726.
Full textKim, Tae Kyung, and Jae Hoon Nah. "Analysis on the Attribute Binding based Enhanced User Authentication." International Journal of Security and Its Applications 7, no. 6 (November 30, 2013): 249–58. http://dx.doi.org/10.14257/ijsia.2013.7.6.25.
Full textZhang, Zhiqiang, Suzhen Cao, Longbo Han, and Xueyan Liu. "Attribute-Based Identity Authentication Scheme Based on Linear Codes." Journal of Physics: Conference Series 1631 (September 2020): 012139. http://dx.doi.org/10.1088/1742-6596/1631/1/012139.
Full textMoon, Jongho, Younsung Choi, and Dongho Won. "A Secure Attribute-based Authentication Scheme for Cloud Computing." KIISE Transactions on Computing Practices 22, no. 8 (August 15, 2016): 345–50. http://dx.doi.org/10.5626/ktcp.2016.22.8.345.
Full textCamenisch, Jan, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, and Franz-Stefan Preiss. "Concepts and languages for privacy-preserving attribute-based authentication." Journal of Information Security and Applications 19, no. 1 (February 2014): 25–44. http://dx.doi.org/10.1016/j.jisa.2014.03.004.
Full textLiu, Zhusong, Hongyang Yan, and Zhike Li. "Server-aided anonymous attribute-based authentication in cloud computing." Future Generation Computer Systems 52 (November 2015): 61–66. http://dx.doi.org/10.1016/j.future.2014.12.001.
Full textIbrahim, Maged Hamada, Saru Kumari, Ashok Kumar Das, and Vanga Odelu. "Attribute-based authentication on the cloud for thin clients." Journal of Supercomputing 74, no. 11 (January 2, 2017): 5813–45. http://dx.doi.org/10.1007/s11227-016-1948-8.
Full textLin, Guofeng, Yunhao Xia, Chun Ying, and Zhixin Sun. "F2P-ABS: A Fast and Secure Attribute-Based Signature for Mobile Platforms." Security and Communication Networks 2019 (December 19, 2019): 1–12. http://dx.doi.org/10.1155/2019/5380710.
Full textPiech, Henryk, and Grzegorz Grodzki. "Probability timed automata for investigating communication processes." International Journal of Applied Mathematics and Computer Science 25, no. 2 (June 1, 2015): 403–14. http://dx.doi.org/10.1515/amcs-2015-0031.
Full textHan, Jinguang, Maoxuan Bei, Liqun Chen, Yang Xiang, Jie Cao, Fuchun Guo, and Weizhi Meng. "Attribute-Based Information Flow Control." Computer Journal 62, no. 8 (May 13, 2019): 1214–31. http://dx.doi.org/10.1093/comjnl/bxz018.
Full textPARK, Haeryong. "Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme." IEICE Transactions on Communications E92-B, no. 9 (2009): 2946–47. http://dx.doi.org/10.1587/transcom.e92.b.2946.
Full textLee, Won-Jin, Kee-Won Kim, and HyunSung Kim. "Ticket-Based Authentication Protocol Using Attribute Information over Home Network." IEMEK Journal of Embedded Systems and Applications 7, no. 1 (February 28, 2012): 53–59. http://dx.doi.org/10.14372/iemek.2012.7.1.053.
Full textZhang, Qi, Yi Mu, and Minjie Zhang. "Attribute-based authentication for multi-agent systems with dynamic groups." Computer Communications 34, no. 3 (March 2011): 436–46. http://dx.doi.org/10.1016/j.comcom.2010.06.009.
Full textMarco, Lourdes, Alejandro Pozo, Gabriel Huecas, Juan Quemada, and Álvaro Alonso. "User-Adapted Web Services by Extending the eIDAS Specification with Functional Attributes." International Journal of Environmental Research and Public Health 18, no. 8 (April 9, 2021): 3980. http://dx.doi.org/10.3390/ijerph18083980.
Full textJia, Hongyong, Yue Chen, Julong Lan, Wei Yue, and Zhiwei Wang. "Group-based fast data packet attribute authentication in the reconfigurable networks." Intelligent Automation & Soft Computing 22, no. 4 (March 21, 2016): 535–42. http://dx.doi.org/10.1080/10798587.2016.1152776.
Full textGuo, Linke, Chi Zhang, Jinyuan Sun, and Yuguang Fang. "A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks." IEEE Transactions on Mobile Computing 13, no. 9 (September 2014): 1927–41. http://dx.doi.org/10.1109/tmc.2013.84.
Full textQikun, Zhang, Li Yongjiao, Gan Yong, Zheng Chuanyang, Luo Xiangyang, and Zheng Jun. "Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication." IEEE Access 7 (2019): 87085–96. http://dx.doi.org/10.1109/access.2019.2926404.
Full textMohan Kumar, M., and R. Vijayan. "Privacy authentication using key attribute-based encryption in mobile cloud computing." IOP Conference Series: Materials Science and Engineering 263 (November 2017): 042069. http://dx.doi.org/10.1088/1757-899x/263/4/042069.
Full textHan, Gang, and Hui Li. "An Authentication and Data Protection Scheme Research for Mass Storage Devices." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 36, no. 3 (June 2018): 550–57. http://dx.doi.org/10.1051/jnwpu/20183630550.
Full textLiu, Xin, Man Guo, Bin Zhang, and Xuzhou Li. "An efficient attribute-based authentication scheme with multiple authorities in public cloud." Journal of Physics: Conference Series 1607 (August 2020): 012043. http://dx.doi.org/10.1088/1742-6596/1607/1/012043.
Full textLi, Jin, Xiaofeng Chen, and Xinyi Huang. "New attribute-based authentication and its application in anonymous cloud access service." International Journal of Web and Grid Services 11, no. 1 (2015): 125. http://dx.doi.org/10.1504/ijwgs.2015.067161.
Full textMeng, Xian Yong, Zhong Chen, and Xiang Yu Meng. "Privacy-Preserving Decentralized Key-Policy Attribute-Based Signcryption in Cloud Computing Environments." Applied Mechanics and Materials 475-476 (December 2013): 1144–49. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.1144.
Full textZheng, Hongying, Jieming Wu, Bo Wang, and Jianyong Chen. "Modified Ciphertext-Policy Attribute-Based Encryption Scheme with Efficient Revocation for PHR System." Mathematical Problems in Engineering 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/6808190.
Full textFong, Simon, and Yan Zhuang. "Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Data Representation by AVT Hierarchical Data Tree." Journal of Biomedicine and Biotechnology 2012 (2012): 1–11. http://dx.doi.org/10.1155/2012/539395.
Full textHo, Jiacang, and Dae-Ki Kang. "Mini-batch bagging and attribute ranking for accurate user authentication in keystroke dynamics." Pattern Recognition 70 (October 2017): 139–51. http://dx.doi.org/10.1016/j.patcog.2017.05.002.
Full textShankar, Vishnu, and Karan Singh. "An improved user authentication scheme on smartphone using dominating attribute of touch data." Journal of Discrete Mathematical Sciences and Cryptography 22, no. 8 (November 17, 2019): 1549–61. http://dx.doi.org/10.1080/09720529.2019.1695903.
Full textPapadamou, Kostantinos, Steven Gevers, Christos Xenakis, Michael Sirivianos, Savvas Zannettou, Bogdan Chifor, Sorin Teican, et al. "Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication." IEEE Transactions on Information Forensics and Security 15 (2020): 2183–93. http://dx.doi.org/10.1109/tifs.2019.2958763.
Full textLiu, Zhusong, Jinman Luo, and Lingling Xu. "A fine-grained attribute-based authentication for sensitive data stored in cloud computing." International Journal of Grid and Utility Computing 7, no. 4 (2016): 237. http://dx.doi.org/10.1504/ijguc.2016.081010.
Full textXu, Lingling, Zhusong Liu, and Jinman Luo. "A fine-grained attribute-based authentication for sensitive data stored in cloud computing." International Journal of Grid and Utility Computing 7, no. 4 (2016): 237. http://dx.doi.org/10.1504/ijguc.2016.10001940.
Full textKwon, Hyunsoo, Daeyeong Kim, Changhee Hahn, and Junbeom Hur. "Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks." Multimedia Tools and Applications 76, no. 19 (January 9, 2016): 19507–21. http://dx.doi.org/10.1007/s11042-015-3187-z.
Full text