Littérature scientifique sur le sujet « LI. Authentication, and access control »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « LI. Authentication, and access control ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "LI. Authentication, and access control"

1

Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos et José-Javier Martinez-Herráiz. « Access Control beyond Authentication ». Security and Communication Networks 2021 (1 octobre 2021) : 1–11. http://dx.doi.org/10.1155/2021/8146553.

Texte intégral
Résumé :
Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know the secret credentials) or the identity has been impersonated by someone else after the authentication’s process was completed. Continuous authentication does not require the active participation of the user. Aiming to identify the different technologies involved in continuous authentication’s implementations, evaluation methods, and its use cases, this paper presents a systematic review that synthesizes the state of the art. This review is conducted to get a picture about which data sources could allow continuous authentication, in which systems it has been successfully implemented, and which are the most adequate ways to process the data. This review also identifies the defining dimensions of continuous authentication systems.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Sandhu, Ravi, et Pierangela Samarati. « Authentication, access control, and audit ». ACM Computing Surveys 28, no 1 (mars 1996) : 241–43. http://dx.doi.org/10.1145/234313.234412.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Liu, Jing, Yang Xiao et C. L. Philip Chen. « Internet of things' authentication and access control ». International Journal of Security and Networks 7, no 4 (2012) : 228. http://dx.doi.org/10.1504/ijsn.2012.053461.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Harn, L., et H. Y. Lin. « Integration of user authentication and access control ». IEE Proceedings E Computers and Digital Techniques 139, no 2 (1992) : 139. http://dx.doi.org/10.1049/ip-e.1992.0022.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Ma, Binhao, Xurui Zheng, Can Zhao, Yibing Wang, Dejun Wang et Bo Meng. « A secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control based on federated blockchain ». PLOS ONE 17, no 9 (23 septembre 2022) : e0274748. http://dx.doi.org/10.1371/journal.pone.0274748.

Texte intégral
Résumé :
Self-sovereign identity authentication protocol is an active research topic in the field of identity authentication and management. However, the current SSI authentication protocols pay little attention to privacy protection and the fine-grained access control. Therefore, a secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control is proposed. Firstly, the formal model of SSI including the SDPP-SSI identity model and management model is presented. And then, based on the federated blockchain, the distributed identifier is used as a global identifier for users in the decentralized domain. Finally, the verifiable statement is encapsulated using a policy control signature supporting privacy protection to develop the user’s access control for identity registration in the centralized domain. Compared with the related work (Lin 2018, Zhu 2018, Stokkink 2018, Hammudoglu 2017, Othman 2017, Abraham 2018, Guan 2019, Lin 2019) from controllability, security, flexibility, privacy protection, authentication and fine-grained access control, the proposed SSI authentication protocol not only meets controllability, authentication, and flexibility, but also supports privacy protection and fine-grained access control.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Zuva, T. « Hybridization of Bimodal Biometrics for Access Control Authentication ». International Journal of Future Computer and Communication 3, no 6 (décembre 2014) : 444–51. http://dx.doi.org/10.7763/ijfcc.2014.v3.344.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Kakarla, Geeta, et S. Phani Kumar. « Blockchain Powered Mutual Authentication and Access Control Protocol ». International Journal of Computer Networks and Applications 9, no 1 (28 février 2022) : 103. http://dx.doi.org/10.22247/ijcna/2022/211629.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

SUMI, Kazuhiko. « Biometrics Authentication and Application to Access Control Systems ». Journal of The Institute of Electrical Engineers of Japan 129, no 4 (2009) : 237–40. http://dx.doi.org/10.1541/ieejjournal.129.237.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Galka, Jakub, Mariusz Masior et Michal Salasa. « Voice authentication embedded solution for secured access control ». IEEE Transactions on Consumer Electronics 60, no 4 (novembre 2014) : 653–61. http://dx.doi.org/10.1109/tce.2014.7027339.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Karger, Paul A. « Authentication and discretionary access control in computer networks ». Computers & ; Security 5, no 4 (décembre 1986) : 314–24. http://dx.doi.org/10.1016/0167-4048(86)90052-0.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "LI. Authentication, and access control"

1

SILVESTRE, BRUNO OLIVEIRA. « INTERINSTITUTIONAL ACCESS : AUTHENTICATION AND ACCESS CONTROL ». PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.

Texte intégral
Résumé :
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
O uso de computação distribuída vem expandindo seu escopo, saindo de aplicações em redes locais para aplicações envolvendo diversas instituições. Em termos de segurança, essa expansão introduz desafios em identificar usuários oriundos das diferentes organizações e definir seus direitos de acesso a determinado recurso. Abordagens comuns adotam a replicação do cadastro dos usuários pelas diversas instituições ou o compartilhamente de uma mesma identidade por um conjunto de usuários. Entretanto, essas estratégias apresentam deficiências, demandando, por exemplo, maior esforço de gerência por parte dos administradores e até esbarrando em políticas de privacidade. Neste trabalho propomos uma arquitetura que utiliza o conceito de papéis para a autenticação e o controle de acesso entre diferentes instituições. Baseado em uma relação de confiança entre as organizações, a arquitetura permite que os usuários sejam autenticados na instituições onde estão afiliados e utiliza o papel por eles desempenhados para controlar o acesso aos recursos disponibilizados pelas demais organizações.
Distributed computing has been expanding its scope from local area network applications to wide-area applications, involving different organizations. This expansion implies in several new security challenges, such as the identification of users originating from different organizations and the definition of their access rights. Commom aproaches involve replicating user data in several institutions or sharing identities among sets of users. However, these approaches have several limitations, sucj as the increased management effort of administrators or problems with privacy policies. This work proposes a framework for inter-institucional authentication. The framework is based on the concepts of RBAC (role-based access control) and of trust between organizations.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Johnson, Henric. « Toward adjustable lightweight authentication for network access control / ». Karlskrona : Blekinge Institute of Technology, 2005. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/30ef501d402539d3c12570f5005184f4?OpenDocument.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Behrad, Shanay. « Slice specific authentication and access control for 5G ». Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS007.

Texte intégral
Résumé :
La cinquième génération de réseaux cellulaires mobiles, 5G, est conçue pour prendre en charge un ensemble de nouveaux cas d'utilisation et exigences, par exemple concernant la qualité de service ou la sécurité. En utilisant les technologies de virtualisation et le concept de découpage de réseau, les opérateurs de réseau 5G seront en mesure de fournir des capacités de connectivité spécifiques afin de prendre en charge ces différents cas d'utilisation. Chaque tranche de réseau (network slice) peut être dédiée à un tiers (c'est-à-dire tout acteur commercial qui n'est pas l'opérateur de réseau) et être conçue pour répondre à ses besoins.Cependant, bien que les tranches de réseau puissent être conçues en activant ou en désactivant certaines fonctions réseau, les mécanismes d'authentification et de contrôle d'accès (AAC) restent les mêmes pour toutes les tranches, avec des composants réseau étroitement couplés.Cette thèse propose 5G-SSAAC (5G Slice-Specific AAC), comme première étape pour introduire une conception à couplage plus lâche dans l'ensemble de l'architecture de réseau 5G. 5G-SSAAC permet aux réseaux 5G de fournir divers mécanismes AAC aux tiers selon leurs exigences de sécurité. Pour évaluer ce mécanisme innovant, la thèse analyse les conséquences de l'utilisation du 5G-SSAAC sur la sécurité de l'ensemble du système 5G. La faisabilité du 5G-SSAAC est également présentée avec la mise en œuvre d'un réseau mobile entièrement virtualisé via un banc d'essai basé sur OAI (Open Air Interface). Ce travail évalue enfin l'impact du mécanisme 5G-SSAAC sur la charge du réseau compte tenu du nombre prévu de messages de signalisation AAC par rapport aux mécanismes AAC existants dans les réseaux cellulaires
The fifth generation of mobile cellular networks, 5G, is designed to support a set of new use cases and requirements, e.g. concerning quality of service or security. Using the virtualization technologies and the concept of network slicing, the 5G network operators will be able to provide specific connectivity capabilities in order to support these various use cases. Each network slice can be dedicated to a 3rd party (i.e., any business actor that is not the network operator), and be designed to fit its requirements.However, although network slices can be designed by enabling or disabling certain network functions, the Authentication and Access Control (AAC) mechanisms remain the same for all slices, with tightly coupled network components.This thesis proposes 5G-SSAAC (5G Slice-Specific AAC), as an initial step to introduce a more loosely coupled design into the whole 5G network architecture. 5G-SSAAC enables 5G networks to provide various AAC mechanisms to the 3rd parties according to their security requirements. To assess this innovative mechanism, the thesis analyses the consequences of using the 5G-SSAAC on the security of the whole 5G system. The feasibility of the 5G-SSAAC is also presented with the implementation of a fully virtualized mobile network through an OAI (Open Air Interface) based testbed. This work finally evaluates the impact of 5G-SSAAC mechanism on the network load considering the anticipated number of AAC signalling messages compared to the existing AAC mechanisms in cellular networks
Styles APA, Harvard, Vancouver, ISO, etc.
4

OLSSON, JOAKIM. « Method for gesture based authentication in physical access control ». Thesis, KTH, Maskinkonstruktion (Inst.), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209339.

Texte intégral
Résumé :
ASSA Abloy är den största globala leverantören av intelligenta lås och säkerhetslösningar. Företaget strävar ständigt efter att utveckla nya och innovativa lösningar för fysisk passerkontroll. Ett koncept som företaget ville undersöka riktade sig mot att göra det möjligt för användaren att enkelt låsa upp en dörr med hjälp av gester, vilket resulterar i en användarvänlig upplevelse. Tanken var att använda en wearable som en credential-enhet och identifiera användarens gester med sensorerna som tillhandahålls av denna. Gesten som används i denna avhandling var knackar, vilket innebär att användaren låser uppdörren genom att knacka på den. Huvudsyftet med detta arbete var att utveckla ett system som tillåter knackar att användas som en metod för autentisering och att utvärdera systemet baserat på systemsäkerhet och användarvänlighet. Systemet som har utvecklats består av två accelerometersensorer; en belägen i wearablen och en belägen i låset/dörren. Signalerna från varje sensor bearbetas och analyseras för att detektera knackar. Tidskorrelationen mellan knackar som detekteras av varje sensor analyseras för att kontrollera att de härstammar från samma användare. En teoretisk modell av systemet har utvecklats för att underlätta utvärdering av systemet. Utvärderingen av systemet visade att både systemetsäkerheten och användarvänligheten uppnår tillfredsställande värden. Denna avhandling visar att konceptet har stor potential men det krävs ytterligare arbete. Metoderna som har används för att utvärdera systemet i denna avhandling kan på samma sätt användas för att utvärdera system under fortsatt arbete.
ASSA Abloy is the largest global supplier of intelligent locks and security solutions. The company constantly strives to develop new and innovative solutions for physical access control. One concept the company wanted to investigate aimed to allow the user to effortlessly unlock a door using gestures, resulting in a seamless experience. The idea was to use a wearable as a credential device and identifying the user gestures with the sensors supplied by the wearable. The gesture used in this thesis project were knocks, meaning that the user unlocks the door by knocking on it. The main objective of this thesis project was to develop a system allowing knocks to be used as a method of authentication and evaluate the system based on system security and user convenience. The system developed consists of two accelerometer sensors; one located in the wearable and one located in the lock/door. The signals from each sensor are processed and analyzed to detect knocks. The time correlation between the knocks detected by each sensor are analyzed to verify that they originate from the same user. A theoretical model of the system was developed to facilitate the evaluation of the system. The evaluation of the system showed that both the system security and the user continence attained satisfying values. This thesis shows that the concept has high potential but further work is needed. The framework of methods used to evaluate the system in this thesis can in the same way be used to evaluate systems during any further work.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Burdis, Keith Robert. « Distributed authentication for resource control ». Thesis, Rhodes University, 2000. http://hdl.handle.net/10962/d1006512.

Texte intégral
Résumé :
This thesis examines distributed authentication in the process of controlling computing resources. We investigate user sign-on and two of the main authentication technologies that can be used to control a resource through authentication and providing additional security services. The problems with the existing sign-on scenario are that users have too much credential information to manage and are prompted for this information too often. Single Sign-On (SSO) is a viable solution to this problem if physical procedures are introduced to minimise the risks associated with its use. The Generic Security Services API (GSS-API) provides security services in a manner in- dependent of the environment in which these security services are used, encapsulating security functionality and insulating users from changes in security technology. The un- derlying security functionality is provided by GSS-API mechanisms. We developed the Secure Remote Password GSS-API Mechanism (SRPGM) to provide a mechanism that has low infrastructure requirements, is password-based and does not require the use of long-term asymmetric keys. We provide implementations of the Java GSS-API bindings and the LIPKEY and SRPGM GSS-API mechanisms. The Secure Authentication and Security Layer (SASL) provides security to connection- based Internet protocols. After finding deficiencies in existing SASL mechanisms we de- veloped the Secure Remote Password SASL mechanism (SRP-SASL) that provides strong password-based authentication and countermeasures against known attacks, while still be- ing simple and easy to implement. We provide implementations of the Java SASL binding and several SASL mechanisms, including SRP-SASL.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Subils, Jean-Baptiste. « Authentication Via Multiple Associated Devices ». Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5778.

Texte intégral
Résumé :
This thesis presents a practical method of authentication utilizing multiple devices. The factors contributing to the practicality of the method are: the utilization of devices already commonly possessed by users and the amenability to being implemented on a wide variety of devices. The term “device” refers to anything able to perform cryptographic operations, store data, and communicate with another such device. In the method presented herein, multiple devices need to be associated with a single user to provide this user an identity in the system. A public key infrastructure is used to provide this identity. Each of the devices associated with a user possesses a public and private key which allow cryptographic operations to be performed. These operations include signing and encrypting data and will prove the identity of each device. The addition of these identities helps authenticate a single user. A wide variety of devices qualifies to be used by this authentication method. The minimum requirements are: the storage of data such as a private key, the ability to communicate, and a processor to perform the cryptographic operations. Smart devices possess these requirements and the manufacture of such devices can be realized at a reasonable cost. This method is malleable and implemented in numerous authentication protocols. This thesis illustrates and explains several instances of these protocols. The method’s primary novelty is its resistance to theft-based attacks, which results from the utilization of multiple devices to authenticate users. A user associated with multiple devices needs to be in possession of these devices to correctly perform the authentication task. This thesis focuses on the system design of this novel authentication method.
Styles APA, Harvard, Vancouver, ISO, etc.
7

May, Brian 1975. « Scalable access control ». Monash University, School of Computer Science and Software, 2001. http://arrow.monash.edu.au/hdl/1959.1/8043.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Yildirim, Merve. « Security and usability in password authentication ». Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/71873/.

Texte intégral
Résumé :
This thesis investigates the human-factor problems in password authentication and proposes some usable solutions to these problems by focusing on both forms of knowledge based authentication: textual passwords and graphical passwords. It includes a range of empirical studies to examine users' password-related behaviour and practices in authentication, and helps users to adopt secure password behaviour. This thesis consists of two parts. The first part focuses on traditional text-based passwords. Design flaws and usability issues of existing text-password mechanisms used by many organisations cause employees to adopt insecure password practices. The first work in this thesis investigates the reasons for employees' lack of motivation regarding password protection against security failures. An empirical study is conducted to identify the factors causing employees' insecure behaviours in organisations, and several persuasion strategies are tested to persuade employees to use passwords more safely. The results of the study revealed that some persuasion strategies are effective in motivating users to adopt good password practices. The study also found that the failure of password policies and authentication schemes deployed by organisations is a common problem among the organisations. Considering the results of the first study, in the second work of this thesis, a password guideline/advice study is conducted to help users to create stronger and more memorable passwords. A password guideline including a number of password creation methods and a persuasive message is proposed, and its effectiveness in improving the strength of user-chosen passwords is evaluated. The results show that the users who received the proposed guideline produced stronger and more memorable passwords than the users followed the usual password restrictions while creating their passwords. The results also demonstrate that the given password creation methods can be helpful and inspirational for users to create their own encryption formula. All these works reveal the weaknesses of user-chosen textual passwords and inefficacy of existing text-based password mechanisms. Although these studies show that text-based password mechanisms can be strengthened, they are still problematic where usability is concerned. Thus, the second part of this thesis focuses on another form of knowledge-based authentication: graphical passwords. A novel hybrid authentication scheme integrating text and images is introduced to minimise the brute force and shoulder surfing attacks which text and graphical passwords suffer. In the last work of this thesis, the proposed hybrid scheme is implemented and evaluated. The evaluation shows that the proposed scheme provides security and usability at the same time, and it also makes the password creation process enjoyable for users. In summary, the thesis contributes to the analysis of some key security and usability problems which arise in knowledge-based authentication. A series of empirical studies has been conducted. Based on their results, usable solutions to the human-factor problems in password-based authentication are proposed and evaluated.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Shen, Ziyi. « Red Door : Firewall Based Access Control in ROS ». Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1752358/.

Texte intégral
Résumé :
ROS is a set of computer operating system framework designed for robot software development, and Red Door, a lightweight software firewall that serves the ROS, is intended to strengthen its security. ROS has many flaws in security, such as clear text transmission of data, no authentication mechanism, etc. Red Door can achieve identity verification and access control policy with a small performance loss, all without modifying the ROS source code, to ensure the availability and authentication of ROS applications to the greatest extent.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Ceccato, Silvia. « Security in Global Navigation Satellite Systems : authentication, integrity protection and access control ». Doctoral thesis, Università degli studi di Padova, 2019. http://hdl.handle.net/11577/3425426.

Texte intégral
Résumé :
In the last decades the use of Global Navigation Satellite System (GNSS) positioning has spread through numerous commercial applications and permeated our daily life. Matching this growing interest for precise positioning worldwide, new systems have been designed and deployed, such as Galileo, the European GNSS. As these systems are relied upon in an ever growing number of safety critical applications, it is vital to devise protections and countermeasures against any threats that may target GNSS modules to harm underlying service. The potential economical advantage that derives from disrupting or manipulating the service is indeed an incentive for malicious users to devise smarter and more sophisticated threats. This thesis tackles the evolution of attacks and corresponding security measures in GNSS, investigating state-of-the-art approaches from both the attacker’s and the system’s point of view. The work focuses on various security targets, such as authentication, integrity protection and access control, exploring threats and solutions at both signal and data level. Securing GNSS from malicious entities indeed requires protecting all of its components: the navigation message, the signal-in-space and the computed Position, Velocity and Time (PVT). All three domains are investigated with the aim of assessing the vulnerability of the system to state-of-the-art threats and providing guidelines for the addition of future security features.
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "LI. Authentication, and access control"

1

Boonkrong, Sirapat. Authentication and Access Control. Berkeley, CA : Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6570-3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Tricia, Ballad, et Banks Erin K, dir. Access control, authentication, and public key infrastructure. Sudbury, MA : Jones & Bartlett Learning, 2011.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Library public access workstation authentication. Washington, D.C : Association of Research Libraries, Office of Leadership and Management Services, 2003.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

802.1X port-based authentication. Boca Raton : Auerbach, 2007.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Brown, Edwin Lyle. 802.1X Port-Based Authentication. London : Taylor and Francis, 2006.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

National Institute of Standards and Technology (U.S.) et RAND Homeland Security and Defense Center, dir. Influences on the adoption of multifactor authentication. Santa Monica : RAND, 2011.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Libicki, Martin C. Influences on the adoption of multifactor authentication. Santa Monica : RAND, 2011.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

E, Koontz John, Devaney Judith E. 1943-, National Institute of Standards and Technology (U.S.) et United States. Dept. of Energy, dir. An authentication framework for Web access to remote hosts. Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

National Institute of Standards and Technology (U.S.). Entity authentication using public key cryptography. Gaithersburg, MD : Information Technology Laboratory, National Institute of Standards and Technology, 1997.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Burnett, Mark. Perfect Passwords : Selection, Protection, Authentication. Massachusetts, USA : Syngress, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "LI. Authentication, and access control"

1

Boonkrong, Sirapat. « Biometric Authentication ». Dans Authentication and Access Control, 107–32. Berkeley, CA : Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Boonkrong, Sirapat. « Password-Based Authentication ». Dans Authentication and Access Control, 71–105. Berkeley, CA : Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Boonkrong, Sirapat. « Multi-factor Authentication ». Dans Authentication and Access Control, 133–62. Berkeley, CA : Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Basin, David, Patrick Schaller et Michael Schläpfer. « Authentication and Access Control ». Dans Applied Information Security, 47–67. Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24474-2_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Boonkrong, Sirapat. « Introduction to Cryptography ». Dans Authentication and Access Control, 1–30. Berkeley, CA : Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Boonkrong, Sirapat. « Public Key Infrastructure ». Dans Authentication and Access Control, 31–43. Berkeley, CA : Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Boonkrong, Sirapat. « Methods and Threats of Authentication ». Dans Authentication and Access Control, 45–70. Berkeley, CA : Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Boonkrong, Sirapat. « Authentication and Key Establishment Protocols ». Dans Authentication and Access Control, 163–95. Berkeley, CA : Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Boonkrong, Sirapat. « Current and Future Trends ». Dans Authentication and Access Control, 197–222. Berkeley, CA : Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Kirkpatrick, Michael, et Elisa Bertino. « Context-Dependent Authentication and Access Control ». Dans iNetSec 2009 – Open Research Problems in Network Security, 63–75. Berlin, Heidelberg : Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05437-2_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "LI. Authentication, and access control"

1

Nabeel, Mohamed. « Session details : Access Control and Authentication ». Dans CODASPY '18 : Eighth ACM Conference on Data and Application Security and Privacy. New York, NY, USA : ACM, 2018. http://dx.doi.org/10.1145/3258528.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Qi, Lin, et Li Zhi. « Authentication and Access Control in Satellite Network ». Dans 2010 Third International Symposiums on Electronic Commerce and Security (ISECS). IEEE, 2010. http://dx.doi.org/10.1109/isecs.2010.12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Cvrček, Tadeáš, et Petr Dzurenda. « Access Control System Using Multi-factor Authentication ». Dans STUDENT EEICT 2022. Brno : Fakulta elektrotechniky a komunikacnich technologii VUT v Brne, 2022. http://dx.doi.org/10.13164/eeict.2022.190.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Fu, Zhi, et John C. Strassner. « Access Control and Authentication for Converged Wireless Networks ». Dans 2006 Third Annual International Conference on Mobile and Ubiquitous Systems : Networking & Services. IEEE, 2006. http://dx.doi.org/10.1109/mobiq.2006.340423.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Fu, Zhi, et John C. Strassner. « Access Control and Authentication for Converged Wireless Networks ». Dans 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems. IEEE, 2006. http://dx.doi.org/10.1109/mobiqw.2006.361755.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Nick, William, Joseph Shelton, Cory Sabol et Albert Esterline. « Federated protocol for biometric authentication and access control ». Dans 2017 Computing Conference. IEEE, 2017. http://dx.doi.org/10.1109/sai.2017.8252195.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

de Oliveira, Adriana Esmeraldo, Gustavo Henrique Matos Bezerra Motta et Leonardo Vidal Batista. « A multibiometric access control architecture for continuous authentication ». Dans 2010 IEEE International Conference on Intelligence and Security Informatics. IEEE, 2010. http://dx.doi.org/10.1109/isi.2010.5484746.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Bao, Lichun. « Location Authentication Methods for Wireless Network Access Control ». Dans 2008 IEEE International Performance Computing and Communications Conference (IPCCC). IEEE, 2008. http://dx.doi.org/10.1109/pccc.2008.4745118.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Xu, Cheng, Jianliang Xu, Haibo Hu et Man Ho Au. « When Query Authentication Meets Fine-Grained Access Control ». Dans SIGMOD/PODS '18 : International Conference on Management of Data. New York, NY, USA : ACM, 2018. http://dx.doi.org/10.1145/3183713.3183741.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

« CERTIFICATE-BASED ACCESS CONTROL AND AUTHENTICATION FOR DHCP ». Dans 1st International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001396100990106.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "LI. Authentication, and access control"

1

Narayan, K., et D. Nelson. Using Authentication, Authorization, and Accounting Services to Dynamically Provision View-Based Access Control Model User-to-Group Mappings. Sous la direction de R. Presuhn. RFC Editor, décembre 2010. http://dx.doi.org/10.17487/rfc6065.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie