Search

Your search keyword '"Credential"' showing total 893 results

Search Constraints

Start Over You searched for: Descriptor "Credential" Remove constraint Descriptor: "Credential" Topic computer science Remove constraint Topic: computer science
893 results on '"Credential"'

Search Results

1. Delegated Anonymous Credentials With Revocation Capability for IoT Service Chains (DANCIS)

3. Scrutinizing Implementations of Smart Home Integrations

4. The early teacher pipeline: What data do — and don’t — tell us

5. Re-imagining Technology Education for Student Teachers Using Human-Centered Design

7. Skenario Implementasi Sistem Informasi Identitas Digital Dengan Menggunakan WSO2 IS Di STMIK 'AMIKBANDUNG'

8. Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture

9. AI-enabled digital identity – inputs for stakeholders and policymakers

10. Decentralized Anonymous Authentication With Fair Billing for Space-Ground Integrated Networks

11. HashWires: Hyperefficient Credential-Based Range Proofs

12. WiONE: One-Shot Learning for Environment-Robust Device-Free User Authentication via Commodity Wi-Fi in Man–Machine System

13. Blockchain-enabled fog resource access and granting

14. Using the Mathematical Model on Precision Marketing with Online Transaction Data Computing

15. Conceptual Framework of Kxpert:Knowledge-Based Information Retrieval for Expert Profiling

16. Locking the door: tackling credential abuse

17. Who's that knocking at the door? The problem of credential abuse

18. Quantum-Resistant Cryptography for the Internet of Things Based on Location-Based Lattices

19. Learning from learning: detecting account takeovers by identifying forgetful users

20. SBI Model for the Detection of Advanced Persistent Threat Based on Strange Behavior of Using Credential Dumping Technique

21. Economic authentic and anonymous data sharing with forward security

22. An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations

23. A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT

24. Plain text passwords: A forensic RAM-raid

25. Efficient blacklistable anonymous credential system with reputation using a pairing‐based accumulator

26. Indistinguishability and unextractablility of password-based authentication in blockchain

27. Students as Consumers: Retaining Engineering Students by Designing Learner-Centric Courses of Value

28. HomeShield: A Credential-Less Authentication Framework for Smart Home Systems

29. Tracking cryptographic keys and encrypted data using position verification

30. ECCOE: Toward a Robust Solution for the Cross-Institutional Recognition and Validation of Prior Learning

31. A secure n-secret based client authentication protocol for 802.11 WLANs

32. A practical solution to clone problem in anonymous information system

33. Group Signatures with Time-Bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation

34. Token-Based Access Control

35. Android Data-Clone Attack via Operating System Customization

36. Vulnerability Detection on Android Apps–Inspired by Case Study on Vulnerability Related With Web Functions

37. Is credential stuffing the new phishing?

38. ARIES: Evaluation of a reliable and privacy-preserving European identity management framework

39. An Efficient Blacklistable Anonymous Credentials without TTP of Tracing Authority Using Pairing-Based Accumulator

40. Credential Provisioning and Device Configuration with EAP

41. With a Little Help from My Friends

42. All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations

43. Decentralization of Credential Verification System using Blockchain

44. Malicious URL Detection using Multilayer CNN

45. A Biometric Approach for Electronic Healthcare Database System using SAML - A Touchfree Technology

46. It's Badging Time!

47. A Blockchain-Based Verification System for Academic Certificates

48. Mapping Risk Assessment Strategy for COVID-19 Mobile Apps’ Vulnerabilities

49. Pict-Place Authentication: Recognition-based Graphical Password using Image Layout for Better Balance of Security and Operation Time

50. Federated Authorization for Managed Data Sharing: Experiences from the ImPACT Project

Catalog

Books, media, physical & digital resources