Search

Your search keyword '"Credential"' showing total 697 results

Search Constraints

Start Over You searched for: Descriptor "Credential" Remove constraint Descriptor: "Credential" Topic computer security Remove constraint Topic: computer security
697 results on '"Credential"'

Search Results

2. Scrutinizing Implementations of Smart Home Integrations

3. Decentralized Anonymous Authentication With Fair Billing for Space-Ground Integrated Networks

4. Blockchain-enabled fog resource access and granting

5. Locking the door: tackling credential abuse

6. Who's that knocking at the door? The problem of credential abuse

7. Quantum-Resistant Cryptography for the Internet of Things Based on Location-Based Lattices

8. Learning from learning: detecting account takeovers by identifying forgetful users

9. SBI Model for the Detection of Advanced Persistent Threat Based on Strange Behavior of Using Credential Dumping Technique

10. Economic authentic and anonymous data sharing with forward security

12. A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT

13. Plain text passwords: A forensic RAM-raid

14. Indistinguishability and unextractablility of password-based authentication in blockchain

15. HomeShield: A Credential-Less Authentication Framework for Smart Home Systems

16. Tracking cryptographic keys and encrypted data using position verification

17. A practical solution to clone problem in anonymous information system

18. Group Signatures with Time-Bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation

19. Vulnerability Detection on Android Apps–Inspired by Case Study on Vulnerability Related With Web Functions

20. ARIES: Evaluation of a reliable and privacy-preserving European identity management framework

21. Zero-Knowledge Proofs Do Not Solve the Privacy-Trust Problem of Attribute-Based Credentials: What if Alice Is Evil?

22. With a Little Help from My Friends

23. All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations

24. Decentralization of Credential Verification System using Blockchain

25. Malicious URL Detection using Multilayer CNN

26. A Biometric Approach for Electronic Healthcare Database System using SAML - A Touchfree Technology

27. Federated Authorization for Managed Data Sharing: Experiences from the ImPACT Project

28. Proposing a reliable method of securing and verifying the credentials of graduates through blockchain

29. Managing Trust and Detecting Malicious Groups in Peer-to-Peer IoT Networks

30. An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment

31. Decentralized blacklistable anonymous credentials with reputation

32. TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment

33. Isilon Credential Vault: An Authentication Provider

34. Securing e-voting based on blockchain in P2P network

36. Understanding the credential theft lifecycle

37. A Mechanism for Verifying the Integrity and Immutability of Tuberculosis Data Using IOTA Distributed Ledger Technology

38. Security Analyses of Misbehavior Tracking in Bitcoin Network

39. Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution

40. Privacy-Preserving PayString Service

41. A-PoA: Anonymous Proof of Authorization for Decentralized Identity Management

42. Performance Evaluation of Pseudonym Reload over Cellular Technology

43. A Subject-Centric Credential Management Method based on the Verifiable Credentials

44. SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem

45. Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems

46. The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions

47. Privacy ABCs: Now Ready for Your Wallets!

48. Formally Verified Credentials Management for Industrial Control Systems

49. Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass

50. Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting

Catalog

Books, media, physical & digital resources