Search

Your search keyword '"Lightweight Extensible Authentication Protocol"' showing total 2,166 results

Search Constraints

Start Over You searched for: Descriptor "Lightweight Extensible Authentication Protocol" Remove constraint Descriptor: "Lightweight Extensible Authentication Protocol"
2,166 results on '"Lightweight Extensible Authentication Protocol"'

Search Results

1. PersonaIA: A Lightweight Implicit Authentication System Based on Customized User Behavior Selection

2. Secure and Efficient Initialization and Authentication Protocols for SHIELD

3. Towards User Authentication Requirements for Mobile Computing

4. A Novel and Robust Authentication Factor Based on Network Communications Latency

5. Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment

6. UFace: Your universal password that no one can see

7. AccessAuth: Capacity-aware security access authentication in federated-IoT-enabled V2G networks

8. Secure server-server communication for dual stage biometrics – based password authentication scheme

9. On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

10. Kontun: A Framework for recommendation of authentication schemes and methods

11. Reliable Cooperative Authentication for Vehicular Networks

12. Improving the security of the Hwang-Su protocol for mobile networks

13. A lightweight multi-layer authentication protocol for wireless body area networks

14. Selective disclosure and yoking-proof based privacy-preserving authentication scheme for cloud assisted wearable devices

15. Smart card-based secure authentication protocol in multi-server IoT environment

16. Authentication Protocol Design and Low-Cost Key Encryption Function Implementation for Wireless Sensor Networks

17. Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks

18. An Authentication Key Establish Protocol for WSNs Based on Combined Key

19. A secure and privacy-preserving lightweight authentication protocol for wireless communications

20. Towards port-knocking authentication methods for mobile cloud computing

21. Secure and efficient hand-over authentication in WLAN using elliptic curve RSA

22. Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks

23. Efficient end-to-end authentication protocol for wearable health monitoring systems

25. LWDSA: light-weight digital signature algorithm for wireless sensor networks

26. Multi‐receiver authentication scheme with hierarchical structure

27. COMPARATIVE ANALYSIS OF INTERNET OF THINGS LIGHTWEIGHT AUTHENTICATION PROTOCOL DESIGN SCHEMES

28. MULTI-FACTOR AUTHENTICATION USING A NOVEL APPROACH IN THE CLOUD

29. Biometrics Data Security Techniques for Portable Mobile Devices

30. Effective Authentication Data Security

31. A robust mutual authentication scheme for session initiation protocol with key establishment

32. An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications

33. Efficient and Scalable Query Authentication for Cloud-Based Storage Systems with Multiple Data Sources

34. Physical-Layer Authentication Based on Extreme Learning Machine

35. An Authentication Protocol based on Kerberos

36. A Study on gateway authentication protocol in IoT

37. A Review on Authentication and Privacy Key Management Protocol in WiMax

39. Tamper‐aware authentication framework for wireless sensor networks

40. Enhanced PKI authentication with trusted product at claimant

41. Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets

42. Lightweight Anonymous Authentication Protocols for RFID Systems

43. 3D Authentication Systems

44. Blockchain-Based IoT Device Authentication Scheme

45. Secure Remote User Authentication Protocol against Privileged-Insider Attack

46. Revisit on the security of authentication protocol for multi-gateway wireless sensor networks

47. A Study on the Smartcard-Based Authentication Protocol Design with Advanced Security in the Multiple Server Environments

48. Provably secure biometric based authentication and key agreement protocol for wireless sensor networks

49. A concept of continuous user authentication based on behavioral biometrics

50. A two way authentication using bilinear mapping function for wireless sensor networks

Catalog

Books, media, physical & digital resources