Results 11 to 20 of about 118,033 (317)
Quantum authentication protocol [PDF]
In this letter, we proposed a quantum authentication protocol. The authentication process is implemented by the symmetric cryptographic scheme with quantum effects.
Guihua Zeng, Guang-Can Guo
openalex +3 more sources
A Novel Protocol Using Captive Portals for FIDO2 Network Authentication [PDF]
FIDO2 authentication is starting to be applied in numerous web authentication services, aiming to replace passwords and their known vulnerabilities. However, this new authentication method has not been integrated yet with network authentication systems ...
Martiño Rivera-Dourado+3 more
doaj +2 more sources
The Essence of Authenticity [PDF]
In this paper, we build upon the model of authenticity proposed by Lehman and colleagues, which includes the dimensions consistency, conformity, and connection. We expand this “3C-view” by adding a fourth dimension, continuity, which results in what we have come to call “4C-view of authenticity.” We discuss our proposal from a process perspective and ...
Olaf Dammann+8 more
openaire +4 more sources
Authenticity and the ‘Authentic City’ [PDF]
In this paper, I argue that the benefits that smart cities purport to provide cohere poorly with a number of our shared phenomenological intuitions about the relationships(s) between authentic experience and technologised society. While many of these intuitions are, strictly speaking, pseudo-problems, they deserve our attention.
openaire +4 more sources
Wrestling with (in)authenticity [PDF]
None
openaire +5 more sources
Authenticity and Communication [PDF]
Authenticity is not an absolute and constant quality inherent in an object or an experience; it is constructed in the process of research. Actors inscribe and attribute it to both material objects and subjective processes like communication and consumption. This article from the research group seeks on the one hand to reflect on the historical scope of
Fless, F+13 more
openaire +2 more sources
Authentication through Claims-Based Authentication [PDF]
Thinking as far as claims and issuers is an effective reflection that backs better approaches for securing your application. Claims have an understanding with the issuer and allow the claims of the user to be accepted only if the claims are issued by a trusted issuer. Authentication and authorization is explicit in CBAC as compared to other approaches.
Pawan Patil, Ankit Ayyar, Vaishali Gatty
openaire +2 more sources
Authenticity and The Authentic Enterprise [PDF]
Commentary on the Arthur W. Page Society's report, The Authentic Enterprise, and its conceptualisation of authenticity.
openaire +2 more sources
What makes authentic questions authentic? [PDF]
In some approaches to dialogic pedagogy research, authentic questions have long attracted attention, since the prevalence of authentic questions has been used as an indicator of the dialogic quality of classroom activities. However, this article offers an analysis of the concept of authentic questions in the research literature and shows that this ...
openaire +3 more sources
Impact of Globalisation on Data Security – Authentication Issues [PDF]
Research background: In today’s globalised world, there is an increasing need for reliable verification of users’ identity accessing various types of information systems.
Hub Miloslav+1 more
doaj +1 more source