Results 281 to 290 of about 118,033 (317)

Tackling the possibility of extracting a brain digital fingerprint based on personal hobbies predilection. [PDF]

open access: yesFront Neurosci
Andronache C   +5 more
europepmc   +1 more source

A logic of authentication [PDF]

open access: possibleProceedings of the twelfth ACM symposium on Operating systems principles, 1989
Authentication protocols are the basis of security in many distributed systems, and it is therefore essential to ensure that these protocols function correctly. Unfortunately, their design has been extremely error prone. Most of the protocols found in the literature contain redundancies or security flaws.
Roger M. Needham   +2 more
openaire   +4 more sources
Some of the next articles are maybe not open access.

Related searches:

Authentication and Mutual Authentication

2014
In a sensitive environment, it is common to implement user authentication, possibly based on several factors, in order to ensure only authorized users have access to restricted features or information. But today more and more devices are interacting directly to perform some actions, or deliver a high level service to their user, like in smart grid and ...
Gérald Maunier   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy