Results 281 to 290 of about 118,033 (317)
The Design and Implementation of Kerberos-Blockchain Vehicular Ad-Hoc Networks Authentication Across Diverse Network Scenarios. [PDF]
Rahayu M+5 more
europepmc +1 more source
Experimental Assessment of OSNMA-Enabled GNSS Positioning in Interference-Affected RF Environments. [PDF]
Rusu-Casandra A, Lohan ES.
europepmc +1 more source
Tackling the possibility of extracting a brain digital fingerprint based on personal hobbies predilection. [PDF]
Andronache C+5 more
europepmc +1 more source
Formal Security Reassessment of the 5G-AKA-FS Protocol: Methodological Corrections and Augmented Verification Techniques. [PDF]
Ko Y, Pawana IWAJ, You I.
europepmc +1 more source
A logic of authentication [PDF]
Authentication protocols are the basis of security in many distributed systems, and it is therefore essential to ensure that these protocols function correctly. Unfortunately, their design has been extremely error prone. Most of the protocols found in the literature contain redundancies or security flaws.
Roger M. Needham+2 more
openaire +4 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Authentication and Mutual Authentication
2014In a sensitive environment, it is common to implement user authentication, possibly based on several factors, in order to ensure only authorized users have access to restricted features or information. But today more and more devices are interacting directly to perform some actions, or deliver a high level service to their user, like in smart grid and ...
Gérald Maunier+2 more
openaire +2 more sources