Results 111 to 120 of about 80,549 (150)
Some of the next articles are maybe not open access.

Related searches:

Authentication and Mutual Authentication

2014
In a sensitive environment, it is common to implement user authentication, possibly based on several factors, in order to ensure only authorized users have access to restricted features or information. But today more and more devices are interacting directly to perform some actions, or deliver a high level service to their user, like in smart grid and ...
Asad Ali, François Tuot, Gerald Maunier
openaire   +1 more source

Home - About - Disclaimer - Privacy