Linked e-resources

Details

Authentication and authorization techniques
Authentication and authorization for interoperable IoT architecture
Bringing Access Control Tree to Big Data
SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme
A Protocol to Strengthen Password-Based Authentication(short paper)
Managing Private Credentials by Privacy-Preserving Biometrics
Policy Support for Autonomous Swarms of Drones
Violation Detection and Countermeasures
A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts
Towards a Framework for Testing the Security of IoT Devices Consistently
Misuse Detection in a Simulated IaaS Environment
Dissuading Stolen Password Reuse.

Browse Subjects

Show more subjects...

Statistics

from
to
Export