Filters
Omnifactor authentication
At present, many authors looking for new and new authentication methods [1] [2 authentication methods combine to other, and thus multi-factor authentication will arise authentication methods. Users can choose to us...
Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
- 2018 •
- D •
- Link
Rok uplatnění
D - Stať ve sborníku
Výsledek na webu
Flexible authentication framework with bound authentication and authorization
User authentication analysis with a new AAA framework design based on authentication protocol assessment and appropriate choice.
BD - Teorie informace
- 2009 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
The Authentical Reality in Fiction? The Ethical Aspects of the Literary Practice
The paper interprets the approach to the authenticity in literary theory and philosophy. At the start it mentions the concept of the authenticity as an opposite the fiction, the issue of authenticity of reality outside lite...
AA - Filosofie a náboženství
- 2015 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Multi-Factor Authentication Modeling
The work defines a multi-factor authentication model in case the application supports multiple authentication factors. The aim of this modeling is to find acceptable authentication methods sufficient to access specifically ...
Applied mathematics
- 2019 •
- D •
- Link
Rok uplatnění
D - Stať ve sborníku
Výsledek na webu
Implementation of authentication terminal
This paper describes implementation of authentication terminal in access management using advanced authentication methods.
JA - Elektronika a optoelektronika, elektrotechnika
- 2011 •
- D
Rok uplatnění
D - Stať ve sborníku
Authentication and Authorization Applications in 4G Networks
This contribution to discuss the possibility of strong authentication algorithm AKA with other authentication algorithms. Combination of two algorithms will be createdstrong multifactor authentication, which is suitable for...
IN - Informatika
- 2015 •
- D •
- Link
Rok uplatnění
D - Stať ve sborníku
Výsledek na webu
Authentication on low cost devices
This paper deals with authentication on low-cost devices. Security properties for secure authentication protocol are specified herein. Based on these security properties we proposed four simple authentication protocols for ...
JA - Elektronika a optoelektronika, elektrotechnika
- 2015 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Multifactor Authentication Device
This paper describes a Multifactor authentication device, the main features, more robust and more secure solutions for users or systems authentication brings trustworthy authentication devices. Nowadays one or two factor
JA - Elektronika a optoelektronika, elektrotechnika
- 2011 •
- D
Rok uplatnění
D - Stať ve sborníku
Unilateral Authentication on Low-cost Devices
This paper deals with unilateral authentication on low-cost devices. Security properties for secure authentication protocol are specified herein. Based on these security properties we proposed four simple unilateral authenticati...
Electrical and electronic engineering
- 2015 •
- D •
- Link
Rok uplatnění
D - Stať ve sborníku
Výsledek na webu
Strong Authentication for Internet Application
This contribution discusses algorithms for strong authentication authentication using USIM / ISIM smart cards based on AKA algorithm. The problem of this authentication is that this authentication is under the sole...
Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
- 2017 •
- D
Rok uplatnění
D - Stať ve sborníku
- 1 - 10 out of 4 217