All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Filters

4 217 (0,079s)

Result

Omnifactor authentication

At present, many authors looking for new and new authentication methods [1] [2 authentication methods combine to other, and thus multi-factor authentication will arise authentication methods. Users can choose to us...

Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

  • 2018
  • D
  • Link
Result

Flexible authentication framework with bound authentication and authorization

User authentication analysis with a new AAA framework design based on authentication protocol assessment and appropriate choice.

BD - Teorie informace

  • 2009
  • Jx
Result

The Authentical Reality in Fiction? The Ethical Aspects of the Literary Practice

The paper interprets the approach to the authenticity in literary theory and philosophy. At the start it mentions the concept of the authenticity as an opposite the fiction, the issue of authenticity of reality outside lite...

AA - Filosofie a náboženství

  • 2015
  • Jx
Result

Multi-Factor Authentication Modeling

The work defines a multi-factor authentication model in case the application supports multiple authentication factors. The aim of this modeling is to find acceptable authentication methods sufficient to access specifically ...

Applied mathematics

  • 2019
  • D
  • Link
Result

Implementation of authentication terminal

This paper describes implementation of authentication terminal in access management using advanced authentication methods.

JA - Elektronika a optoelektronika, elektrotechnika

  • 2011
  • D
Result

Authentication and Authorization Applications in 4G Networks

This contribution to discuss the possibility of strong authentication algorithm AKA with other authentication algorithms. Combination of two algorithms will be createdstrong multifactor authentication, which is suitable for...

IN - Informatika

  • 2015
  • D
  • Link
Result

Authentication on low cost devices

This paper deals with authentication on low-cost devices. Security properties for secure authentication protocol are specified herein. Based on these security properties we proposed four simple authentication protocols for ...

JA - Elektronika a optoelektronika, elektrotechnika

  • 2015
  • Jx
Result

Multifactor Authentication Device

This paper describes a Multifactor authentication device, the main features, more robust and more secure solutions for users or systems authentication brings trustworthy authentication devices. Nowadays one or two factor

JA - Elektronika a optoelektronika, elektrotechnika

  • 2011
  • D
Result

Unilateral Authentication on Low-cost Devices

This paper deals with unilateral authentication on low-cost devices. Security properties for secure authentication protocol are specified herein. Based on these security properties we proposed four simple unilateral authenticati...

Electrical and electronic engineering

  • 2015
  • D
  • Link
Result

Strong Authentication for Internet Application

This contribution discusses algorithms for strong authentication authentication using USIM / ISIM smart cards based on AKA algorithm. The problem of this authentication is that this authentication is under the sole...

Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

  • 2017
  • D
  • 1 - 10 out of 4 217