Search Results

There are 24994 results for: content related to: Authentication Projects For Historical Fiction: Do You Believe It?

  1. On the authentication and re-authentication protocols in LTE-WLAN interworking architecture

    Transactions on Emerging Telecommunications Technologies

    Kamal Ali Alezabi, Fazirulhisyam Hashim, Shaiful J. Hashim, Borhanuddin M. Ali and Abbas Jamalipour

    Version of Record online : 3 MAR 2016, DOI: 10.1002/ett.3031

  2. Comprehensive analysis of the authentication methods in wireless body area networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4777–4803, Mohammad Masdari and Safiyeh Ahmadzadeh

    Version of Record online : 17 OCT 2016, DOI: 10.1002/sec.1642

  3. Authentication

    Standard Article

    The Internet Encyclopedia

    Patrick McDaniel

    Published Online : 15 APR 2004, DOI: 10.1002/047148296X.tie005

  4. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1378–1407, Rajeev Singh and Teek Parval Sharma

    Version of Record online : 21 AUG 2014, DOI: 10.1002/sec.1079

  5. Group Authentication: A New Paradigm for Emerging Applications

    Bell Labs Technical Journal

    Volume 17, Issue 3, December 2012, Pages: 157–173, Ioannis Broustis, Ganapathy S. Sundaram and Harish Viswanathan

    Version of Record online : 27 DEC 2012, DOI: 10.1002/bltj.21566

  6. A Navigation Message Authentication Proposal for the Galileo Open Service

    Navigation

    Volume 63, Issue 1, Spring 2016, Pages: 85–102, Ignacio Fernández-Hernández, Vincent Rijmen, Gonzalo Seco-Granados, Javier Simon, Irma Rodríguez and J. David Calle

    Version of Record online : 28 APR 2016, DOI: 10.1002/navi.125

  7. Authentication process enhancements in WiMAX networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4703–4725, Kamal Ali Alezabi, Fazirulhisyam Hashim, Shaiful Jahari Hashim, Borhanuddin M. Ali and Abbas Jamalipour

    Version of Record online : 16 AUG 2016, DOI: 10.1002/sec.1577

  8. An efficient authentication system of smart device using multi factors in mobile cloud service architecture

    International Journal of Communication Systems

    Volume 28, Issue 4, 10 March 2015, Pages: 659–674, Young-Sik Jeong, Ji Soo Park and Jong Hyuk Park

    Version of Record online : 16 JAN 2014, DOI: 10.1002/dac.2694

  9. A hidden mutual authentication protocol for low-cost RFID tags

    International Journal of Communication Systems

    Volume 24, Issue 9, September 2011, Pages: 1196–1211, Jung-Shian Li and Kun-Hsuan Liu

    Version of Record online : 31 JAN 2011, DOI: 10.1002/dac.1222

  10. Constructing authentication web in cloud computing

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2843–2860, Gansen Zhao, Zhongjie Ba, Xinming Wang, Feng Zhang, Changqin Huang and Yong Tang

    Version of Record online : 13 FEB 2015, DOI: 10.1002/sec.1202

  11. A novel group access authentication and key agreement protocol for machine-type communication

    Transactions on Emerging Telecommunications Technologies

    Volume 26, Issue 3, March 2015, Pages: 414–431, Chengzhe Lai, Hui Li, Xiaoqing Li and Jin Cao

    Version of Record online : 10 APR 2013, DOI: 10.1002/ett.2635

  12. Improved handover authentication and key pre-distribution for wireless mesh networks

    Concurrency and Computation: Practice and Experience

    Volume 28, Issue 10, July 2016, Pages: 2978–2990, Xu Yang, Xinyi Huang, Jinguang Han and Chunhua Su

    Version of Record online : 3 AUG 2015, DOI: 10.1002/cpe.3544

  13. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3282–3299, Jin Cao, Maode Ma and Hui Li

    Version of Record online : 22 APR 2015, DOI: 10.1002/sec.1252

  14. Secure handover for Proxy Mobile IPv6 in next-generation communications: scenarios and performance

    Wireless Communications and Mobile Computing

    Volume 11, Issue 2, February 2011, Pages: 176–186, Jong-Hyouk Lee and Tai-Myoung Chung

    Version of Record online : 22 DEC 2009, DOI: 10.1002/wcm.895

  15. An enhanced authentication protocol for WRANs in TV white space

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2267–2278, Cong Wang, Maode Ma and Zenghua Zhao

    Version of Record online : 23 JAN 2015, DOI: 10.1002/sec.1171

  16. User authentication scheme preserving anonymity for ubiquitous devices

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3131–3141, Benchaa Djellali, Kheira Belarbi, Abdallah Chouarfia and Pascal Lorenz

    Version of Record online : 26 MAR 2015, DOI: 10.1002/sec.1238

  17. Reliability enhancement for CIR-based physical layer authentication

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 661–671, Jiazi Liu, Ahmed Refaey, Xianbin Wang and Helen Tang

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1014

  18. Lightweight and provably secure user authentication with anonymity for the global mobility network

    International Journal of Communication Systems

    Volume 24, Issue 3, March 2011, Pages: 347–362, Chun Chen, Daojing He, Sammy Chan, Jiajun Bu, Yi Gao and Rong Fan

    Version of Record online : 16 JUN 2010, DOI: 10.1002/dac.1158

  19. An authentication, authorization, and accounting mechanism for 3G/WLAN networks

    Security and Communication Networks

    Volume 9, Issue 6, April 2016, Pages: 468–480, Wei-Chen Wu and Horng-Twu Liaw

    Version of Record online : 2 JUL 2013, DOI: 10.1002/sec.830

  20. sRAMP: secure reconfigurable architecture and mobility platform

    Security and Communication Networks

    Volume 4, Issue 4, April 2011, Pages: 395–409, Shao-Hsiu Hung, Jui-Hung Yeh and Jyh-Cheng Chen

    Version of Record online : 11 JAN 2010, DOI: 10.1002/sec.167