-
1
المؤلفون: Hisham A. Kholidy
المصدر: Future Generation Computer Systems. 117:299-320
مصطلحات موضوعية: Profiling (computer programming), Artificial neural network, Computer Networks and Communications, business.industry, Computer science, Information technology, 020206 networking & telecommunications, Cloud computing, 02 engineering and technology, Intrusion detection system, Impersonation attack, computer.software_genre, Hardware and Architecture, Software deployment, NetFlow, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Data mining, business, computer, Software
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::1d28d20eb840b67f9988961dcb4f41c8Test
https://doi.org/10.1016/j.future.2020.12.009Test -
2
المؤلفون: Da-Zhi Sun
المصدر: Symmetry; Volume 13; Issue 10; Pages: 1952
Symmetry, Vol 13, Iss 1952, p 1952 (2021)مصطلحات موضوعية: Scheme (programming language), IoT, replay attack, Physics and Astronomy (miscellaneous), Computer science, Privacy analysis, General Mathematics, Computer security, computer.software_genre, impersonation attack, QA1-939, Computer Science (miscellaneous), Replay attack, computer.programming_language, Authentication, business.industry, key agreement, Impersonation attack, sensing networks, authentication, desynchronization attack, user privacy, User privacy, Chemistry (miscellaneous), Key (cryptography), Internet of Things, business, computer, Mathematics
وصف الملف: application/pdf
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7bb892aaddb080f988f831208b78b9f0Test
-
3
المؤلفون: Izwa Altaf, Akasha Shafiq, Khalid Mahmood, Minahil Rana, Shehzad Ashraf Chaudhry, Mamoun Alazab, Yousaf Bin Zikria
المساهمون: Chaudhry, Shehzad Ashraf
المصدر: Computer Communications. 165:85-96
مصطلحات موضوعية: Password, Authentication, User impersonation, Computer Networks and Communications, business.industry, Network security, Computer science, 020206 networking & telecommunications, 02 engineering and technology, Computer security, computer.software_genre, Network Security, 6G/IoT security, Symmetric-key algorithm, Secure communication, Authentication protocol, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Smart card, business, computer, Protocol (object-oriented programming)
وصف الملف: application/pdf
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6891dac0de8abceec39380e402c3310aTest
https://doi.org/10.1016/j.comcom.2020.11.002Test -
4
المؤلفون: Muhammad Waqas, Shanshan Tu, Jialin Wan, Syed Mudassir Hussain, Muhammad Hanif, Sadaqat Ur Rehman, Ahsan Shah
المصدر: Computers, Materials & Continua. 68:267-281
مصطلحات موضوعية: Biomaterials, Mechanics of Materials, Computer science, Fog computing, Modeling and Simulation, Impersonation attack, Electrical and Electronic Engineering, Computer security, computer.software_genre, computer, Computer Science Applications
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::869daf14cfeece06a736c196b84a36e8Test
https://doi.org/10.32604/cmc.2021.016260Test -
5
المؤلفون: Stanislava Mildeová, Saru Kumari, Mehdi Hosseinzadeh, Amir Masoud Rahmani, Jan Lansky, Mokhtar Mohammadi, Masoumeh Safkhani, Sarkhel H. Taher Karim
المصدر: IEEE Access, Vol 9, Pp 88256-88271 (2021)
مصطلحات موضوعية: Password, Authentication, General Computer Science, Computer science, business.industry, Scyther, General Engineering, Cryptographic protocol, Computer security, computer.software_genre, stolen smart card attack, TK1-9971, impersonation attack, Key (cryptography), traceability attack, Foreign agent, General Materials Science, Global mobility network, Electrical engineering. Electronics. Nuclear engineering, Smart card, Roaming, roaming, business, Mobile device, computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4325027329808e499767f086324b2ee9Test
https://doi.org/10.1109/access.2021.3089102Test -
6
المؤلفون: Takanori Isobe, Ryoma Ito
المصدر: IEEE Access, Vol 9, Pp 90677-90689 (2021)
مصطلحات موضوعية: Zoom, Authentication, Security analysis, General Computer Science, Computer science, business.industry, General Engineering, impersonation attacks, Service provider, Cryptographic protocol, computer.software_genre, Encryption, Computer security, TK1-9971, Videoconferencing, End-to-end encryption, General Materials Science, Electrical engineering. Electronics. Nuclear engineering, end-to-end encryption, business, computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3c4787e6c49c024a8b6a5c6f9db12311Test
https://ieeexplore.ieee.org/document/9462825Test/ -
7
المؤلفون: Shehzad Ashraf Chaudhry, Khalid Yahya, Fadi Al-Turjman, Ming-Hour Yang
المصدر: IEEE Access, Vol 8, Pp 139244-139254 (2020)
مصطلحات موضوعية: General Computer Science, Computer science, Device access control, Access control, Cloud computing, 02 engineering and technology, Man-in-the-middle attack, Computer security, computer.software_genre, device impersonation, Secure communication, IoT access, 0202 electrical engineering, electronic engineering, information engineering, Session key, General Materials Science, Electrical and Electronic Engineering, Resilience (network), Authentication, reliability, business.industry, General Engineering, forged message, 020206 networking & telecommunications, Adversary, Certificate, Key (cryptography), 020201 artificial intelligence & image processing, lcsh:Electrical engineering. Electronics. Nuclear engineering, business, lcsh:TK1-9971, computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3532f43f2b1ba67923beace2395b2754Test
https://doi.org/10.1109/access.2020.3012121Test -
8
المؤلفون: Zahid Ghaffar, Shafiq Ahmed, Khalid Mahmood, Sk Hafizul Islam, Mohammad Mehedi Hassan, Giancarlo Fortino
المصدر: IEEE Access, Vol 8, Pp 47144-47160 (2020)
مصطلحات موضوعية: cloud storage, General Computer Science, Computer science, data sharing, Data management, Data security, Cloud computing, Cryptography, 02 engineering and technology, data owner, Security token, Computer security, computer.software_genre, Data modeling, Secure communication, impersonation attack, Server, 0202 electrical engineering, electronic engineering, information engineering, General Materials Science, Authentication, business.industry, General Engineering, Cyber-physical system, 020206 networking & telecommunications, Data sharing, Data access, Scalability, 020201 artificial intelligence & image processing, lcsh:Electrical engineering. Electronics. Nuclear engineering, business, lcsh:TK1-9971, Cloud storage, computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c05960307336e72a5ffb00ce25c545f9Test
https://doi.org/10.1109/access.2020.2977264Test -
9
المؤلفون: Seyed Farhad Aghili, Hamid Mala
المصدر: Peer-to-Peer Networking and Applications. 13:816-824
مصطلحات موضوعية: 020203 distributed computing, Authentication, Correctness, Traceability, Computer Networks and Communications, Computer science, Data_MISCELLANEOUS, 020206 networking & telecommunications, Eavesdropping, 02 engineering and technology, Impersonation attack, Computer security, computer.software_genre, Authentication protocol, 0202 electrical engineering, electronic engineering, information engineering, Session (computer science), computer, Protocol (object-oriented programming), Software
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::e7ab96e5481a69b8f6757fb68846d03eTest
https://doi.org/10.1007/s12083-019-00830-3Test -
10
المؤلفون: shin kwang cheul
المصدر: Journal of Knowledge Information Technology and Systems. 14:479-489
مصطلحات موضوعية: Scheme (programming language), Biometrics, business.industry, Computer science, Mutual authentication, Impersonation attack, Computer security, computer.software_genre, Public-key cryptography, Smart card, business, computer, computer.programming_language, Anonymity
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::d6a58aa18fa56078c1c83cda5a01cf94Test
https://doi.org/10.34163/jkits.2019.14.5.005Test