-
1دورية أكاديمية
المؤلفون: Ergas, Jonathan
المصدر: Wellington Faculty of Engineering Symposium; 2023: Wellington Faculty of Engineering Symposium ; 3021-1220
مصطلحات موضوعية: Software Engineering, User impersonation
وصف الملف: application/pdf
-
2دورية أكاديمية
المؤلفون: Rana, Minahil, Shafiq, Akasha, Altaf, Izwa, Alazab, Mamoun, Mahmood, Khalid, Chaudhry, Shehzad Ashraf, Bin Zikria, Yousaf
المساهمون: Chaudhry, Shehzad Ashraf
مصطلحات موضوعية: Authentication, 6G/IoT security, Network Security, User impersonation
وصف الملف: application/pdf
العلاقة: Computer Communications; Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı; https://hdl.handle.net/11363/4889Test; 165; 85; 96
-
3مؤتمر
المؤلفون: Boni García, Francisco Gortázar, Micael Gallego, Eduardo Jiménez
مصطلحات موضوعية: nd-to-End Testing, User Impersonation, Software as a Service, WebRTC
العلاقة: info:eu-repo/grantAgreement/EC/H2020/731535/; https://zenodo.org/communities/elastestTest; https://zenodo.org/record/1295551Test; https://doi.org/10.5220/0006752207070714Test; oai:zenodo.org:1295551
-
4دورية أكاديمية
المؤلفون: Galih Bangun Santosa, Setiyo Budiyanto
المصدر: TELKOMNIKA Telecommunication, Computing, Electronics and Control 17(2) 561-572
مصطلحات موضوعية: key establishment, lightweight authentication protocol, scyther tool, user impersonation attack, wearable device
العلاقة: https://zenodo.org/record/3963353Test; https://doi.org/10.12928/TELKOMNIKA.v17i2.10344Test; oai:zenodo.org:3963353
-
5دورية أكاديمية
المؤلفون: Santosa, Galih Bangun, Budiyanto, Setiyo
المساهمون: National Crypto Institute, Mercu Buana University
المصدر: TELKOMNIKA (Telecommunication Computing Electronics and Control); Vol 17, No 2: April 2019; 561-572 ; 2302-9293 ; 1693-6930 ; 10.12928/telkomnika.v17i2
مصطلحات موضوعية: key establishment, lightweight authentication protocol, scyther tool, user impersonation attack, wearable device
وصف الملف: application/pdf
العلاقة: http://journal.uad.ac.id/index.php/TELKOMNIKA/article/view/10344/6401Test; http://journal.uad.ac.id/index.php/TELKOMNIKA/article/downloadSuppFile/10344/1436Test; http://journal.uad.ac.id/index.php/TELKOMNIKA/article/view/10344Test
الإتاحة: https://doi.org/10.12928/telkomnika.v17i2.10344Test
https://doi.org/10.12928/telkomnika.v17i2Test
http://journal.uad.ac.id/index.php/TELKOMNIKA/article/view/10344Test -
6
المؤلفون: Izwa Altaf, Akasha Shafiq, Khalid Mahmood, Minahil Rana, Shehzad Ashraf Chaudhry, Mamoun Alazab, Yousaf Bin Zikria
المساهمون: Chaudhry, Shehzad Ashraf
المصدر: Computer Communications. 165:85-96
مصطلحات موضوعية: Password, Authentication, User impersonation, Computer Networks and Communications, business.industry, Network security, Computer science, 020206 networking & telecommunications, 02 engineering and technology, Computer security, computer.software_genre, Network Security, 6G/IoT security, Symmetric-key algorithm, Secure communication, Authentication protocol, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Smart card, business, computer, Protocol (object-oriented programming)
وصف الملف: application/pdf
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6891dac0de8abceec39380e402c3310aTest
https://doi.org/10.1016/j.comcom.2020.11.002Test -
7
المؤلفون: Eduardo Jimenez, Boni García, Micael Gallego, Francisco Gortázar
المصدر: Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development
MODELSWARD
Scopus-Elsevierمصطلحات موضوعية: Service (business), nd-to-End Testing, User Impersonation, Software as a Service, WebRTC, End-to-end principle, Computer science, 0202 electrical engineering, electronic engineering, information engineering, 020206 networking & telecommunications, 020207 software engineering, 02 engineering and technology, Computer security, computer.software_genre, computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cd16933bd10d82832a83dcbf4a48fe7bTest
-
8
المؤلفون: Setiyo Budiyanto, Galih Bangun Santosa
المصدر: TELKOMNIKA (Telecommunication Computing Electronics and Control). 17:561
مصطلحات موضوعية: Scheme (programming language), Authentication, Computer science, business.industry, Data_MISCELLANEOUS, Wearable computer, wearable device, key establishment, lightweight authentication protocol, scyther tool, Computer security, computer.software_genre, Information sensitivity, user impersonation attack, Authentication protocol, Confidentiality, Electrical and Electronic Engineering, business, computer, Protocol (object-oriented programming), Wearable technology, computer.programming_language
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2d866cc3e2111292d35ac6fadff643bcTest
https://doi.org/10.12928/telkomnika.v17i2.10344Test