Distributed Authentication
Deployment Example 1: Access Manager 7.1 Load Balancing, Distributed Authentication UI, and Session Failover
306
2. PREVAILING AUTHENTICATION SCHEMES 3. DISTRIBUTED AUTHENTICATION. 3.1 Single Base Station Scenario
5
Highly Secure Distributed Authentication and Intrusion Detection with DataFusion in MANET
5
Mobile distributed authentication protocol
5
Static Knowledge-Based Authentication Mechanism for Hadoop Distributed Platform using Kerberos
9
Analysis of Frequent Itemset generation process in Apriori and RCS (Reduced Candidate Set) Algorithm
6
Reviewing MANETs & Configurations of Certification Authority (CA) for node Authentication
5
A Generic View on the Unified Zero-Knowledge Protocol and its Applications
12
The Use of Standards in HELIO
10
Moving from Security to Distributed Trust in Ubiquitous Computing Environments
6
Digital signature predicated and authentication distributed key management in Cloud computing
10
INTELLIGENT SELF TUNING PID CONTROLLER USING HYBRID IMPROVED PARTICLE SWARM OPTIMIZATION FOR ULTRASONIC MOTOR
9
Collaborative Intrusion Detection leveraging Blockchain and Pluggable Authentication Modules
7
Cryptographic Authentication for Real-Time Network Protocols 1,2
7
Implementing High Grade Security in Cloud Application using Multifactor Authentication and Cryptography
9
Survey on Real Time Broadcast Authentication Schemes for Command and Control Messages
5
Vol 3, No 12 (2015)
5
SRC RR 125 pdf
33
A Survey of Authentication Methods in Cloud Computing
5
Adaptive Security Modules in Incrementally Deployed Sensor Networks
17