Cognitive Based Authentication Protocol for Distributed Data and Web Technologies
The objective of the verification process, besides guaranteeing security, is also to be effective and robust. This means that the login should take as little time as possible, and each time allow for a successful authentication of the authorised account. In recent years, however, online users have b...
Guardado en:
Autores principales: | Natalia Krzyworzeka, Lidia Ogiela, Marek R. Ogiela |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
MDPI AG
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/5adc7bbc18864ed3a155f4e08a7efbe8 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Ejemplares similares
-
A CAN-Bus Lightweight Authentication Scheme
por: Jia-Ning Luo, et al.
Publicado: (2021) -
Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach
por: Abel Z. Agghey, et al.
Publicado: (2021) -
Implementation of Five Calls Reminder (FCR) as the Adaptive Muroja’ah (Memorization) Method for the Qur’an at Daarunnajah Magelang Islamic Boarding School
por: Laila Sangadah, et al.
Publicado: (2020) -
A High-Density EEG Study Investigating VR Film Editing and Cognitive Event Segmentation Theory
por: Feng Tian, et al.
Publicado: (2021) -
Visual cognition
Publicado: (1994)