X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (11894) 11894
Conference Proceeding (9385) 9385
Publication (691) 691
Book Chapter (574) 574
Magazine Article (459) 459
Trade Publication Article (451) 451
Dissertation (414) 414
Newspaper Article (368) 368
Book Review (144) 144
Book / eBook (93) 93
Standard (48) 48
Government Document (35) 35
Paper (30) 30
Reference (17) 17
Newsletter (10) 10
Web Resource (10) 10
Report (6) 6
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
authentication (16467) 16467
protocols (5546) 5546
security (5301) 5301
cryptography (4004) 4004
privacy (2616) 2616
computer science, information systems (2574) 2574
telecommunications (2530) 2530
authentication protocols (2220) 2220
engineering, electrical & electronic (1975) 1975
computer science (1940) 1940
servers (1920) 1920
internet (1660) 1660
protocol (1655) 1655
computer information security (1541) 1541
networks (1488) 1488
data security (1462) 1462
authentifizierung (1443) 1443
access control (1368) 1368
analysis (1363) 1363
wireless networks (1278) 1278
encryption (1267) 1267
computer security (1199) 1199
public key (1154) 1154
wireless sensor networks (1092) 1092
information security (1074) 1074
network security (1060) 1060
computer science, theory & methods (1048) 1048
cryptographic protocols (998) 998
rfid (926) 926
smart cards (898) 898
computer communication networks (880) 880
studies (866) 866
communication system security (836) 836
computer science, software engineering (836) 836
biometrics (830) 830
mutual authentication (824) 824
protection (818) 818
access protocols (800) 800
authorization (800) 800
computer science, hardware & architecture (784) 784
wireless communication (771) 771
methods (769) 769
scheme (756) 756
passwords (754) 754
algorithms (743) 743
radio frequency identification (727) 727
mobile communication (722) 722
cloud computing (692) 692
computer network protocols (690) 690
sensors (664) 664
ad hoc networks (651) 651
internet of things (643) 643
computer networks (631) 631
key agreement (626) 626
safety and security measures (621) 621
standards (621) 621
engineering (618) 618
authentication protocol (609) 609
radiofrequency identification (605) 605
usage (588) 588
ip networks (580) 580
databases (561) 561
index medicus (555) 555
smart card (553) 553
data encryption (548) 548
digital signatures (545) 545
anonymity (541) 541
mathematical models (536) 536
communications engineering, networks (531) 531
messages (527) 527
efficient (518) 518
computation (505) 505
management (503) 503
user authentication (501) 501
verschlüsselung (487) 487
elliptic curve cryptography (476) 476
cryptanalysis (472) 472
password (471) 471
public key cryptography (463) 463
research (459) 459
mobile communication systems (457) 457
network servers (456) 456
delay (447) 447
identification (444) 444
secure (434) 434
routing (422) 422
routing protocols (422) 422
computer simulation (417) 417
mobile computing (404) 404
hardware (392) 392
conferences (382) 382
wireless lan (379) 379
computer architecture (375) 375
authentifizierungsprotokoll (374) 374
wireless application protocol (358) 358
devices (345) 345
food science & technology (343) 343
computer crime (341) 341
architecture (339) 339
password authentication (336) 336
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Engineering & Comp. Sci. - Stacks (22) 22
Collection Dvlpm't (Acquisitions) - Vendor file (11) 11
Online Resources - Online (10) 10
UofT at Scarborough - Stacks (9) 9
UTL at Downsview - May be requested (5) 5
UofT at Mississauga - Stacks (5) 5
Robarts - Stacks (4) 4
Gerstein Science - Stacks (3) 3
Faculty of Information - Stacks (2) 2
Collection Dvlpm't (Acquisitions) - Closed Orders (1) 1
Law (Bora Laskin) - Stacks (1) 1
Mathematical Sciences - Stacks (1) 1
St. Michael's College (John M. Kelly) - 2nd Floor (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (21258) 21258
Chinese (726) 726
Japanese (146) 146
Korean (90) 90
Portuguese (9) 9
French (8) 8
Spanish (8) 8
German (6) 6
Czech (4) 4
Turkish (3) 3
Indonesian (2) 2
Lithuanian (2) 2
Afrikaans (1) 1
Croatian (1) 1
Hungarian (1) 1
Polish (1) 1
Romanian (1) 1
Russian (1) 1
Swedish (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


1980 IEEE Symposium on Security and Privacy, ISSN 1540-7993, 04/1980, pp. 122 - 122
New Cryptographic protocols which take full advantage of the unique properties of public key cryptosystems are now evolving. Several protocols for public key... 
Protocols | Encryption | Public key | Authentication | Contracts
Conference Proceeding
Decision Support Systems, ISSN 0167-9236, 2011, Volume 50, Issue 2, pp. 387 - 393
Journal Article
ACM Transactions on Information and System Security (TISSEC), ISSN 1094-9224, 08/1999, Volume 2, Issue 3, pp. 332 - 351
Internet browsers use security protocols to protect sensitive messages. An inductive analysis of TLS (a descendant of SSL 3.0) has been performed using the... 
proof tools | inductive method | TLS | Isabelle | authentication | Verification | Security
Journal Article
Journal of Computer Security, ISSN 0926-227X, 2018, Volume 26, Issue 1, pp. 71 - 120
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy transforms abstract security goals into protocols... 
stepwise refinement | entity authentication | correctness-by-construction | Security protocols | key establishment | Properties (attributes) | Tickets | Cryptography | Security | Communication
Journal Article
IEEE Transactions on Wireless Communications, ISSN 1536-1276, 01/2010, Volume 9, Issue 1, pp. 168 - 174
Journal Article
IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, 07/2011, Volume 8, Issue 4, pp. 548 - 563
Journal Article
IEEE Transactions on Vehicular Technology, ISSN 0018-9545, 03/2016, Volume 65, Issue 3, pp. 1711 - 1720
Journal Article
IEEE Transactions on Computers, ISSN 0018-9340, 12/2016, Volume 65, Issue 12, pp. 3687 - 3701
Journal Article
IEEE/ACM Transactions on Networking, ISSN 1063-6692, 06/2017, Volume 25, Issue 3, pp. 1475 - 1488
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 12/2018, Volume 89, pp. 110 - 125
The Internet of Things (IoT) is a system of physical as well as virtual objects (each with networking capabilities incorporated) that are interconnected to... 
Access control | Privacy | Authentication | Sensing devices | Key management | Security | Identity management | IoT | ATTACKS | MANAGEMENT | KEY-ESTABLISHMENT SCHEME | USER AUTHENTICATION | COMPUTER SCIENCE, THEORY & METHODS | ACCESS-CONTROL PROTOCOL | WIRELESS SENSOR NETWORKS | AUTHENTICATION PROTOCOL | COMMUNICATION | Safety and security measures | Sensors | Internet | Analysis
Journal Article
IEEE Communications Magazine, ISSN 0163-6804, 07/2016, Volume 54, Issue 7, pp. 24 - 30
Single Sign On (SSO) protocols are today integrated in millions of web services so end users can authenticate to a third-party identity provider (IdP) to... 
Authorization | Mobile communication | Protocols | Web services | Servers | Authentication | IDENTITY | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | Usage | Mobile communication systems | Wireless communication systems | Analysis | End users | Privacy | Developers | Specifications | Hides | Preserves
Journal Article
Journal of Computer Security, ISSN 0926-227X, 2009, Volume 17, Issue 4, pp. 363 - 434
Journal Article
International Journal of Communication Systems, ISSN 1074-5351, 05/2015, Volume 28, Issue 7, pp. 1340 - 1351
Journal Article
IEEE Communications Magazine, ISSN 0163-6804, 01/2015, Volume 53, Issue 1, pp. 71 - 77
Journal Article
IEEE Internet Computing, ISSN 1089-7801, 01/2012, Volume 16, Issue 1, pp. 74 - 77
Allowing one Web service to act on our behalf with another has become increasingly important as social Internet services such as blogs, photo sharing, and... 
Protocols | Social network services | Browsers | Electronic mail | social networking | Servers | Authorization | identity management | Web services | Authentication | access control | Internet | Facebook | authorization | COMPUTER SCIENCE, SOFTWARE ENGINEERING | Passwords | On-line systems | Social networks | Management | Online | Standards
Journal Article
Computer Communications, ISSN 0140-3664, 2011, Volume 34, Issue 4, pp. 556 - 566
We identify privacy, security and performance requirements for radio frequency identification (RFID) protocols, as well as additional functional requirements... 
Scalability | Authentication | Pseudonym | PRIVACY | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | IDENTIFICATION | ENGINEERING, ELECTRICAL & ELECTRONIC | Privacy | Ownership | Searching | Computer information security | Protocol (computers) | Radio frequency identification
Journal Article
Computer Standards & Interfaces, ISSN 0920-5489, 2010, Volume 32, Issue 5, pp. 321 - 325
Password-based authentication is widely used for systems that control remote access to computer networks. In order to address some of the security and... 
Remote access control | Smart card | Authentication | Password | COMPUTER SCIENCE, SOFTWARE ENGINEERING | SCHEME | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | USER AUTHENTICATION | Access control | Smart cards | C (programming language) | Passwords | Control systems | Computer information security | Standards
Journal Article
IEEE Transactions on Smart Grid, ISSN 1949-3053, 05/2016, Volume 7, Issue 3, pp. 1732 - 1742
Smart grids have attracted increasing interest in the field of industrial research. These systems allow electricity consumers to communicate with electrical... 
Protocols | smart grid | Authentication | privacy | Smart grids | Encryption | Servers | Distributed verification | SCHEME | SIGNCRYPTION | ENGINEERING, ELECTRICAL & ELECTRONIC | Privacy | Bidirectional | Consumers | Weight reduction | Security | Smart grid | Metering
Journal Article
Methods in Molecular Biology, ISSN 1064-3745, 2018, Volume 1738, pp. 203 - 211
NMR spectroscopy has become an indispensable tool for the metabolic profiling of foods and food products. In the present protocol, we report an analytical... 
Food analysis | NMR spectroscopy | Authentication | Metabolite profiling | Quality control | Food Analysis - methods | Metabolomics - methods | Magnetic Resonance Spectroscopy - methods
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.