UofT Libraries is getting a new library services platform in January 2021.
Learn more about the change.
Search Articles
Decision Support Systems, ISSN 0167-9236, 01/2011, Volume 50, Issue 2, pp. 387 - 393
Vulnerabilities | RFID | Mutual authentication protocols | Computer Science, Information Systems | Operations Research & Management Science | Computer Science, Artificial Intelligence | Technology | Computer Science | Science & Technology | Signal and communications theory | Memory organisation. Data processing | Telecommunications and information theory | Exact sciences and technology | Applied sciences | Information, signal and communications theory | Software | Memory and file management (including protection and security) | Cryptography | Computer systems and distributed systems. User interface | Computer science; control theory; systems | Computer network protocols | Radio frequency identification (RFID) | Studies | Authentication protocols | Radio frequency identification | Decision support systems | Acceptance | Authentication | Documents | Security | Readers | Streams
Journal Article
IEEE transactions on vehicular technology, ISSN 0018-9545, 03/2016, Volume 65, Issue 3, pp. 1711 - 1720
Protocols | group signature | Authentication | Public key | Vehicular ad hoc networks | Vehicular ad hoc networks (VANETs) | threshold authentication | Vehicles | vehicular ad hoc networks (VANETs) | Conditional privacy | Engineering | Transportation Science & Technology | Technology | Transportation | Engineering, Electrical & Electronic | Telecommunications | Science & Technology | Usage | Cryptography | Ad hoc networks (Computer networks) | Protocol
Journal Article
Journal of computer security, ISSN 0926-227X, 2018, Volume 26, Issue 1, pp. 71 - 120
Journal Article
Wireless networks, ISSN 1022-0038, 9/2002, Volume 8, Issue 5, pp. 521 - 534
MANET | mobile ad hoc networks | Computer Science | Business Information Systems | cryptography | sensor networks | secrecy and confidentiality | Computer Communication Networks | secure communication protocols | Electronic and Computer Engineering | authentication of wireless communication | Sensor networks | Authentication of wireless communication | Secure communication protocols | Cryptography | Secrecy and confidentiality | Mobile ad hoc networks | Computer Science, Information Systems | Engineering | Technology | Engineering, Electrical & Electronic | Telecommunications | Science & Technology | Studies | Wireless networks | Network security | Inventory management | Sensors | Protocol | Inventory
Journal Article
IEEE transactions on wireless communications, ISSN 1536-1276, 01/2010, Volume 9, Issue 1, pp. 168 - 174
Home automation | Wireless application protocol | LAN interconnection | Roaming | key establishment | Wireless communication | Network servers | Privacy | revocation | Land mobile radio cellular systems | Authentication | Secure roaming | anonymity | Protection | Anonymity | Key establishment | Revocation | Engineering, Electrical & Electronic | Engineering | Telecommunications | Technology | Science & Technology | Radiocommunications | Telecommunications and information theory | Exact sciences and technology | Equipments and installations | Information, signal and communications theory | Access methods and protocols, osi model | Signal and communications theory | Switching and signalling | Teleprocessing networks. Isdn | Mobile radiocommunication systems | Systems, networks and services of telecommunications | Applied sciences | Cryptography | Networks | Cellular | Mobile communication systems | Uranium | Servers | Local area networks | Cellular communication
Journal Article
Future generation computer systems, ISSN 0167-739X, 12/2018, Volume 89, pp. 110 - 125
Journal Article
IEEE internet computing, ISSN 1089-7801, 01/2012, Volume 16, Issue 1, pp. 74 - 77
Protocols | Social network services | Browsers | Electronic mail | social networking | Servers | Authorization | identity management | Web services | Authentication | access control | Internet | Facebook | authorization | Computer Science, Software Engineering | Technology | Computer Science | Science & Technology | Memory organisation. Data processing | Information systems. Data bases | Exact sciences and technology | Applied sciences | Software | Memory and file management (including protection and security) | Computer systems and distributed systems. User interface | Computer science; control theory; systems | Passwords | On-line systems | Social networks | Management | Online | Standards
Journal Article
Journal of computer security, ISSN 0926-227X, 2009, Volume 17, Issue 4, pp. 363 - 434
Journal Article
Chemical Society reviews, ISSN 0306-0012, 4/2018, Volume 47, Issue 7, pp. 2266 - 2279
Physical Sciences | Chemistry | Chemistry, Multidisciplinary | Science & Technology | Steganography | Electronic devices | Security management | Authentication | Data transmission | Locks | Cryptography | Computer security | Inbäddad systemteknik | Computer Systems | Kommunikationssystem | Datorsystem | Communication Systems | Embedded Systems
Journal Article
IEEE access, ISSN 2169-3536, 2019, Volume 7, pp. 12047 - 12057
Smart cards | Cloud computing | Privacy | Protocols | Authentication | Vehicular ad hoc networks | anonymity | smart card | Internet of Vehicles | authentication | Computer Science, Information Systems | Engineering | Technology | Computer Science | Engineering, Electrical & Electronic | Telecommunications | Science & Technology | Spoofing | Vehicles
Journal Article
International journal of communication systems, ISSN 1074-5351, 05/2015, Volume 28, Issue 7, pp. 1340 - 1351
key agreement | session initiation protocol | password | smart card | malicious insider impersonation attack | authentication | Engineering, Electrical & Electronic | Engineering | Telecommunications | Technology | Science & Technology | Computer network protocols | Smart cards | Integrated circuit cards | Multimedia | Protocols | Authentication | Passwords | IP (Internet Protocol) | Remedies | Security | Computer information security | Acceptability
Journal Article
IEEE transactions on smart grid, ISSN 1949-3053, 05/2016, Volume 7, Issue 3, pp. 1732 - 1742
Journal Article
Computers & security, ISSN 0167-4048, 07/2018, Volume 76, pp. 285 - 294
Deep learning | Computer vision | Graphical authentication | Machine learning | Natural language processing | Visual question answering | Cued recall | Computer Science, Information Systems | Technology | Computer Science | Science & Technology | Computer science | Language processing | Computational linguistics | Computer network protocols | Natural language interfaces | Studies | Classifiers | Authentication | Passwords | Artificial intelligence | Image enhancement | Authentication protocols
Journal Article
Computer communications, ISSN 0140-3664, 2011, Volume 34, Issue 4, pp. 556 - 566
Scalability | Authentication | Pseudonym | Computer Science, Information Systems | Engineering | Technology | Computer Science | Engineering, Electrical & Electronic | Telecommunications | Science & Technology | Privacy | Ownership | Searching | Computer information security | Protocol (computers) | Radio frequency identification
Journal Article