X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (26559) 26559
Journal Article (26268) 26268
Magazine Article (1433) 1433
Book Chapter (1099) 1099
Newspaper Article (596) 596
Dissertation (551) 551
Book / eBook (314) 314
Trade Publication Article (252) 252
Government Document (145) 145
Paper (129) 129
Newsletter (79) 79
Book Review (62) 62
Standard (60) 60
Publication (40) 40
Reference (34) 34
Web Resource (26) 26
Report (15) 15
Transcript (5) 5
Streaming Video (2) 2
Microfilm (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
authentication (44767) 44767
security (10467) 10467
cryptography (7564) 7564
protocols (5819) 5819
privacy (4859) 4859
engineering, electrical & electronic (4645) 4645
computer science, information systems (4522) 4522
biometrics (4421) 4421
telecommunications (4240) 4240
servers (3870) 3870
computer science (3767) 3767
access control (3404) 3404
encryption (3207) 3207
computer information security (3133) 3133
internet (3117) 3117
data security (2972) 2972
authentifizierung (2841) 2841
information security (2762) 2762
analysis (2441) 2441
watermarking (2368) 2368
networks (2346) 2346
public key (2298) 2298
computer security (2288) 2288
algorithms (2253) 2253
authentication protocols (2232) 2232
cloud computing (2087) 2087
authorization (2080) 2080
protection (2079) 2079
feature extraction (2066) 2066
computer science, theory & methods (2049) 2049
wireless sensor networks (1874) 1874
protocol (1851) 1851
wireless networks (1843) 1843
smart cards (1674) 1674
robustness (1633) 1633
communication system security (1604) 1604
computer science, software engineering (1594) 1594
passwords (1584) 1584
food science & technology (1579) 1579
identification (1566) 1566
methods (1538) 1538
mobile communication (1503) 1503
network security (1503) 1503
internet of things (1454) 1454
wireless communication (1453) 1453
digital signatures (1438) 1438
sensors (1363) 1363
usage (1340) 1340
conferences (1328) 1328
user authentication (1296) 1296
computer science, hardware & architecture (1286) 1286
scheme (1266) 1266
fingerprint recognition (1238) 1238
computer communication networks (1237) 1237
password (1231) 1231
computer networks (1229) 1229
mathematical models (1199) 1199
hardware (1183) 1183
studies (1166) 1166
mutual authentication (1129) 1129
rfid (1129) 1129
computer architecture (1084) 1084
smart card (1058) 1058
management (1035) 1035
ip networks (1034) 1034
safety and security measures (1023) 1023
humans (1019) 1019
cryptographic protocols (1004) 1004
ad hoc networks (970) 970
software (965) 965
messages (937) 937
public key cryptography (933) 933
research (930) 930
computer science, artificial intelligence (902) 902
data encryption (869) 869
engineering (866) 866
radio frequency identification (853) 853
classification (852) 852
mobile computing (852) 852
radiofrequency identification (850) 850
integrity (845) 845
mathematical analysis (840) 840
computation (838) 838
computer simulation (836) 836
information technology (824) 824
network servers (820) 820
verschlüsselung (809) 809
access protocols (803) 803
educational institutions (803) 803
elliptic curve cryptography (803) 803
delay (795) 795
image authentication (793) 793
key agreement (792) 792
message authentication (789) 789
anonymity (785) 785
face recognition (777) 777
monitoring (761) 761
costs (757) 757
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (59) 59
Engineering & Comp. Sci. - Stacks (48) 48
Collection Dvlpm't (Acquisitions) - Vendor file (28) 28
Robarts - Stacks (26) 26
UofT at Mississauga - Stacks (18) 18
UofT at Scarborough - Stacks (17) 17
UTL at Downsview - May be requested (9) 9
Law (Bora Laskin) - Stacks (7) 7
Faculty of Information - Stacks (5) 5
Gerstein Science - Stacks (5) 5
Collection Dvlpm't (Acquisitions) - Closed Orders (2) 2
Royal Ontario Museum - Stacks (2) 2
East Asian (Cheng Yu Tung) - Stacks (1) 1
Law (Bora Laskin) - Closed Orders (1) 1
Mathematical Sciences - Stacks (1) 1
Media Commons - Microtexts (1) 1
Pontifical Inst. Mediaeval Studies - Library use only (1) 1
St. Michael's College (John M. Kelly) - 2nd Floor (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (54758) 54758
Chinese (1669) 1669
Japanese (977) 977
Korean (316) 316
French (99) 99
Czech (69) 69
Portuguese (55) 55
German (54) 54
Spanish (46) 46
Russian (20) 20
Arabic (14) 14
Turkish (14) 14
Indonesian (13) 13
Swedish (11) 11
Lithuanian (8) 8
Polish (7) 7
Italian (5) 5
Croatian (4) 4
Hungarian (4) 4
Romanian (3) 3
Slovak (3) 3
Persian (2) 2
Dutch (1) 1
Latvian (1) 1
Malay (1) 1
Serbian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Sensors (Basel, Switzerland), ISSN 1424-8220, 2019, Volume 19, Issue 5, p. 1141
The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The... 
ELECTROCHEMISTRY | ATTACKS | CHEMISTRY, ANALYTICAL | PROTOCOL | KEY AGREEMENT SCHEME | Internet of Things | IoT | security | EFFICIENT AUTHENTICATION | INSTRUMENTS & INSTRUMENTATION | USER AUTHENTICATION | MUTUAL AUTHENTICATION | LIGHTWEIGHT | WIRELESS SENSOR NETWORKS | authentication | ANONYMOUS AUTHENTICATION
Journal Article
2016, Iwata sensho. Chiiki no chūsei, ISBN 9784866029429, Volume 17, 181 pages, 2 unnumbered pages of plates
Book
IEEE Transactions on Industrial Informatics, ISSN 1551-3203, 05/2020, Volume 16, Issue 5, pp. 3606 - 3615
Journal Article
Security and communication networks, ISSN 1939-0122, 2017, Volume 2017, pp. 1 - 41
Journal Article
Computer networks (Amsterdam, Netherlands : 1999), ISSN 1389-1286, 2019, Volume 148, pp. 295 - 306
Journal Article
Sensors (Switzerland), ISSN 1424-8220, 04/2014, Volume 14, Issue 4, pp. 6443 - 6462
Journal Article
Book
IEEE transactions on intelligent transportation systems, ISSN 1558-0016, 2018, Volume 19, Issue 7, pp. 2204 - 2220
Journal Article
Sensors (Basel, Switzerland), ISSN 1424-8220, 2014, Volume 14, Issue 6, pp. 10081 - 10106
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature,... 
Wireless sensor network | Authentication protocol | Elliptic curves cryptography | ELECTROCHEMISTRY | SCHEME | CHEMISTRY, ANALYTICAL | ANONYMITY | INSTRUMENTS & INSTRUMENTATION | wireless sensor network | ATTACK | authentication protocol | elliptic curves cryptography | Remote sensors | Smart cards | Wireless networks | Authentication | Monitors | Sensors | Security | Cryptography
Journal Article