Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 219,937,500 papers from all fields of science
Search
Sign In
Create Free Account
Fibre Channel Logins
In the Login process different operational parameters are exchanged: * FC-PH version support * Classes of service supported * Frame size * Type of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Buffer credits
Fibre Channel
Fibre Channel time-out values
NPIV
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
On security level usage in context-aware role-based access control
Michal Trnka
,
T. Cerný
ACM Symposium on Applied Computing
2016
Corpus ID: 14867081
Huge contemporary trend is adding context awareness into software applications. It allows both better user experience as well as…
Expand
2014
2014
Color Pass: An intelligent user interface to resist shoulder surfing attack
Nilesh Chakraborty
,
S. Mondal
Proceedings of the IEEE Students' Technology…
2014
Corpus ID: 42629585
Classical PIN entry mechanism is widely used for authenticating a user. It is a popular scheme because it nicely balances the…
Expand
Review
2013
Review
2013
Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS
E. Sediyono
,
Kartika Imam Santoso
,
Suhartono
International Conference on Advances in Computing…
2013
Corpus ID: 2393695
The combination of One Time Password (OTP), SMS Gateway, and MD5 Hash encryption algorithm are used to develop a more secured…
Expand
2010
2010
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model
T. Perković
,
Mario Cagalj
,
Nitesh Saxena
Financial Cryptography
2010
Corpus ID: 4589021
Secure login methods based on human cognitive skills can be classified into two categories based on information available to a…
Expand
2009
2009
A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing
P. Shi
,
Bo Zhu
,
A. Youssef
Third International Conference on Emerging…
2009
Corpus ID: 2370992
Two-factor authentication techniques using combination of magnetic cards and personal identification numbers (PINs) are widely…
Expand
Review
2008
Review
2008
Modeling of login procedure for wireless application with interaction overview diagrams
V. Plavsic
,
Emil Secerov
Computer Science and Information Systems
2008
Corpus ID: 14854963
In this paper we describe in details UML modeling of login procedure, which is a part of UserBarCodeReader application, developed…
Expand
2008
2008
Wearable authentication device for transparent login in nomadic applications environment
Sampo Ojala
,
Jari Keinänen
,
J. Skyttä
Australian Workshop on Safety Critical Systems…
2008
Corpus ID: 9322337
This paper describes a wearable authentication device for continuous user authentication and transparent login procedure in…
Expand
2006
2006
Continuous Authentication by Keystroke Dynamics Using Committee Machines
S. R. D. L. E. S. Filho
,
M. Roisenberg
Intelligence and Security Informatics
2006
Corpus ID: 43304113
Current authentication mechanisms have a barely addressed problem: they only authenticate a user at the login procedure. If a…
Expand
Review
2002
Review
2002
Web Surveys
Dirk Heerwegh
,
Geert Loosveldt
2002
Corpus ID: 62577396
Web surveys generally use some sort of access control to prevent uninvited respondents from taking part in the survey and to…
Expand
1989
1989
A simple way of improving the login security
K. Dehnad
Computers & security
1989
Corpus ID: 45926794
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE