Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Fibre Channel Logins

In the Login process different operational parameters are exchanged: * FC-PH version support * Classes of service supported * Frame size * Type of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Huge contemporary trend is adding context awareness into software applications. It allows both better user experience as well as… Expand
  • figure 1
  • figure 2
2014
2014
Classical PIN entry mechanism is widely used for authenticating a user. It is a popular scheme because it nicely balances the… Expand
  • table I
  • figure 1
  • table II
  • table X
  • table III
2010
2010
Secure login methods based on human cognitive skills can be classified into two categories based on information available to a… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Highly Cited
2009
Highly Cited
2009
This paper will describe a login method for accessing computer systems, using mouse dynamics. The user needs to perform a task… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2009
2009
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
2009
2009
Two-factor authentication techniques using combination of magnetic cards and personal identification numbers (PINs) are widely… Expand
  • figure 1
  • figure 2
Review
2008
Review
2008
In this paper we describe in details UML modeling of login procedure, which is a part of UserBarCodeReader application, developed… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2008
2008
This paper describes a wearable authentication device for continuous user authentication and transparent login procedure in… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2005
Highly Cited
2005
  • J. Bardram
  • Personal and Ubiquitous Computing
  • 2005
  • Corpus ID: 24983671
Logging in by typing usernames and passwords is by far the most common way to access modern computer systems. However, such… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
1989
1989
  • K. Dehnad
  • Comput. Secur.
  • 1989
  • Corpus ID: 45926794
The login procedure is formulated as a test of hypothesis. The formulation is used to show that the commonly used procedure… Expand