Skip to search formSkip to main contentSkip to account menu

Fibre Channel Logins

In the Login process different operational parameters are exchanged: * FC-PH version support * Classes of service supported * Frame size * Type of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Huge contemporary trend is adding context awareness into software applications. It allows both better user experience as well as… 
2014
2014
Classical PIN entry mechanism is widely used for authenticating a user. It is a popular scheme because it nicely balances the… 
Review
2013
Review
2013
The combination of One Time Password (OTP), SMS Gateway, and MD5 Hash encryption algorithm are used to develop a more secured… 
2010
2010
Secure login methods based on human cognitive skills can be classified into two categories based on information available to a… 
2009
2009
Two-factor authentication techniques using combination of magnetic cards and personal identification numbers (PINs) are widely… 
Review
2008
Review
2008
In this paper we describe in details UML modeling of login procedure, which is a part of UserBarCodeReader application, developed… 
2008
2008
This paper describes a wearable authentication device for continuous user authentication and transparent login procedure in… 
2006
2006
Current authentication mechanisms have a barely addressed problem: they only authenticate a user at the login procedure. If a… 
Review
2002
Review
2002
Web surveys generally use some sort of access control to prevent uninvited respondents from taking part in the survey and to…