Skip to search formSkip to main contentSkip to account menu

Fibre Channel Logins

In the Login process different operational parameters are exchanged: * FC-PH version support * Classes of service supported * Frame size * Type of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2013
Review
2013
The combination of One Time Password (OTP), SMS Gateway, and MD5 Hash encryption algorithm are used to develop a more secured… 
2010
2010
Secure login methods based on human cognitive skills can be classified into two categories based on information available to a… 
Highly Cited
2009
Highly Cited
2009
This paper will describe a login method for accessing computer systems, using mouse dynamics. The user needs to perform a task… 
2009
2009
Two-factor authentication techniques using combination of magnetic cards and personal identification numbers (PINs) are widely… 
2009
2009
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications… 
Review
2008
Review
2008
In this paper we describe in details UML modeling of login procedure, which is a part of UserBarCodeReader application, developed… 
2008
2008
This paper describes a wearable authentication device for continuous user authentication and transparent login procedure in… 
Highly Cited
2005
Highly Cited
2005
  • J. Bardram
  • Personal and Ubiquitous Computing
  • 2005
  • Corpus ID: 24983671
Logging in by typing usernames and passwords is by far the most common way to access modern computer systems. However, such… 
Review
2002
Review
2002
Web surveys generally use some sort of access control to prevent uninvited respondents from taking part in the survey and to… 
Review
2001
Review
2001
Multimedia, including Internet traffic, can currently be multiplexed within the DVB/MPEG-2 formats and delivered direct to home…