Listing 1 - 10 of 372 << page
of 38
>>
Sort by

Book
IEEE Std 1667-2015 (Revision of IEEE Std 1667-2009) - Redline : IEEE Standard for Discovery, Authentication, and Authorization in Host Attachments of Storage Devices - Redline
Author:
ISBN: 1504422481 Year: 2016 Publisher: [Place of publication not identified] : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Discovery, authentication, and authorization protocols between hosts and storage devices over multiple transports are defined in this standard. It specifies a new Silo Type Identifier (STID) allocation process that uses the IEEE Registration Authority.


Book
1901b-2021 - IEEE Standard for Broadband over Power Line Networks : Medium Access Control and Physical Layer Specifications Amendment 2: Enhancements for Authentication and Authorization
Author:
ISBN: 1504482956 Year: 2022 Publisher: [Place of publication not identified] : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

State-of-the-art authentication and authorization mechanisms for networks, especially for IoT and access devices, are integrated in this amendment. Specifications for how IEEE Std 802.1X may be utilized for authentication and authorization by IEEE 1901 networks are provided in this amendment.


Book
Techniques for Food Authentication : Trends and Emerging Approaches
Authors: ---
Year: 2023 Publisher: [Place of publication not identified] : MDPI - Multidisciplinary Digital Publishing Institute,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Special Issue of Foods comprises ten research and two review articles, highlighting the recent advances in food authentication and clearly demonstrating that no single method is suitable to cover all aspects of food authenticity.

Keywords

Authentication. --- Food.


Book
Electronic authentication guideline
Authors: --- --- --- --- --- et al.
Year: 2013 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Authentication. --- Tokens.


Book
Techniques for Food Authentication : Trends and Emerging Approaches
Authors: ---
Year: 2023 Publisher: [Place of publication not identified] : MDPI - Multidisciplinary Digital Publishing Institute,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Special Issue of Foods comprises ten research and two review articles, highlighting the recent advances in food authentication and clearly demonstrating that no single method is suitable to cover all aspects of food authenticity.

Keywords

Authentication. --- Food.


Book
Techniques for Food Authentication : Trends and Emerging Approaches
Authors: ---
Year: 2023 Publisher: [Place of publication not identified] : MDPI - Multidisciplinary Digital Publishing Institute,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Special Issue of Foods comprises ten research and two review articles, highlighting the recent advances in food authentication and clearly demonstrating that no single method is suitable to cover all aspects of food authenticity.

Keywords

Authentication. --- Food.


Book
Derived PIV application and data model test guidelines
Authors: --- --- --- --- --- et al.
Year: 2016 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

NIST Special Publication (SP) 800-157 contains technical guidelines for the implementation of standards-based, secure, reliable, interoperable Public Key Infrastructure (PKI)-based identity credentials that are issued for mobile devices by federal departments and agencies to individuals who possess and prove control over a valid Personal Identity Verification (PIV) Card. This document, SP 800-166, contains the requirements and test assertions for testing the Derived PIV Application and associated Derived PIV data objects implemented on removable hardware tokens and within mobile devices. The tests reflect the design goals of interoperability and interface functions.


Book
A methodology for handling standards terminology for sustainable manufacturing
Authors: --- --- --- ---
Year: 2013 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Security of interactive and automated access management using secure shell (SSH)
Authors: --- --- --- ---
Year: 2015 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Derived Personal Identity Verification (PIV) credentials (DPC) proof of concept research
Authors: --- --- --- --- --- et al.
Year: 2016 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 372 << page
of 38
>>
Sort by