Amanote Research

Amanote Research

    RegisterSign In

Use Cases for Authentication and Authorization in Constrained Environments

doi 10.17487/rfc7744
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2016

Authors
G. SelanderM. ManiS. Kumar
Publisher

RFC Editor


Related search

Authentication and Authorization Mechanism for Cloud Security

International Journal of Engineering and Advanced Technology
EngineeringComputer Science ApplicationsEnvironmental Engineering
2019English

Beyond X.509: Token-Based Authentication and Authorization for HEP

EPJ Web of Conferences
AstronomyPhysics
2019English

Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants

2015English

Authentication and Authorization for RESTful WEB API in Scientific Computing Environment

2019English

Authentication and Authorization of Mobile Clients in Public Data Networks

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2002English

Authentication, Authorization, and Accounting Requirements for the Session Initiation Protocol (SIP)

2004English

Management of Networks With Constrained Devices: Use Cases

2015English

JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants

2015English

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends

Security and Communication Networks
Computer NetworksInformation SystemsCommunications
2019English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy