Amanote Research
Register
Sign In
Use Cases for Authentication and Authorization in Constrained Environments
doi 10.17487/rfc7744
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2016
Authors
G. Selander
M. Mani
S. Kumar
Publisher
RFC Editor
Related search
Authentication and Authorization Mechanism for Cloud Security
International Journal of Engineering and Advanced Technology
Engineering
Computer Science Applications
Environmental Engineering
Beyond X.509: Token-Based Authentication and Authorization for HEP
EPJ Web of Conferences
Astronomy
Physics
Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants
Authentication and Authorization for RESTful WEB API in Scientific Computing Environment
Authentication and Authorization of Mobile Clients in Public Data Networks
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Authentication, Authorization, and Accounting Requirements for the Session Initiation Protocol (SIP)
Management of Networks With Constrained Devices: Use Cases
JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends
Security and Communication Networks
Computer Networks
Information Systems
Communications