Amanote Research

Amanote Research

    RegisterSign In

Discover open access scientific publications

Search, annotate, share and cite publications


Publications by G. Selander

Use Cases for Authentication and Authorization in Constrained Environments

2016English

Related publications

Authentication and Authorization Mechanism for Cloud Security

International Journal of Engineering and Advanced Technology
EngineeringComputer Science ApplicationsEnvironmental Engineering
2019English

Beyond X.509: Token-Based Authentication and Authorization for HEP

EPJ Web of Conferences
AstronomyPhysics
2019English

Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants

2015English

Authentication and Authorization for RESTful WEB API in Scientific Computing Environment

2019English

Authentication and Authorization of Mobile Clients in Public Data Networks

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2002English

Authentication, Authorization, and Accounting Requirements for the Session Initiation Protocol (SIP)

2004English

Management of Networks With Constrained Devices: Use Cases

2015English

JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants

2015English

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends

Security and Communication Networks
Computer NetworksInformation SystemsCommunications
2019English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy