Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by G. Selander
Use Cases for Authentication and Authorization in Constrained Environments
Related publications
Authentication and Authorization Mechanism for Cloud Security
International Journal of Engineering and Advanced Technology
Engineering
Computer Science Applications
Environmental Engineering
Beyond X.509: Token-Based Authentication and Authorization for HEP
EPJ Web of Conferences
Astronomy
Physics
Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants
Authentication and Authorization for RESTful WEB API in Scientific Computing Environment
Authentication and Authorization of Mobile Clients in Public Data Networks
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Authentication, Authorization, and Accounting Requirements for the Session Initiation Protocol (SIP)
Management of Networks With Constrained Devices: Use Cases
JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends
Security and Communication Networks
Computer Networks
Information Systems
Communications