-
1
Innovative passwordless authentication approaches in IoT identity management
Published 2025-06-01Subjects: “…Traditional Authentication…”
Get full text
Article -
2
Mutual authentication scheme based on the TPM cloud computing platform
Published 2012-11-01Subjects: Get full text
Article -
3
OTFS-Based Physical Layer Authentication for UAV-Assisted Data Collection in Wireless Sensor Network
Published 2025-01-01Subjects: “…OTFS authentication…”
Get full text
Article -
4
FaceCloseup: Enhancing Mobile Facial Authentication with Perspective Distortion-Based Liveness Detection
Published 2025-06-01Subjects: “…face authentication…”
Get full text
Article -
5
Research of authentication techniques for the Internet of things
Published 2020-07-01Subjects: Get full text
Article -
6
A Multifactor Multilevel and Interaction Based (M2I) Authentication Framework for Internet of Things (IoT) Applications
Published 2022-01-01Subjects: Get full text
Article -
7
Identity authentication scheme of Android client based on identifiers
Published 2017-04-01Subjects: Get full text
Article -
8
Research on“Wo Connect”Uniform Authentication Technology
Published 2015-06-01Subjects: Get full text
Article -
9
SECURE USER AUTHENTICATION IN THE CLOUD: LEVERAGING FACE RECOGNITION TECHNOLOGY
Published 2024-12-01Subjects: “…user authentication…”
Get full text
Article -
10
Efficient anonymous authentication protocol for internet of vehicles based on Chinese cryptographic SM2
Published 2025-06-01Subjects: Get full text
Article -
11
Review of Certificateless Authentication Scheme for Vehicular Ad Hoc Networks
Published 2025-01-01Subjects: “…Certificateless authentication…”
Get full text
Article -
12
Mobile office system oriented to intelligent terminal
Published 2018-02-01Subjects: Get full text
Article -
13
UCAP:a PCL secure user authentication protocol in cloud computing
Published 2018-08-01Subjects: Get full text
Article -
14
Mobile office system oriented to intelligent terminal
Published 2018-02-01Subjects: “…intelligent terminal;mobile OA;data security;identity authentication;device authentication…”
Get full text
Article -
15
Packet-loss robust scalable authentication algorithm for compressed image streaming
Published 2014-04-01Subjects: “…image authentication…”
Get full text
Article -
16
Enhanced EMV Security: Preventing Credit Card Fraud From a Distance
Published 2025-01-01Subjects: Get full text
Article -
17
Physical-Unclonable-Function-Based Secure and Anonymous User Authentication for Smart Homes
Published 2024-01-01Subjects: “…Multi-factor authentication…”
Get full text
Article -
18
Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications
Published 2025-05-01Subjects: Get full text
Article -
19
Strengthening Cybersecurity Resilience: An Investigation of Customers’ Adoption of Emerging Security Tools in Mobile Banking Apps
Published 2025-04-01Subjects: Get full text
Article -
20
Technical scheme of the unified account authentication service for operators
Published 2018-05-01Subjects: “…unified account;mobile gateway authentication;user card authentication;interconnection and inter-operation…”
Get full text
Article