-
181
Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario
Published 2020-10-01Subjects: Get full text
Article -
182
Authentication Scheme Based on Agents for Heterogeneous Cloud
Published 2013-03-01Subjects: Get full text
Article -
183
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
Published 2025-01-01Subjects: “…Authentication…”
Get full text
Article -
184
Efficient revocable certificateless remote anonymous authentication protocol for wireless body area network
Published 2018-04-01Subjects: Get full text
Article -
185
Proposta de aclaração do “pacto sucessório” à luz de novos dados
Published 2017-10-01Subjects: Get full text
Article -
186
Preposterous Preservation. Postmodern Paradoxes
Published 2024-11-01Subjects: “…Authenticity…”
Get full text
Article -
187
TS-PAID: A Two-Stage PUF-Based Lightweight Authentication Protocol for Internet of Drones
Published 2025-01-01Subjects: Get full text
Article -
188
O “pacto sucessório” revisitado: o texto e o contexto
Published 2013-12-01Subjects: Get full text
Article -
189
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01Subjects: Get full text
Article -
190
Equipment Significance and Obsolescence in Diana Thater’s The Bad Infinite
Published 2013-10-01Subjects: “…authenticity…”
Get full text
Article -
191
Certificate-based cross-domain authentication scheme with anonymity
Published 2018-05-01Subjects: Get full text
Article -
192
Efficient and secure electronic evidence exchange scheme for internet of things
Published 2025-01-01Subjects: Get full text
Article -
193
Efficient anonymous reputation-based revocation without TTP
Published 2014-07-01Subjects: Get full text
Article -
194
Lattice-based lightweight post quantum access authentication scheme for satellite network
Published 2024-10-01Subjects: Get full text
Article -
195
RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks
Published 2025-01-01Subjects: Get full text
Article -
196
The Representation of the Moroccan Culture in the Works of Ayoub Normal
Published 2025-01-01Subjects: Get full text
Article -
197
Perceptual image hashing sensitive to content modification
Published 2012-11-01Subjects: “…image authentication…”
Get full text
Article -
198
-
199
Toward Authentication of Videos: Integer Transform Based Motion Vector Watermarking
Published 2022-01-01Subjects: Get full text
Article -
200
Identity-based cross-domain authentication scheme in pervasive computing environments
Published 2011-01-01Subjects: Get full text
Article