-
201
BCSE: Blockchain-Based Trusted Service Evaluation Model over Big Data
Published 2022-03-01Subjects: Get full text
Article -
202
-
203
Attribute-based authenticated key agreement protocol supporting revocation
Published 2014-05-01Subjects: “…authentication…”
Get full text
Article -
204
Design and implementation of low-cost hardware architecture for authentication encryption algorithm SM4-GCM
Published 2023-12-01Subjects: Get full text
Article -
205
-
206
-
207
New entity authentication and access control scheme in satellite communication network
Published 2018-06-01Subjects: “…identity authentication…”
Get full text
Article -
208
Efficient and privacy-preserving online face authentication scheme
Published 2020-05-01Subjects: “…online face authentication…”
Get full text
Article -
209
Message encryption and authentication mechanism based on wireless physical layer key
Published 2018-08-01Subjects: Get full text
Article -
210
Analysis of Network Demand and Research on the Key Technology for Integration of 5G and Wi-Fi
Published 2014-08-01Subjects: Get full text
Article -
211
Identity authentication scheme based on identity-based encryption
Published 2016-06-01Subjects: “…node identity authentication…”
Get full text
Article -
212
Efficient anonymous roaming authentication scheme using certificateless aggregate signature in wireless network
Published 2016-07-01Subjects: Get full text
Article -
213
Reversible digital watermarking-based protocol for data integrity in wireless sensor network
Published 2018-03-01Subjects: Get full text
Article -
214
Access control model and its application for collaborative information systems
Published 2008-01-01Subjects: Get full text
Article -
215
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks
Published 2023-02-01Subjects: Get full text
Article -
216
Secure and efficient token based roaming authentication scheme for space-earth integration network
Published 2018-05-01Subjects: Get full text
Article -
217
Authentication scheme of smart home based on eUICC
Published 2018-04-01Subjects: Get full text
Article -
218
The genesis of forensic research of documents as the branch of forensic technology
Published 2020-06-01Subjects: Get full text
Article -
219
Fingerprint template protection by adopting random projection based on re-encryption
Published 2018-02-01Subjects: Get full text
Article -
220
Untargeted metabolomics profiling for the geographical authentication of traditional pempek using high-resolution orbitrap mass spectrometry
Published 2025-03-01Subjects: Get full text
Article