-
241
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
Published 2016-05-01Subjects: Get full text
Article -
242
-
243
THE SELF IN THE WORLD: OVERCOMING CLASSICAL DUALISM AND SHAPING NEW LANDMARKS
Published 2018-06-01Subjects: Get full text
Article -
244
Design of efficient anonymous identity authentication protocol for lightweight IoT devices
Published 2022-07-01Subjects: Get full text
Article -
245
Provable data possession scheme with authentication
Published 2016-10-01Subjects: “…authentication…”
Get full text
Article -
246
Issues of identity verification of typical applications over mobile terminal platform
Published 2020-12-01Subjects: Get full text
Article -
247
One-time password authentication for one-way communication without re-registration
Published 2020-06-01Subjects: Get full text
Article -
248
Two-stage authentication and key agreement protocol for commuting in Internet of vehicles
Published 2024-05-01Subjects: Get full text
Article -
249
Blockchain-based cross-data center anonymous and verifiable identity authentication scheme
Published 2024-04-01Subjects: Get full text
Article -
250
The validity of the Medina‘s work people for Specification According to the Malikis, as an independent evidence for them
Published 2024-06-01Subjects: Get full text
Article -
251
Classification and determination of the tobacco raw materials authenticity during the forensic examination
Published 2024-12-01Subjects: Get full text
Article -
252
-
253
Survey on user authentication protocol in wireless sensor network
Published 2017-01-01Subjects: Get full text
Article -
254
Survey on anonymous authentication mechanisms of VANET
Published 2016-08-01Subjects: Get full text
Article -
255
Two-factor wearable device authentication protocol based on PUF and IPI
Published 2017-06-01Subjects: “…authentication protocol…”
Get full text
Article -
256
Scheme of node identify authentication in distributed file interaction system
Published 2013-08-01Subjects: Get full text
Article -
257
Research on password-authenticated key exchange protocol over lattices
Published 2022-12-01Subjects: “…password-authenticated key exchange…”
Get full text
Article -
258
Multi-user physical layer authentication mechanism based on lightweight CNN and channel feature assistance
Published 2023-11-01Subjects: Get full text
Article -
259
Statistical ineffective fault analysis of the lightweight authenticated cipher algorithm Saturnin-Short
Published 2023-04-01Subjects: Get full text
Article -
260
Threshold traceability anonymous authentication scheme without trusted center for ad hoc network
Published 2012-08-01Subjects: “…anonymous authentication…”
Get full text
Article