-
261
EXPANDING NASA FUNCTIONALITY USING ITS API AND IMPROVING INTEREST AMONG PEOPLE IN SPACE EXPLORATION
Published 2024-12-01Subjects: Get full text
Article -
262
Survey of key management schemes for cluster networks
Published 2022-12-01Subjects: Get full text
Article -
263
FractalNet-based key generation for authentication in Voice over IP using Blockchain
Published 2025-03-01Subjects: Get full text
Article -
264
A novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features
Published 2018-10-01Subjects: Get full text
Article -
265
Perceived greenwashing and employee non-green behavior: the roles of prevention-focused green crafting and work alienation
Published 2025-12-01Subjects: Get full text
Article -
266
Discovery and research of network security vulnerabilities based on Web application
Published 2016-06-01Subjects: Get full text
Article -
267
Bidirectional authentication key agreement protocol supporting identity’s privacy preservation based on RLWE
Published 2019-11-01Subjects: Get full text
Article -
268
Password authentication scheme for mobile computing environment
Published 2007-01-01Subjects: “…authentication…”
Get full text
Article -
269
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01Subjects: Get full text
Article -
270
Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network
Published 2022-04-01Subjects: Get full text
Article -
271
Research on network survivability of distance vector routing protocol
Published 2010-01-01Subjects: Get full text
Article -
272
Biometric Fusion for Enhanced Authentication in Cloud Computing Environments
Published 2024-03-01Subjects: Get full text
Article -
273
AEUR: authenticated encryption algorithm design based on uBlock round function
Published 2023-08-01Subjects: “…authenticated encryption…”
Get full text
Article -
274
Test the Moderating and Mediating role of organizational culture in the relationship between servant leadership and employees performance (an analytical research of the views of a...
Published 2020-12-01Subjects: “…Servant Leadership, Standing Back, Forgiveness, Authenticity, Employee Performance, Organizational Culture…”
Get full text
Article -
275
Intangible heritage as a social construction of authenticity: the example of Tunisian cuisine
Published 2021-07-01Subjects: “…authenticity…”
Get full text
Article -
276
Verifiable federated aggregation method based on homomorphic proxy re-authentication
Published 2024-06-01Subjects: “…homomorphic proxy re-authentication…”
Get full text
Article -
277
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Published 2010-01-01Subjects: Get full text
Article -
278
Automotive ethernet controller authentication method based on national cryptographic algorithms
Published 2022-12-01Subjects: Get full text
Article -
279
A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments
Published 2025-01-01Subjects: Get full text
Article -
280
Research and implement of file safe deposit box based on authentication and authorization
Published 2016-05-01Subjects: Get full text
Article