-
281
Cross-domain authentication scheme based on consortium blockchain
Published 2022-06-01Subjects: “…cross-domain authentication…”
Get full text
Article -
282
Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain
Published 2023-05-01Subjects: Get full text
Article -
283
Artificial Intelligence vs. Human: Decoding Text Authenticity with Transformers
Published 2025-01-01Subjects: Get full text
Article -
284
Robust image hashing method from global perception features of human visual cortex
Published 2011-01-01Subjects: Get full text
Article -
285
Cooperation-based location authentication scheme for crowdsensing applications
Published 2022-09-01Subjects: Get full text
Article -
286
Efficient communication protocol of group negotiation in VANET
Published 2018-01-01Subjects: “…efficient authentication…”
Get full text
Article -
287
Analysis and improvement for authentication protocols of mobile ad hoc network with CSP approach
Published 2013-08-01Subjects: Get full text
Article -
288
Universally composable secure trusted access protocol for WLAN Mesh networks
Published 2008-01-01Subjects: Get full text
Article -
289
Construction of Information Security System of Power Generation Enterprise
Published 2014-01-01Subjects: “…identity authentication…”
Get full text
Article -
290
Communiquer sur l’authenticité d’un patrimoine architectural : le cas du grand ksar de Temacine dans le Sud-Est algérien
Published 2016-09-01Subjects: Get full text
Article -
291
Security access permission authentication simulation of multi-source network big data based on blockchain
Published 2024-02-01Subjects: Get full text
Article -
292
Enhanced Beidou user equipment access authentication protocol based on location key
Published 2022-11-01Subjects: Get full text
Article -
293
Chaining & counter-based block cipher mode for authentication
Published 2009-01-01Subjects: Get full text
Article -
294
Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture
Published 2023-04-01Subjects: Get full text
Article -
295
Research on network slicing security for 5G mMTC
Published 2022-02-01Subjects: Get full text
Article -
296
Predicate-based authenticated key exchange protocol with attribute-hiding
Published 2012-09-01Subjects: Get full text
Article -
297
Keystroke features recognition based on stable linear discriminant analysis
Published 2017-11-01Subjects: “…identity authentication…”
Get full text
Article -
298
Lightweight authentication method for network interconnection control protocols
Published 2018-11-01Subjects: “…lightweight authentication…”
Get full text
Article -
299
An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks
Published 2025-01-01Subjects: Get full text
Article -
300
Post-quantum verifier-based three-party password authenticated key exchange protocol
Published 2022-04-01Subjects: Get full text
Article