-
301
Privacy-preserving access control for public wireless LAN utilizing the bitcoin blockchain
Published 2020-04-01Subjects: Get full text
Article -
302
Consumer Anthropomorphism and Happiness: Analysis of the Brand Authenticity Effect
Published 2023-12-01Subjects: Get full text
Article -
303
Verifier-based password-authenticated key exchange protocol for three-party
Published 2008-01-01Subjects: “…password-authenticated key exchange…”
Get full text
Article -
304
Dynamic accumulators-based authenticated group key management scheme for heterogeneous wireless sensor network
Published 2014-03-01Subjects: Get full text
Article -
305
Password-based three-party authenticated key exchange protocol from lattices
Published 2018-11-01Subjects: Get full text
Article -
306
Research on the incentive mechanism of trusted transactions based on blockchain
Published 2024-08-01Subjects: “…distributed identity authentication…”
Get full text
Article -
307
Authentication scheme for multi-cloud environment based on smart card
Published 2018-04-01Subjects: Get full text
Article -
308
Fast handover authentication scheme in 5G mobile edge computing scenarios
Published 2022-06-01Subjects: Get full text
Article -
309
Content authentication of H.264/AVC video stream based on semi-fragile watermarking
Published 2009-01-01Subjects: “…video authentication…”
Get full text
Article -
310
Edwards curves based security authentication protocol for mobile RFID systems
Published 2014-11-01Subjects: Get full text
Article -
311
Lightweight PUF-based anonymous authentication protocol in V2G
Published 2024-10-01Subjects: “…anonymous authentication…”
Get full text
Article -
312
A bidirectional authentication protocol for mobile RFID system based on PRF
Published 2018-10-01Subjects: Get full text
Article -
313
-
314
Broadcast authentication algorithm for wireless sensor networks
Published 2010-01-01Subjects: Get full text
Article -
315
Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats
Published 2024-12-01Subjects: Get full text
Article -
316
Embracing quiet ego for flourishing: mediating role of authenticity and voluntary simplicity
Published 2025-12-01Subjects: Get full text
Article -
317
Multi-user broadcast authentication scheme in wireless sensor networks with defending against DoS attacks
Published 2011-01-01Subjects: Get full text
Article -
318
Research on batch anonymous authentication scheme for VANET based on bilinear pairing
Published 2017-06-01Subjects: Get full text
Article -
319
New affiliation-hiding authenticated key exchange protocol
Published 2015-09-01Subjects: Get full text
Article -
320
Research on anonymous identity authentication technology in Fabric
Published 2021-06-01Subjects: “…anonymous identity authentication…”
Get full text
Article