-
321
Anonymous authentication scheme based on one-off public key in pervasive computing environments
Published 2012-02-01Subjects: Get full text
Article -
322
Efficient handover authentication and secure key-updating mechanism for B5G networks
Published 2021-12-01Subjects: “…handover authentication…”
Get full text
Article -
323
Conservation et transformation du patrimoine vivant
Published 2011-01-01Subjects: Get full text
Article -
324
Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method
Published 2025-01-01Subjects: “…Authenticated encryption…”
Get full text
Article -
325
Behavior authentication of Web users based on machine learning
Published 2018-01-01Subjects: Get full text
Article -
326
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
Published 2021-08-01Subjects: Get full text
Article -
327
Dual-proxy key-based threshold signature scheme for ship ad-hoc network
Published 2018-07-01Subjects: Get full text
Article -
328
Efficient authentication scheme for double-layer satellite network
Published 2019-03-01Subjects: “…satellite networking authentication…”
Get full text
Article -
329
Secure channel estimation model for cognitive radio network physical layer security using two-level shared key authentication
Published 2025-01-01Subjects: Get full text
Article -
330
The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database
Published 2016-03-01Subjects: Get full text
Article -
331
Study of cross-domain identity authentication in SOA environment
Published 2016-11-01Subjects: Get full text
Article -
332
Until you have something to lose! Loss aversion and two-factor authentication adoption
Published 2025-01-01Subjects: “…Two-factor authentication…”
Get full text
Article -
333
User authentication of industrial internet based on HHT transform of mouse behavior
Published 2022-06-01Subjects: Get full text
Article -
334
Machine learning-based authentication of banknotes: a comprehensive analysis
Published 2024-03-01Subjects: Get full text
Article -
335
Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT
Published 2016-06-01Subjects: Get full text
Article -
336
WLAN Mesh security association scheme in trusted computing environment
Published 2014-07-01Subjects: Get full text
Article -
337
Research on QR code logistics privacy based on segmented encryption and time-limited control
Published 2019-08-01Subjects: Get full text
Article -
338
A Novel Authentication Management for the Data Security of Smart Grid
Published 2024-01-01Subjects: Get full text
Article -
339
Tripartite authenticated key exchange protocol for smart grid
Published 2023-02-01Subjects: Get full text
Article -
340
Multi-factor identity authentication scheme for trusted sharing of cultural resources
Published 2023-10-01Subjects: “…multi-factor identity authentication…”
Get full text
Article