-
341
CNN-based continuous authentication scheme for vehicular digital twin
Published 2023-11-01Subjects: Get full text
Article -
342
Survey on data security and privacy-preserving for the research of edge computing
Published 2018-03-01Subjects: Get full text
Article -
343
Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical IoT
Published 2025-01-01Subjects: Get full text
Article -
344
PKI cross-domain authentication scheme based on advanced PBFT algorithm
Published 2020-08-01Subjects: “…cross-domain authentication…”
Get full text
Article -
345
5-pass zero-knowledge identity authentication scheme based on matrix completion problem
Published 2021-11-01Subjects: Get full text
Article -
346
Access and Handover Authentication in Intermittent Connection Scenario of Satellite Network
Published 2021-09-01Subjects: Get full text
Article -
347
Novel continuous identity authentication method based on mouse behavior
Published 2022-10-01Subjects: “…identity authentication…”
Get full text
Article -
348
Prototype Sistem Keamanan Mobil dengan Menggunakan Quick Response Code Berbasis Android dan Arduino
Published 2019-05-01Subjects: Get full text
Article -
349
Efficient ID-based multicast authentication protocol in wireless sensor networks
Published 2009-01-01Subjects: Get full text
Article -
350
False data filtering algorithm without relying on MAC authentication for wireless sensor networks
Published 2009-01-01Subjects: Get full text
Article -
351
Copula-Driven Learning Techniques for Physical Layer Authentication Using Multimodal Data
Published 2025-01-01Subjects: Get full text
Article -
352
Innovative resource-saving security strategies for IoT devices
Published 2025-01-01Subjects: Get full text
Article -
353
Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles
Published 2023-06-01Subjects: Get full text
Article -
354
Research on pairing-free certificateless batch anonymous authentication scheme for VANET
Published 2017-11-01Subjects: Get full text
Article -
355
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
Published 2016-05-01Subjects: “…anonymous security authentication…”
Get full text
Article -
356
Supply chain dynamic multi-center coordination authentication model based on block chain
Published 2016-01-01Subjects: “…multi-center coordination authentication…”
Get full text
Article -
357
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01Subjects: “…User authentication…”
Get full text
Article -
358
Pairing-free certificateless blockchain-based access authentication method for spatial information network
Published 2024-08-01Subjects: Get full text
Article -
359
Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
Published 2016-02-01Subjects: “…quantum identity authentication…”
Get full text
Article -
360
Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN
Published 2024-06-01Subjects: Get full text
Article