-
361
Secure software development: leveraging application call graphs to detect security vulnerabilities
Published 2025-01-01Subjects: Get full text
Article -
362
Researcb on Application Bidirectional Identity Autbentication Scbeme Based on Mobile Pbone Token
Published 2014-09-01Subjects: Get full text
Article -
363
Fresh sweet cherry fruit characterization and differentiation by Raman spectroscopy coupled with PCA
Published 2024-01-01Subjects: Get full text
Article -
364
Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles
Published 2021-06-01Subjects: Get full text
Article -
365
New security model for cross-realm C2C-PAKE protocol
Published 2008-01-01Subjects: “…password-authenticated key exchange…”
Get full text
Article -
366
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01Subjects: Get full text
Article -
367
Data fusion protocol with source security for sensor networks
Published 2010-01-01Subjects: Get full text
Article -
368
CORPORATE SOCIAL RESPONSIBILITY AUTHENTICITY AND FIRM PERFORMANCE IN AN EMERGING MARKET
Published 2023-12-01Subjects: “…Authenticity…”
Get full text
Article -
369
A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression
Published 2025-01-01Subjects: Get full text
Article -
370
Digital video passive forensics for its authenticity and source
Published 2011-01-01Subjects: Get full text
Article -
371
Efficient pseudonym certificate distribution scheme for Internet of vehicles based on novel sanitizable multi-signature
Published 2024-11-01Subjects: Get full text
Article -
372
Self-embedding robust digital watermarking algorithm with perfectly blind detection
Published 2012-10-01Subjects: Get full text
Article -
373
New group key management framework for mobile ad hoc network based on identity authentication in elliptic curve field
Published 2007-01-01Subjects: “…mutual identity-based authentication…”
Get full text
Article -
374
SDFAC:software defined flow access control mechanism
Published 2015-11-01Subjects: Get full text
Article -
375
Hardware and Deep Learning-Based Authentication Through Enhanced RF Fingerprints of 3D-Printed Chaotic Antenna Arrays
Published 2025-01-01Subjects: Get full text
Article -
376
-
377
A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and CRT
Published 2023-12-01Subjects: Get full text
Article -
378
Credible distributed identity authentication system of microgrid based on blockchain
Published 2021-12-01Subjects: “…distributed identity authentication system…”
Get full text
Article -
379
Copy-Move Forgery Verification in Images Using Local Feature Extractors and Optimized Classifiers
Published 2023-09-01Subjects: Get full text
Article -
380
Corrigendum: Authenticity doubt on the Tomioka (Yishen Lun) manuscript: A discourse analysis
Published 2025-02-01Subjects: Get full text
Article