-
381
Lightweight mobile Ad Hoc network authentication scheme based on blockchain
Published 2020-08-01Subjects: Get full text
Article -
382
Rapid identification of high-temperature Daqu Baijiu with the same aroma type by UV-VIS sensor of HBT combined with Zn2+
Published 2025-01-01Subjects: Get full text
Article -
383
Analysis and improvement of an ID-based authenticated key agreement protocol
Published 2008-01-01Subjects: “…ID-based authenticated key agreement…”
Get full text
Article -
384
A survey of mitigating satellite interference technology
Published 2017-01-01Subjects: Get full text
Article -
385
Methods for Improving Point Cloud Authenticity in LiDAR Simulation for Autonomous Driving: A Review
Published 2025-01-01Subjects: Get full text
Article -
386
Low-cost group-based identity security authentication protocol for NB-IoT nodes
Published 2021-12-01Subjects: “…group-based identity security authentication protocol…”
Get full text
Article -
387
Hierarchical certificateless authenticated key agreement protocol
Published 2016-07-01Subjects: Get full text
Article -
388
Conditional privacy-protection remote user authentication mechanism for WBAN
Published 2016-10-01Subjects: Get full text
Article -
389
Privacy-preserving attribute-based access control using homomorphic encryption
Published 2025-01-01Subjects: Get full text
Article -
390
Exploring the impact of AI-enhanced virtual tourism on Tourists' pro-environmental behavior: A stimulus-organism-response model perspective
Published 2025-03-01Subjects: Get full text
Article -
391
An improved RFID authentication protocol based on quadratic residue
Published 2018-04-01Subjects: Get full text
Article -
392
Revolutionizing User Authentication Exploiting Explainable AI and CTGAN-Based Keystroke Dynamics
Published 2025-01-01Subjects: Get full text
Article -
393
Beyond full‐bit secure authenticated encryption without input‐length limitation
Published 2022-07-01Subjects: “…authenticated encryption…”
Get full text
Article -
394
Secure access authentication scheme for 4G wireless network based on PCL
Published 2012-04-01Subjects: Get full text
Article -
395
Group-Based Authentication Methods in The OneM2M Ecosystem
Published 2022-12-01Subjects: “…group-based authentication…”
Get full text
Article -
396
Unclonable dynamic k-times anonymous authentication
Published 2012-07-01Subjects: “…k-times anonymous authentication…”
Get full text
Article -
397
Secure and efficient group handover authentication protocol based on trajectory prediction in 5G-V2X
Published 2023-08-01Subjects: Get full text
Article -
398
Adulteration detection in cactus seed oil: Integrating analytical chemistry and machine learning approaches
Published 2025-01-01Subjects: Get full text
Article -
399
Real-Time Mouse Data Protection Method Using GANs for Image-Based User Authentication Based on GetCursorPos() and SetCursorPos() Functions
Published 2025-01-01Subjects: “…image-based authentication…”
Get full text
Article -
400
Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challenges
Published 2024-10-01Subjects: Get full text
Article