Showing 1 - 20 results of 22 for search '"authentication protocols"', query time: 0.04s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA

    Published 2013-08-01
    Subjects: “…identity authentication protocol…”
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Low-cost group-based identity security authentication protocol for NB-IoT nodes by Xiangmao CHANG, Jun ZHAN, Zhiwei WANG

    Published 2021-12-01
    Subjects: “…group-based identity security authentication protocol…”
    Get full text
    Article
  19. 19
  20. 20