-
1
Trusted and anonymous authentication scheme for wireless networks
Published 2009-01-01Subjects: Get full text
Article -
2
Analysis and improvement for authentication protocols of mobile ad hoc network with CSP approach
Published 2013-08-01Subjects: Get full text
Article -
3
A secure authentication method based on hash function for RFID system
Published 2017-06-01Subjects: Get full text
Article -
4
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01Subjects: “…identity authentication protocol…”
Get full text
Article -
5
Provable secure mutual authentication protocol for RFID in the standard model
Published 2013-04-01Subjects: Get full text
Article -
6
Design of anonymous authentication protocol for RFID
Published 2009-01-01Subjects: Get full text
Article -
7
Openstack authentication protocol based on digital certificate
Published 2019-02-01Subjects: Get full text
Article -
8
-
9
Access control model and its application for collaborative information systems
Published 2008-01-01Subjects: Get full text
Article -
10
Blockchain-based high transparent PKI authentication protocol
Published 2022-08-01Subjects: Get full text
Article -
11
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01Subjects: Get full text
Article -
12
Research on key management and authentication protocol of PDA in smart grid
Published 2018-03-01Subjects: Get full text
Article -
13
Survey on user authentication protocol in wireless sensor network
Published 2017-01-01Subjects: Get full text
Article -
14
Two-factor wearable device authentication protocol based on PUF and IPI
Published 2017-06-01Subjects: “…authentication protocol…”
Get full text
Article -
15
Universally composable secure trusted access protocol for WLAN Mesh networks
Published 2008-01-01Subjects: Get full text
Article -
16
Efficient ID-based multicast authentication protocol in wireless sensor networks
Published 2009-01-01Subjects: Get full text
Article -
17
SDFAC:software defined flow access control mechanism
Published 2015-11-01Subjects: Get full text
Article -
18
Low-cost group-based identity security authentication protocol for NB-IoT nodes
Published 2021-12-01Subjects: “…group-based identity security authentication protocol…”
Get full text
Article -
19
Secure access authentication scheme for 4G wireless network based on PCL
Published 2012-04-01Subjects: Get full text
Article -
20
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
Published 2024-01-01Subjects: Get full text
Article