Search alternatives:
"identity authentication" » "identify authentication" (Expand Search), "density authentication" (Expand Search)
"identity authentication" » "identify authentication" (Expand Search), "density authentication" (Expand Search)
-
1
Design of United Identity Authentication and Key Agreement Protocol for Hybrid Cloud
Published 2014-04-01Subjects: “…hybrid cloud;identity authentication;bilinear pairing;security…”
Get full text
Article -
2
Key technologies and application of artificial intelligence in telecom real-name system
Published 2019-05-01Subjects: Get full text
Article -
3
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01Subjects: “…identity authentication protocol…”
Get full text
Article -
4
Mutual authentication scheme based on the TPM cloud computing platform
Published 2012-11-01Subjects: Get full text
Article -
5
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01Subjects: “…identity authentication protocol;game theory;protocol security…”
Get full text
Article -
6
Distributed and efficient identity authentication based on consortium blockchain
Published 2022-03-01Subjects: Get full text
Article -
7
Cloud Security Certification Technology Based on Fingerprint Recognition
Published 2015-08-01Subjects: Get full text
Article -
8
Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario
Published 2020-10-01Subjects: Get full text
Article -
9
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01Subjects: Get full text
Article -
10
BCSE: Blockchain-Based Trusted Service Evaluation Model over Big Data
Published 2022-03-01Subjects: Get full text
Article -
11
-
12
New entity authentication and access control scheme in satellite communication network
Published 2018-06-01Subjects: “…identity authentication…”
Get full text
Article -
13
Research on“Wo Connect”Uniform Authentication Technology
Published 2015-06-01Subjects: Get full text
Article -
14
A novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features
Published 2018-10-01Subjects: Get full text
Article -
15
Mobile office system oriented to intelligent terminal
Published 2018-02-01Subjects: Get full text
Article -
16
Mobile office system oriented to intelligent terminal
Published 2018-02-01Subjects: “…intelligent terminal;mobile OA;data security;identity authentication;device authentication…”
Get full text
Article -
17
Construction of Information Security System of Power Generation Enterprise
Published 2014-01-01Subjects: “…identity authentication…”
Get full text
Article -
18
A novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features
Published 2018-10-01Subjects: “…fuzzy vault;fingerprint feature;face feature;template protection;identity authentication…”
Get full text
Article -
19
Authentication scheme for multi-cloud environment based on smart card
Published 2018-04-01Subjects: Get full text
Article -
20
Wireless Authentication Method Based on Near-Field Feature Fusion Network
Published 2025-01-01Subjects: “…identity authentication…”
Get full text
Article