Search alternatives:
"identity authentication" » "identify authentication" (Expand Search), "density authentication" (Expand Search)
Showing 1 - 20 results of 39 for search '"identity authentication"', query time: 0.09s Refine Results
  1. 1

    Design of United Identity Authentication and Key Agreement Protocol for Hybrid Cloud by Chongxia Wang, Meizhen Gao, Qian Liu, Xianwei Zhou

    Published 2014-04-01
    Subjects: “…hybrid cloud;identity authentication;bilinear pairing;security…”
    Get full text
    Article
  2. 2
  3. 3

    Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA

    Published 2013-08-01
    Subjects: “…identity authentication protocol…”
    Get full text
    Article
  4. 4
  5. 5

    Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA

    Published 2013-08-01
    Subjects: “…identity authentication protocol;game theory;protocol security…”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Mobile office system oriented to intelligent terminal by Boxuan LV, Jingwen LIU, Wei XU, Dan WANG, Wenying NIE, Ming HE

    Published 2018-02-01
    Subjects: “…intelligent terminal;mobile OA;data security;identity authentication;device authentication…”
    Get full text
    Article
  17. 17

    Construction of Information Security System of Power Generation Enterprise by Ying Yu

    Published 2014-01-01
    Subjects: “…identity authentication…”
    Get full text
    Article
  18. 18

    A novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features by Xun LI, Lin YOU, Jiahao LIANG, Chunhui YAN

    Published 2018-10-01
    Subjects: “…fuzzy vault;fingerprint feature;face feature;template protection;identity authentication…”
    Get full text
    Article
  19. 19
  20. 20