-
181
Two-factor wearable device authentication protocol based on PUF and IPI
Published 2017-06-01Subjects: “…authentication protocol…”
Get full text
Article -
182
On the Evaluation of the Hyperthermic Efficiency of Magnetic Scaffolds
Published 2024-01-01Subjects: “…Heating evaluation protocol…”
Get full text
Article -
183
Software defined network implementation of multi-node adaptive novel quantum key distribution protocol
Published 2024-09-01Subjects: Get full text
Article -
184
Aggregation algorithm for MPLS multicast flows based on bidirectional shared tree
Published 2010-01-01Subjects: Get full text
Article -
185
SDN self-protection system based on Renyi entropy
Published 2021-06-01Subjects: Get full text
Article -
186
External apical root resorption in orthodontically treated Class II malocclusions with 2-phase protocol (A 10-year Experience)
Published 2019-06-01Subjects: Get full text
Article -
187
Performance evaluation of TCP congestion control algorithms in fast long distance network
Published 2014-04-01Subjects: Get full text
Article -
188
-
189
FractalNet-based key generation for authentication in Voice over IP using Blockchain
Published 2025-03-01Subjects: Get full text
Article -
190
Development and status of vehicular ad hoc networks
Published 2007-01-01Subjects: Get full text
Article -
191
EN-Bypass: a security assessment method on e-mail user interface notification
Published 2023-06-01Subjects: Get full text
Article -
192
Microclonal propagation of elite industrial grape cultivars (<i>Vitis vinifera</i> L.)
Published 2024-01-01Subjects: Get full text
Article -
193
Entangled state testing in the quantum Byzantine agreement
Published 2016-11-01Subjects: Get full text
Article -
194
The Explo’Santé mixed methods protocol: an interventional research school health promotion project in France
Published 2025-01-01Subjects: Get full text
Article -
195
Research on vulnerability and security technology of industrial Ethernet protocol
Published 2017-11-01Subjects: Get full text
Article -
196
UCAP:a PCL secure user authentication protocol in cloud computing
Published 2018-08-01Subjects: Get full text
Article -
197
Design and realization of the real-time monitoring system for instant messenger
Published 2008-01-01Subjects: Get full text
Article -
198
Determinants of mortality after massive transfusion - A prospective study
Published 2024-12-01Subjects: Get full text
Article -
199
-
200
Two-factor authenticated key agreement protocol based on biometric feature and password
Published 2017-07-01Subjects: “…authenticated key agreement protocol…”
Get full text
Article