-
21
Research on anonymous identity authentication technology in Fabric
Published 2021-06-01Subjects: Get full text
Article -
22
User authentication of industrial internet based on HHT transform of mouse behavior
Published 2022-06-01Subjects: “…industrial internet;identity authentication;mouse behavior;Hilbert-Huang transform;Bagged tree…”
Get full text
Article -
23
5-pass zero-knowledge identity authentication scheme based on matrix completion problem
Published 2021-11-01Subjects: “…post-quantum cryptography;identity authentication;zero-knowledge proof;matrix completion problem…”
Get full text
Article -
24
Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT
Published 2016-06-01Subjects: “…Internet of things;terminal device;identity authentication;elliptic curve cryptography;cookie information…”
Get full text
Article -
25
5-pass zero-knowledge identity authentication scheme based on matrix completion problem
Published 2021-11-01Subjects: Get full text
Article -
26
Authenticated Multi-Party Quantum Private Set Intersection with Single Particles
Published 2025-06-01Subjects: Get full text
Article -
27
Controlled quantum authentication confidential communication protocol for smart healthcare
Published 2025-05-01Subjects: Get full text
Article -
28
Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
Published 2016-02-01Subjects: “…quantum identity authentication…”
Get full text
Article -
29
Mutual Identity Authentication Based on Dynamic Identity and Hybrid Encryption for UAV–GCS Communications
Published 2025-06-01Subjects: Get full text
Article -
30
Researcb on Application Bidirectional Identity Autbentication Scbeme Based on Mobile Pbone Token
Published 2014-09-01Subjects: Get full text
Article -
31
Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
Published 2016-02-01Subjects: “…quantum identity authentication;quantum key distribution;measurement-device-independent;Bell-state measurement…”
Get full text
Article -
32
Privacy-preserving authentication scheme for electricity trading in V2G network using anonymous credential and blockchain
Published 2025-05-01Subjects: “…privacy-preserving identity authentication…”
Get full text
Article -
33
Research Framework and Anticipated Results of Key Technologies for Distributed Certificate-less Network Identity Systems
Published 2025-05-01Subjects: Get full text
Article -
34
A distributed zero-trust scheme for airborne wireless sensor networks using dynamic identity authentication
Published 2025-03-01Subjects: Get full text
Article -
35
A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and CRT
Published 2023-12-01Subjects: “…ZigBee network;Chebyshev chaotic mapping;two-way identity authentication;anonymity;key distribution…”
Get full text
Article -
36
Group Authentication Key Agreement Protocol Based on Certificateless Cryptography in UAV Network
Published 2025-01-01Subjects: Get full text
Article -
37
Deep learning based bio-metric authentication system using a high temporal/frequency resolution transform
Published 2024-12-01Subjects: “…identity authentication…”
Get full text
Article -
38
Authentication method in SWIM based on improved Diameter/EAP-MD5
Published 2014-08-01Subjects: Get full text
Article -
39