-
1
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01Subjects: “…identity authentication protocol…”
Get full text
Article -
2
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01Subjects: “…identity authentication protocol;game theory;protocol security…”
Get full text
Article -
3
Securing UAV Flying Ad Hoc Wireless Networks: Authentication Development for Robust Communications
Published 2025-02-01Subjects: Get full text
Article -
4
Blockchain-based high transparent PKI authentication protocol
Published 2022-08-01Subjects: Get full text
Article -
5
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01Subjects: Get full text
Article -
6
Research on key management and authentication protocol of PDA in smart grid
Published 2018-03-01Subjects: Get full text
Article -
7
Efficient anonymous authentication protocol for internet of vehicles based on Chinese cryptographic SM2
Published 2025-06-01Subjects: Get full text
Article -
8
PUF-Based Secure and Efficient Anonymous Authentication Protocol for UAV Towards Cross-Domain Environments
Published 2025-03-01Subjects: Get full text
Article -
9
Universally composable secure trusted access protocol for WLAN Mesh networks
Published 2008-01-01Subjects: Get full text
Article -
10
Provably secure and lightweight blockchain based cross hospital authentication scheme for IoMT-based healthcare
Published 2025-02-01Subjects: “…Authentication protocol…”
Get full text
Article -
11
Efficient ID-based multicast authentication protocol in wireless sensor networks
Published 2009-01-01Subjects: “…wireless sensor networks;multicast authentication protocol;PKC;Co-DH group pair…”
Get full text
Article -
12
Efficient ID-based multicast authentication protocol in wireless sensor networks
Published 2009-01-01Subjects: Get full text
Article -
13
DEVELOPMENT OF A METHOD FOR CONSTRUCTING A MODULAR COMPOSITE CODE FOR A NOISE-PROOF SATELLITE AUTHENTICATION SYSTEM
Published 2022-08-01Subjects: Get full text
Article -
14
Mutual Identity Authentication Based on Dynamic Identity and Hybrid Encryption for UAV–GCS Communications
Published 2025-06-01Subjects: Get full text
Article -
15
SDFAC:software defined flow access control mechanism
Published 2015-11-01Subjects: Get full text
Article -
16
Low-cost group-based identity security authentication protocol for NB-IoT nodes
Published 2021-12-01Subjects: “…group-based identity security authentication protocol…”
Get full text
Article -
17
Low-cost group-based identity security authentication protocol for NB-IoT nodes
Published 2021-12-01Subjects: “…group-based identity security authentication protocol;Chinese remainder theorem;aggregate signature, NB-IoT…”
Get full text
Article -
18
Efficient handover authentication protocol for cloud-edge collaborative UAV networks
Published 2025-06-01Subjects: Get full text
Article -
19
Secure access authentication scheme for 4G wireless network based on PCL
Published 2012-04-01Subjects: “…self-certified public key;protocol composition logic;protocol derivation system;authentication protocol;4G…”
Get full text
Article -
20
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
Published 2024-01-01Subjects: Get full text
Article