-
1
Research of authentication techniques for the Internet of things
Published 2020-07-01Subjects: Get full text
Article -
2
Fingerprint template protection by adopting random projection based on re-encryption
Published 2018-02-01Subjects: Get full text
Article -
3
CareNexus: Integrated solutions for Healthcare Communication
Published 2025-05-01Subjects: Get full text
Article -
4
Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing
Published 2025-06-01Subjects: Get full text
Article -
5
Gaia-X-Med: Experiences with Building Dataspaces for Medical Applications
Published 2024-12-01Subjects: Get full text
Article -
6
Study on Security in SDN
Published 2013-09-01Subjects: “…software defined networking;security;authentication;authorization…”
Get full text
Article -
7
Research and Application of Embedded Control Software Security Design
Published 2018-01-01Subjects: Get full text
Article -
8
RBAC-Based One-to-Many Authentication and Key Negotiation Scheme in Smart Factory
Published 2024-01-01Subjects: Get full text
Article -
9
IBEXSec:a universal security framework for industrial internet terminal access
Published 2020-03-01Subjects: Get full text
Article -
10
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
Published 2016-05-01Subjects: Get full text
Article -
11
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
Published 2016-05-01Subjects: “…RFID;security authentication;elliptic curve cryptography;Montgomery;forward security…”
Get full text
Article -
12
Edwards curves based security authentication protocol for mobile RFID systems
Published 2014-11-01Subjects: Get full text
Article -
13
Physical Layer Spoof Detection and Authentication for IoT Devices Using Deep Learning Methods
Published 2024-01-01Subjects: “…Physical layer security/authentication…”
Get full text
Article -
14
-
15
Evaluating Windows Vista user account security
Published 2011-06-01Subjects: “…Operating System, System Security, Authentication System, Trusted Computing, Windows Vista, Memory Protection.…”
Get full text
Article -
16
Chaotic sequences based watermarking wireless physical layer security authentication algorithm
Published 2025-07-01Subjects: “…wireless physical layer security authentication…”
Get full text
Article -
17
Low-cost group-based identity security authentication protocol for NB-IoT nodes
Published 2021-12-01Subjects: “…group-based identity security authentication protocol…”
Get full text
Article -
18
Low-cost group-based identity security authentication protocol for NB-IoT nodes
Published 2021-12-01Subjects: “…group-based identity security authentication protocol;Chinese remainder theorem;aggregate signature, NB-IoT…”
Get full text
Article