Showing 1 - 18 results of 18 for search '"Secure Authentication"', query time: 0.05s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Study on Security in SDN by Sujing Zhou

    Published 2013-09-01
    Subjects: “…software defined networking;security;authentication;authorization…”
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    RFID security authentication scheme based on Montgomery-form elliptic curve cryptography by Wumei ZHANG

    Published 2016-05-01
    Subjects: “…RFID;security authentication;elliptic curve cryptography;Montgomery;forward security…”
    Get full text
    Article
  12. 12
  13. 13

    Physical Layer Spoof Detection and Authentication for IoT Devices Using Deep Learning Methods by Da Huang, Akram Al-Hourani

    Published 2024-01-01
    Subjects: “…Physical layer security/authentication…”
    Get full text
    Article
  14. 14
  15. 15

    Evaluating Windows Vista user account security by Baghdad Science Journal

    Published 2011-06-01
    Subjects: “…Operating System, System Security, Authentication System, Trusted Computing, Windows Vista, Memory Protection.…”
    Get full text
    Article
  16. 16

    Chaotic sequences based watermarking wireless physical layer security authentication algorithm by CHEN Songlin

    Published 2025-07-01
    Subjects: “…wireless physical layer security authentication…”
    Get full text
    Article
  17. 17

    Low-cost group-based identity security authentication protocol for NB-IoT nodes by Xiangmao CHANG, Jun ZHAN, Zhiwei WANG

    Published 2021-12-01
    Subjects: “…group-based identity security authentication protocol…”
    Get full text
    Article
  18. 18

    Low-cost group-based identity security authentication protocol for NB-IoT nodes by Xiangmao CHANG, Jun ZHAN, Zhiwei WANG

    Published 2021-12-01
    Subjects: “…group-based identity security authentication protocol;Chinese remainder theorem;aggregate signature, NB-IoT…”
    Get full text
    Article