-
221
Novel continuous identity authentication method based on mouse behavior
Published 2022-10-01Subjects: “…identity authentication…”
Get full text
Article -
222
Prototype Sistem Keamanan Mobil dengan Menggunakan Quick Response Code Berbasis Android dan Arduino
Published 2019-05-01Subjects: Get full text
Article -
223
Efficient ID-based multicast authentication protocol in wireless sensor networks
Published 2009-01-01Subjects: Get full text
Article -
224
False data filtering algorithm without relying on MAC authentication for wireless sensor networks
Published 2009-01-01Subjects: Get full text
Article -
225
Copula-Driven Learning Techniques for Physical Layer Authentication Using Multimodal Data
Published 2025-01-01Subjects: Get full text
Article -
226
Innovative resource-saving security strategies for IoT devices
Published 2025-01-01Subjects: Get full text
Article -
227
Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles
Published 2023-06-01Subjects: Get full text
Article -
228
Research on pairing-free certificateless batch anonymous authentication scheme for VANET
Published 2017-11-01Subjects: Get full text
Article -
229
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
Published 2016-05-01Subjects: “…anonymous security authentication…”
Get full text
Article -
230
Supply chain dynamic multi-center coordination authentication model based on block chain
Published 2016-01-01Subjects: “…multi-center coordination authentication…”
Get full text
Article -
231
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01Subjects: “…User authentication…”
Get full text
Article -
232
Pairing-free certificateless blockchain-based access authentication method for spatial information network
Published 2024-08-01Subjects: Get full text
Article -
233
Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
Published 2016-02-01Subjects: “…quantum identity authentication…”
Get full text
Article -
234
Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN
Published 2024-06-01Subjects: Get full text
Article -
235
Secure software development: leveraging application call graphs to detect security vulnerabilities
Published 2025-01-01Subjects: Get full text
Article -
236
Researcb on Application Bidirectional Identity Autbentication Scbeme Based on Mobile Pbone Token
Published 2014-09-01Subjects: Get full text
Article -
237
Fresh sweet cherry fruit characterization and differentiation by Raman spectroscopy coupled with PCA
Published 2024-01-01Subjects: Get full text
Article -
238
Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles
Published 2021-06-01Subjects: Get full text
Article -
239
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01Subjects: Get full text
Article -
240
Data fusion protocol with source security for sensor networks
Published 2010-01-01Subjects: Get full text
Article