-
41
Anonymous group key distribution scheme for the internet of vehicles
Published 2023-10-01Subjects: Get full text
Article -
42
A digital signature scheme based on shared key in intelligent terminal
Published 2017-02-01Subjects: Get full text
Article -
43
Efficient three-party authenticated key agreement protocol based on chaotic map
Published 2016-06-01Subjects: Get full text
Article -
44
A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility
Published 2024-12-01Subjects: Get full text
Article -
45
Research on smart authentication authorization and accounting in next generation network
Published 2006-01-01Subjects: “…identity authentication…”
Get full text
Article -
46
Authenticating Features in the TEI
Published 2021-09-01Subjects: “…authentication…”
Get full text
Article -
47
BSAMS: Blockchain-Based Secure Authentication Scheme in Meteorological Systems
Published 2023-03-01Subjects: Get full text
Article -
48
Study on Key Technology of WLAN Service Non-Sense Authentication Method
Published 2013-09-01Subjects: “…service non-sense authentication…”
Get full text
Article -
49
Stability of password authentication in infocommunication networks
Published 2020-09-01Subjects: “…password authentication…”
Get full text
Article -
50
Authentication method in SWIM based on improved Diameter/EAP-MD5
Published 2014-08-01Subjects: Get full text
Article -
51
Lossless image authentication algorithm based on adaptive combinations of image basic blocks
Published 2012-06-01Subjects: “…lossless image authentication…”
Get full text
Article -
52
Design of United Identity Authentication and Key Agreement Protocol for Hybrid Cloud
Published 2014-04-01Subjects: Get full text
Article -
53
Network authentication technology based on public key system
Published 2016-02-01Subjects: Get full text
Article -
54
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Published 2016-01-01Subjects: Get full text
Article -
55
Novel key management and authentication scheme for ad hoc space networks
Published 2006-01-01Subjects: Get full text
Article -
56
Trusted and anonymous authentication scheme for wireless networks
Published 2009-01-01Subjects: Get full text
Article -
57
Key technologies and application of artificial intelligence in telecom real-name system
Published 2019-05-01Subjects: Get full text
Article -
58
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01Subjects: “…identity authentication protocol…”
Get full text
Article -
59
-
60
GRU-based multi-scenario gait authentication for smartphones
Published 2022-10-01Subjects: “…continuous authentication…”
Get full text
Article