-
81
Direct anonymous authentication scheme for wireless networks under trusted computing
Published 2010-01-01Subjects: Get full text
Article -
82
Cloud Security Certification Technology Based on Fingerprint Recognition
Published 2015-08-01Subjects: Get full text
Article -
83
Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain
Published 2018-09-01Subjects: Get full text
Article -
84
Efficient and secure message authentication scheme for VANET
Published 2016-11-01Subjects: Get full text
Article -
85
Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario
Published 2020-10-01Subjects: Get full text
Article -
86
Authentication Scheme Based on Agents for Heterogeneous Cloud
Published 2013-03-01Subjects: Get full text
Article -
87
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
Published 2025-01-01Subjects: “…Authentication…”
Get full text
Article -
88
Efficient revocable certificateless remote anonymous authentication protocol for wireless body area network
Published 2018-04-01Subjects: Get full text
Article -
89
TS-PAID: A Two-Stage PUF-Based Lightweight Authentication Protocol for Internet of Drones
Published 2025-01-01Subjects: Get full text
Article -
90
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01Subjects: Get full text
Article -
91
Certificate-based cross-domain authentication scheme with anonymity
Published 2018-05-01Subjects: Get full text
Article -
92
Efficient and secure electronic evidence exchange scheme for internet of things
Published 2025-01-01Subjects: Get full text
Article -
93
Efficient anonymous reputation-based revocation without TTP
Published 2014-07-01Subjects: Get full text
Article -
94
Lattice-based lightweight post quantum access authentication scheme for satellite network
Published 2024-10-01Subjects: Get full text
Article -
95
RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks
Published 2025-01-01Subjects: Get full text
Article -
96
Perceptual image hashing sensitive to content modification
Published 2012-11-01Subjects: “…image authentication…”
Get full text
Article -
97
Toward Authentication of Videos: Integer Transform Based Motion Vector Watermarking
Published 2022-01-01Subjects: Get full text
Article -
98
Identity-based cross-domain authentication scheme in pervasive computing environments
Published 2011-01-01Subjects: Get full text
Article -
99
BCSE: Blockchain-Based Trusted Service Evaluation Model over Big Data
Published 2022-03-01Subjects: Get full text
Article -
100