-
121
Provable secure ownership transfer protocol for RFID tag
Published 2015-08-01Subjects: Get full text
Article -
122
Efficient Authentication Mechanism For Defending Against Reflection-Based Attacks on Domain Name System
Published 2020-06-01Subjects: “…DNS, Reflection/Amplification attacks, Amplification factor, CHAP, Source Authentication.…”
Get full text
Article -
123
IBEXSec:a universal security framework for industrial internet terminal access
Published 2020-03-01Subjects: Get full text
Article -
124
Navigating the Challenges and Opportunities of Securing Internet of Autonomous Vehicles With Lightweight Authentication
Published 2025-01-01Subjects: “…Lightweight authentication…”
Get full text
Article -
125
A Verifiable Discrete Trust Model (VDTM) Using Congruent Federated Learning (CFL) for Social Internet of Vehicles
Published 2024-01-01Subjects: Get full text
Article -
126
Intra-group mutual authentication key agreement protocol based on Chinese remainder theorem in VANET system
Published 2022-01-01Subjects: Get full text
Article -
127
Research on quantum key distribution technology in intelligent substation
Published 2018-10-01Subjects: “…power vertical encrypted authentication gateway…”
Get full text
Article -
128
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01Subjects: Get full text
Article -
129
Research on key management and authentication protocol of PDA in smart grid
Published 2018-03-01Subjects: Get full text
Article -
130
Pre-authentication and group management based secure handover for space-earth integration network
Published 2016-07-01Subjects: Get full text
Article -
131
Application of Interactive Multi-Biometrics Recognition on E-Commerce
Published 2015-10-01Subjects: Get full text
Article -
132
Forgery face detection method based on multi-domain temporal features mining
Published 2023-06-01Subjects: “…face authentication…”
Get full text
Article -
133
Secure authentication enhancement scheme for seamless handover and roaming in space information network
Published 2019-06-01Subjects: Get full text
Article -
134
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
Published 2016-05-01Subjects: Get full text
Article -
135
Design of efficient anonymous identity authentication protocol for lightweight IoT devices
Published 2022-07-01Subjects: Get full text
Article -
136
Provable data possession scheme with authentication
Published 2016-10-01Subjects: “…authentication…”
Get full text
Article -
137
Issues of identity verification of typical applications over mobile terminal platform
Published 2020-12-01Subjects: Get full text
Article -
138
One-time password authentication for one-way communication without re-registration
Published 2020-06-01Subjects: Get full text
Article -
139
Two-stage authentication and key agreement protocol for commuting in Internet of vehicles
Published 2024-05-01Subjects: Get full text
Article -
140
Blockchain-based cross-data center anonymous and verifiable identity authentication scheme
Published 2024-04-01Subjects: Get full text
Article