-
161
Automotive ethernet controller authentication method based on national cryptographic algorithms
Published 2022-12-01Subjects: Get full text
Article -
162
A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments
Published 2025-01-01Subjects: Get full text
Article -
163
Research and implement of file safe deposit box based on authentication and authorization
Published 2016-05-01Subjects: Get full text
Article -
164
Cross-domain authentication scheme based on consortium blockchain
Published 2022-06-01Subjects: “…cross-domain authentication…”
Get full text
Article -
165
Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain
Published 2023-05-01Subjects: Get full text
Article -
166
Robust image hashing method from global perception features of human visual cortex
Published 2011-01-01Subjects: Get full text
Article -
167
Cooperation-based location authentication scheme for crowdsensing applications
Published 2022-09-01Subjects: Get full text
Article -
168
Efficient communication protocol of group negotiation in VANET
Published 2018-01-01Subjects: “…efficient authentication…”
Get full text
Article -
169
Analysis and improvement for authentication protocols of mobile ad hoc network with CSP approach
Published 2013-08-01Subjects: Get full text
Article -
170
Universally composable secure trusted access protocol for WLAN Mesh networks
Published 2008-01-01Subjects: Get full text
Article -
171
Construction of Information Security System of Power Generation Enterprise
Published 2014-01-01Subjects: “…identity authentication…”
Get full text
Article -
172
Security access permission authentication simulation of multi-source network big data based on blockchain
Published 2024-02-01Subjects: Get full text
Article -
173
Enhanced Beidou user equipment access authentication protocol based on location key
Published 2022-11-01Subjects: Get full text
Article -
174
Chaining & counter-based block cipher mode for authentication
Published 2009-01-01Subjects: Get full text
Article -
175
Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture
Published 2023-04-01Subjects: Get full text
Article -
176
Research on network slicing security for 5G mMTC
Published 2022-02-01Subjects: Get full text
Article -
177
Predicate-based authenticated key exchange protocol with attribute-hiding
Published 2012-09-01Subjects: Get full text
Article -
178
Keystroke features recognition based on stable linear discriminant analysis
Published 2017-11-01Subjects: “…identity authentication…”
Get full text
Article -
179
Lightweight authentication method for network interconnection control protocols
Published 2018-11-01Subjects: “…lightweight authentication…”
Get full text
Article -
180
An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks
Published 2025-01-01Subjects: Get full text
Article