-
1
Spoofing detection on adaptive authentication System‐A survey
Published 2022-03-01Subjects: “…adaptive authentication…”
Get full text
Article -
2
Library resource sharing solution based on federated authentication and CALIS unified authentication
Published 2013-09-01Subjects: “…federated authentication…”
Get full text
Article -
3
Mutual authentication scheme based on the TPM cloud computing platform
Published 2012-11-01Subjects: Get full text
Article -
4
Bulid campus network authentication system based on centralized 802.1x
Published 2014-10-01Subjects: “…802.1x authentication…”
Get full text
Article -
5
Study on Unified Identifier Authentication Service and Standards on Public Network
Published 2013-02-01Subjects: Get full text
Article -
6
Research of authentication techniques for the Internet of things
Published 2020-07-01Subjects: Get full text
Article -
7
Research on Access Authentication and Re-Authentication Mechanism of User Devices in Terrestrial Default Scenario in Satellite Internet
Published 2023-06-01Subjects: Get full text
Article -
8
Openstack authentication protocol based on digital certificate
Published 2019-02-01Subjects: Get full text
Article -
9
Anonymity handover authentication protocol based on group signature for wireless Mesh network
Published 2016-10-01Subjects: Get full text
Article -
10
Identity authentication scheme of Android client based on identifiers
Published 2017-04-01Subjects: Get full text
Article -
11
Research on“Wo Connect”Uniform Authentication Technology
Published 2015-06-01Subjects: Get full text
Article -
12
Lightweight authentication protocol for security vehicle network of railway freight train
Published 2018-11-01Subjects: Get full text
Article -
13
Mobile office system oriented to intelligent terminal
Published 2018-02-01Subjects: Get full text
Article -
14
UCAP:a PCL secure user authentication protocol in cloud computing
Published 2018-08-01Subjects: Get full text
Article -
15
Packet-loss robust scalable authentication algorithm for compressed image streaming
Published 2014-04-01Subjects: “…image authentication…”
Get full text
Article -
16
Overview of mobile communication network authentication
Published 2018-12-01Subjects: Get full text
Article -
17
A Remote User Security Authentication Scheme Using Smart Card and Password Protection for WSN
Published 2015-12-01Subjects: Get full text
Article -
18
Technical scheme of the unified account authentication service for operators
Published 2018-05-01Subjects: Get full text
Article -
19
Research on large-scale identity authentication architecture based on combined symmetric key
Published 2009-01-01Subjects: Get full text
Article -
20
Security flaws and improvement to a wireless authentication protocol with anonymity
Published 2006-01-01Subjects: “…authentication…”
Get full text
Article