-
1
A secure authentication method based on hash function for RFID system
Published 2017-06-01Subjects: Get full text
Article -
2
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01Subjects: “…identity authentication protocol…”
Get full text
Article -
3
Provable secure mutual authentication protocol for RFID in the standard model
Published 2013-04-01Subjects: Get full text
Article -
4
Design of anonymous authentication protocol for RFID
Published 2009-01-01Subjects: Get full text
Article -
5
Openstack authentication protocol based on digital certificate
Published 2019-02-01Subjects: Get full text
Article -
6
-
7
Access control model and its application for collaborative information systems
Published 2008-01-01Subjects: Get full text
Article -
8
Blockchain-based high transparent PKI authentication protocol
Published 2022-08-01Subjects: Get full text
Article -
9
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01Subjects: Get full text
Article -
10
Research on key management and authentication protocol of PDA in smart grid
Published 2018-03-01Subjects: Get full text
Article -
11
Survey on user authentication protocol in wireless sensor network
Published 2017-01-01Subjects: Get full text
Article -
12
Two-factor wearable device authentication protocol based on PUF and IPI
Published 2017-06-01Subjects: “…authentication protocol…”
Get full text
Article -
13
Universally composable secure trusted access protocol for WLAN Mesh networks
Published 2008-01-01Subjects: Get full text
Article -
14
Efficient ID-based multicast authentication protocol in wireless sensor networks
Published 2009-01-01Subjects: Get full text
Article -
15
SDFAC:software defined flow access control mechanism
Published 2015-11-01Subjects: Get full text
Article -
16
Low-cost group-based identity security authentication protocol for NB-IoT nodes
Published 2021-12-01Subjects: “…group-based identity security authentication protocol…”
Get full text
Article -
17
Secure access authentication scheme for 4G wireless network based on PCL
Published 2012-04-01Subjects: Get full text
Article -
18
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
Published 2024-01-01Subjects: Get full text
Article -
19
Study on Key Technology of WLAN Service Non-Sense Authentication Method
Published 2013-09-01Subjects: “…protected extensible authentication protocol…”
Get full text
Article -
20
Authentication method in SWIM based on improved Diameter/EAP-MD5
Published 2014-08-01Subjects: Get full text
Article