Showing 1 - 20 results of 29 for search '"authentication protocols"', query time: 0.05s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA

    Published 2013-08-01
    Subjects: “…identity authentication protocol…”
    Get full text
    Article
  5. 5

    Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA

    Published 2013-08-01
    Subjects: “…identity authentication protocol;game theory;protocol security…”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Efficient ID-based multicast authentication protocol in wireless sensor networks by WANG Gang1, WEN Tao1, GUO Quan2, MA Xue-bin1

    Published 2009-01-01
    Subjects: “…wireless sensor networks;multicast authentication protocol;PKC;Co-DH group pair…”
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Low-cost group-based identity security authentication protocol for NB-IoT nodes by Xiangmao CHANG, Jun ZHAN, Zhiwei WANG

    Published 2021-12-01
    Subjects: “…group-based identity security authentication protocol…”
    Get full text
    Article
  20. 20

    Low-cost group-based identity security authentication protocol for NB-IoT nodes by Xiangmao CHANG, Jun ZHAN, Zhiwei WANG

    Published 2021-12-01
    Subjects: “…group-based identity security authentication protocol;Chinese remainder theorem;aggregate signature, NB-IoT…”
    Get full text
    Article