-
1
A blockchain-based lightweight authentication and key agreement scheme for internet of vehicles
Published 2022-12-01Subjects: Get full text
Article -
2
Power Terminal Lightweight Authentication Protocol for Edge Computing
Published 2023-04-01Subjects: Get full text
Article -
3
Security Authentication Protocol for Underwater Sensor Networks Based on NTRU
Published 2025-04-01Subjects: Get full text
Article -
4
Mutual authentication scheme based on the TPM cloud computing platform
Published 2012-11-01Subjects: Get full text
Article -
5
AI-Aided Proximity Detection and Location-Dependent Authentication on Mobile-Based Digital Twin Networks: A Case Study of Door Materials
Published 2024-10-01Subjects: Get full text
Article -
6
Lattice-based lightweight post quantum access authentication scheme for satellite network
Published 2024-10-01Subjects: Get full text
Article -
7
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01Subjects: Get full text
Article -
8
Lightweight and Efficient Protocol Based on ECDH for Securing Smart Grid Communication Infrastructure
Published 2025-01-01Subjects: Get full text
Article -
9
UCAP:a PCL secure user authentication protocol in cloud computing
Published 2018-08-01Subjects: Get full text
Article -
10
Enhanced EMV Security: Preventing Credit Card Fraud From a Distance
Published 2025-01-01Subjects: Get full text
Article -
11
Secure and Lightweight Cluster-Based User Authentication Protocol for IoMT Deployment
Published 2024-11-01Subjects: Get full text
Article -
12
An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks
Published 2025-01-01Subjects: Get full text
Article -
13
UAP: A System Authentication Protocol for UAV Relay Communication by UAV-Assisted
Published 2025-01-01Subjects: Get full text
Article -
14
A three-factor mutual authentication scheme for telecare medical information system based on ECC
Published 2024-01-01Subjects: “…Mutual authentication…”
Get full text
Article -
15
Lightweight Mutually Authenticated Key Exchange with Physical Unclonable Functions
Published 2024-10-01Subjects: Get full text
Article -
16
Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain
Published 2025-12-01Subjects: Get full text
Article -
17
Robust Authentication: Leveraging Hardware Fingerprints and AI to Enhance Security Against Spoofing
Published 2025-01-01Subjects: Get full text
Article -
18
DEVELOPMENT OF THE METHOD OF IMPLICIT STORAGE OF KEY INFORMATION USING SRAM PUF IN SMART CARDS
Published 2022-08-01Subjects: Get full text
Article -
19
THE STUDY OF CELL VALUES DISTRIBUTION LAWS IN THE STATIC RAM CHIPS USED AS A PHYSICALLY UNCLONABLE FUNCTION IN A MUTUAL AUTHENTICATION MODULE
Published 2022-08-01Subjects: Get full text
Article -
20
Ethernet Passive Mutual Authentication Scheme on Quantum Networks
Published 2025-01-01Subjects: Get full text
Article