„Authentication“
Suchergebnisse
3.280 Treffer
-
On the Secure Design of Hash-Based Authenticator in the Smartcard Authentication System
-
An Exhaustive Multi Factor Face Authentication Using Neuro-Fuzzy Approach
-
Analysis and improvement of a key exchange and authentication protocol in client-server environment
-
Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP
-
Efficient side-channel secure message authentication with better bounds
-
Substitution attacks against message authentication
-
DoveMAC: a TBC-based PRF with smaller state, full security, and high rate
-
A Secure Anonymous Authentication Protocol for Roaming Service in Resource-Constrained Mobility Environments
-
User-mediated authentication protocols and unforgeability in key collision
-
Efficient pre-authentication scheme for inter-ASN handover in high mobility MANET
-
Authentication based on feature of hand-written signature
-
Authentication of black cohosh (Actaea racemosa) dietary supplements based on chemometric evaluation of hydroxycinnamic acid esters and hydroxycinnamic acid amides
-
Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol
-
A ticket-based multi-server biometric authentication scheme using extended chaotic maps for telecare medical information systems
-
Reduced Optimal Feature Based Biometric Authentication Using MALO-MKSVM Techniques
-
A Sink Node Trusted Access Authentication Protocol for Mobile Wireless Sensor Network Using Block Cipher Algorithm Based on IoT
-
Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications
-
An Anonymity, Availability and Security-Ensured Authentication Model of the IoT Control System for Reliable and Anonymous eHealth Services
-
An efficient anonymous authentication protocol in multiple server communication networks (EAAM)
-
Two-level authentication approach to protect from phishing attacks in real time