„Authentication“
Suchergebnisse
3.280 Treffer
-
A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography
-
A lightweight hierarchical authentication scheme for internet of things
-
A privacy-preserving authentication protocol with secure handovers for the LTE/LTE-A networks
-
ID-Based Public Auditing Protocol for Cloud Storage Data Integrity Checking with Strengthened Authentication and Security
-
An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing
-
An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks
-
Encryption scheme with mixed homomorphic signature based on message authentication for digital image
-
Biometric re-authentication: an approach towards achieving transparency in user authentication
-
Security authentication technology based on dynamic Bayesian network in Internet of Things
-
Remote user authentication and key agreement for mobile client–server environments on elliptic curve cryptography
-
Multi-scale Curvature-Based Robust Hashing for Vector Model Retrieval and Authentication
-
User Authentication by Network
-
Recursive Cross-Layer Authentication
-
Improving And Distributing Key Management On Mobile Networks
-
Eine Authentication-Methode von GSM/GPRS/UMTS-Teilnehmer bei Benützung der alternativen Zugriffsnetze wie Bluetooth und WLAN
-
Lower bounds for the signature size of incremental schemes
-
Security Threats and Countermeasures in Bluetooth-Enabled Systems – Practical Experiments, Vulnerability Evaluation, and Solutions
-
Detection of Valeriana jatamansi as an Adulterant of Medicinal Paris by Length Variation of Chloroplast psbA-trnH Region
-
Authentication protocols for the internet of drones: taxonomy, analysis and future directions
-
Wine authentication: a fingerprinting multiclass strategy to classify red varietals through profound chemometric analysis of volatiles