„Authentication“
Suchergebnisse
3.280 Treffer
-
Information Security and Cryptology – 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers
-
Trusted Systems – 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers
-
Transactions on Computational Science XXVI – Special Issue on Cyberworlds and Cybersecurity
-
Blockchain-based decentralized identifier in metaverse environment for secure and privacy-preserving authentication with improved key management and cryptosystem
-
Advances in Image and Graphics Technologies – 11th Chinese Conference, IGTA 2016, Beijing, China, July 8-9, 2016, Proceedings
-
Security and Privacy in Communication Networks – SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
-
Deep learning and blockchain-based secure authentication protocol for privacy protection in cloud environments
-
An efficient certificateless signcryption for mutual and batch authentication in Vehicular Ad-hoc Networks (VANETs)
-
Secure edge-based smart grid communication using lightweight authentication modeling with autoencoders and real-world data
-
Advanced Computing and Systems for Security – Volume Eight
-
Security and Privacy in Communication Networks – 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
-
Privacy and Identity Management. Time for a Revolution? – 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers
-
A lightweight scalable hybrid authentication framework for Internet of Medical Things (IoMT) using blockchain hyperledger consortium network with edge computing
-
Mobile Communications – Technology, tools, applications, authentication and security IFIP World Conference on Mobile Communications 2 – 6 September 1996, Canberra, Australia
-
Progress in Cryptology - AFRICACRYPT 2012 – 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings
-
SqueezeNet-based key generation for secure device-to-device group authentication in 5G wireless networks
-
Provably secure and lightweight authentication protocol using PUF and blockchain for smart grids
-
Quantum private information retrieval with lattice-based access authentication
-
Anti-quantum cross-chain identity authentication approach using dynamic group signature
-
Efficient group authentication with multiple authentications on resource-limited devices