Search

Your search keyword '"SMART cards"' showing total 25 results

Search Constraints

Start Over You searched for: Descriptor "SMART cards" Remove constraint Descriptor: "SMART cards" Topic multi-factor authentication Remove constraint Topic: multi-factor authentication Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years
25 results on '"SMART cards"'

Search Results

1. A Higher Performance Data Backup Scheme Based on Multi-Factor Authentication †.

2. An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function.

3. A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture.

4. A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability.

5. Machine learning and smart card based two-factor authentication scheme for preserving anonymity in telecare medical information system (TMIS).

6. Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing.

7. Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices.

8. A secure three-factor authentication scheme for IoT environments.

9. A secure and improved two factor authentication scheme using elliptic curve and bilinear pairing for cyber physical systems.

10. Secure and Authentic Anonymous Roaming Service.

11. Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things.

12. Secure Authentication and Key Agreement Protocol for Cloud-Assisted Industrial Internet of Things.

13. A Novel Three-Factor Authentication Scheme with High Security for Multi-Server Environments.

14. Biometric-based two-factor authentication scheme under database leakage.

15. PUF-Assisted Lightweight Group Authentication and Key Agreement Protocol in Smart Home.

16. Dependable and Provable Secure Two-Factor Mutual Authentication Scheme Using ECC for IoT-Based Telecare Medical Information System.

17. Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card.

18. Protecting card data with privileged access management controls.

19. US leads global commercial card market: report.

20. A novel two-factor multi-gateway authentication protocol for WSNs.

21. Are Secure Passwords Still a Thing?

22. An efficient two-factor authentication scheme based on negative databases: Experiments and extensions.

23. Understanding security failures of anonymous authentication schemes for cloud environments.

24. Dynabook Tecra A50-J.

25. How high can the contactless card limit go without two-factor authentication? The spending limit for contactless cards has reached an eyebrow-raising triple-digit figure - £100 - raising questions about the need for user authentication.

Catalog

Books, media, physical & digital resources