Search

Your search keyword '"authentication protocols"' showing total 202 results

Search Constraints

Start Over You searched for: Descriptor "authentication protocols" Remove constraint Descriptor: "authentication protocols"
202 results on '"authentication protocols"'

Search Results

1. Overview of Trusted Authentication and Incentive Mechanisms in Blockchain-Based Internet of Vehicles

2. ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS.

4. Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks.

5. Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy

6. Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks

7. Assessing the Solid Protocol in Relation to Security and Privacy Obligations.

8. VQR: vulnerability analysis in quadratic residues-based authentication protocols.

9. Quantitative BAN Logic Based on Belief Degree

10. Cryptanalysis of Authentication Protocol for Cloud Assisted IoT Environment.

11. Securing Session Initiation Protocol.

12. User Authentication Protocol Based on the Location Factor for a Mobile Environment

13. A Formal Security Analysis of the Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email

14. Gossamer: weaknesses and performance.

15. Research perceptions on ransomware attack: a complete analysis on conventional authentication protocols in network.

16. A survey on security challenges and protocols of electric vehicle dynamic charging system.

17. Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications.

18. An Approach for Formal Verification of Authentication Protocols.

19. Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection.

20. Lightweight Authentication Protocol for NFC Based Anti-Counterfeiting System in IoT Infrastructure

21. Addressing security and privacy issues in low-cost RFID systems

22. Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols

23. User-Mediated Authentication Protocols and Unforgeability in Key Collision

24. Securing Session Initiation Protocol

25. Review on Security of Internet of Things Authentication Mechanism

26. Privacy Amplification with Asymptotically Optimal Entropy Loss.

28. User-mediated authentication protocols and unforgeability in key collision.

29. Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols

30. A machine learning-based scheme for the security analysis of authentication and key agreement protocols.

31. Performance Analysis of Authentication Protocols Used Within Cooperative - Intelligent Transportation Systems with Focus on Security

33. Verification of Mutual Authentication Protocol for MobInfoSec System

34. Improving the Authentication with Built-In Camera Protocol Using Built-In Motion Sensors: A Deep Learning Solution

36. Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices

39. Generalized Meeting Businessmen Problem.

40. Review of different classes of RFID authentication protocols.

41. Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain.

42. Authentication protocols for wireless body area network with key management approach.

43. Comparative Analysis of Multi-round Cryptographic Primitives based Lightweight Authentication Protocols for RFID-Sensor Integrated MANETs.

45. Design and Implementation of a Simulation Environment for the Evaluation of Authentication Protocols in IEEE 802.11s Networks

46. Is Cryptyc Able to Detect Insider Attacks?

49. An Omniscience-Free Temporal Logic of Knowledge for Verifying Authentication Protocols.

50. A Security and Performance Evaluation of Hash-Based RFID Protocols

Catalog

Books, media, physical & digital resources