Search

Your search keyword '"secure authentication"' showing total 317 results

Search Constraints

Start Over You searched for: Descriptor "secure authentication" Remove constraint Descriptor: "secure authentication"
317 results on '"secure authentication"'

Search Results

1. Secure device authentication and key agreement mechanism for LoRaWAN based IoT networks.

2. Gaia-X-Med: Experiences with Building Dataspaces for Medical Applications.

3. IDENTITY-BASED PRIVACY-PRESERVING ANONYMOUS AUTHENTICATION ACCESS CONTROL FOR SECURE CLOUD COMPUTING

4. Advanced Encryption Techniques in Biometric Payment Systems: A Big Data and AI Perspective.

5. IDENTITY-BASED PRIVACY-PRESERVING ANONYMOUS AUTHENTICATION ACCESS CONTROL FOR SECURE CLOUD COMPUTING.

6. Pelican optimization algorithm with blockchain for secure load balancing in fog computing.

7. Secure Load Balancing in Fog Computing Using improved Tasmanian Devil Optimization Algorithm with Blockchain.

8. Masked Face Recognition Using Transfer Learning Approaches

9. Gaia-X-Med: Experiences with Building Dataspaces for Medical Applications

10. A NavCom Signal Authentication Scheme Based on Twice Two-Way Satellite Time Transfer.

11. Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration.

12. Use of Near-field Communication (NFC) and Fingerprint Technology for Authentication of ATM Transactions

14. Security Authentication of Smart Grid Based on RFF

15. Dynamically scalable privacy-preserving authentication protocol for distributed IoT based healthcare service providers.

16. Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET.

17. A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks.

18. A secure authentication technique for connecting different IoT devices in the smart city infrastructure.

19. Secure Authentication Using One Time Contextual QR Code

21. Enhanced Security Credentials for Image Steganography Using QR Code

22. CCAP: A Complete Cross-Domain Authentication Based on Blockchain for Internet of Things.

23. A Two-Stage Feature Transformation-Based Fingerprint Authentication System for Privacy Protection in IoT.

24. Development of highly photoluminescent electrospun nanofibers for dual-mode secure authentication.

25. Research of authentication techniques for the Internet of things

26. A Secure Authentication Scheme Based on Chen’s Chaotic System and Finger Vein’s Auxiliary Data

27. An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm.

28. Secure authentication enhancement scheme for seamless handover and roaming in space information network

29. Discovering Trends for the Development of Novel Authentication Applications for Dementia Patients

30. VisTAS: blockchain-based visible and trusted remote authentication system

31. Efficient Known-Sample Attack for Distance-Preserving Hashing Biometric Template Protection Schemes.

32. Sub-μWRComm: 415-nW 1–10-kb/s Physically and Mathematically Secure Electro-Quasi-Static HBC Node for Authentication and Medical Applications.

33. Fingerprint template protection by adopting random projection based on re-encryption

34. A study of various authentication mechanisms towards the secure Internet of Things networks.

35. Two‐tiered face verification with low‐memory footprint for mobile devices.

36. 物联网中认证技术研究.

37. A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes.

38. Hardware fingerprint construction of optical transmitters based on permutation entropy spectrum of chaos for secure authentication.

39. Bio-sensor Authentication for Medical Applications Using WBAN

40. Secure and Fault-Tolerant Distributed Location Management for Intelligent 5G Wireless Networks

43. On the Algorithmic Computability of the Secret Key and Authentication Capacity Under Channel, Storage, and Privacy Leakage Constraints.

44. 天地一体化网络无缝切换和跨域漫游场景下的安全认证增强方案.

45. 2FYSH: two-factor authentication you should have for password replacement.

46. Secure authentication in the grid: A formal analysis of DNP3 SAv5.

47. Towards practical cancelable biometrics for finger vein recognition

49. User-Friendly Authentication and Authorization Using a Smartphone Proxy

50. Towards Secure Computation with Optimal Complexity

Catalog

Books, media, physical & digital resources