Showing 1 - 20 results of 134 for search '"Identity authentication"', query time: 0.50s Refine Results
  1. 1
  2. 2

    Research on smart authentication authorization and accounting in next generation network by ZHANG Hong

    Published 2006-01-01
    Subjects: “…identity authentication;identity management;authorization;accounting…”
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Design of United Identity Authentication and Key Agreement Protocol for Hybrid Cloud by Chongxia Wang, Meizhen Gao, Qian Liu, Xianwei Zhou

    Published 2014-04-01
    Subjects: “…hybrid cloud;identity authentication;bilinear pairing;security…”
    Get full text
    Article
  6. 6

    Research on distributed identity authentication mechanism of IoT device based on blockchain by Chen TAN, Meijuan CHEN, Ebenezer ACKAH Amuah

    Published 2020-06-01
    Subjects: “…blockchain;internet of things;distributed;identity authentication;cryptography…”
    Get full text
    Article
  7. 7

    Key technologies and application of artificial intelligence in telecom real-name system by Hui YAO, Siyan MA

    Published 2019-05-01
    Subjects: “…real-name system;deep learning;identity authentication…”
    Get full text
    Article
  8. 8

    Overview of Cross-Chain Identity Authentication Based on DID by BAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong

    Published 2024-03-01
    Subjects: “…decentralized identity; blockchain; cross-chain; identity authentication…”
    Get full text
    Article
  9. 9
  10. 10

    Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA

    Published 2013-08-01
    Subjects: “…identity authentication protocol…”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Mutual authentication scheme based on the TPM cloud computing platform by Zhen-peng LIU, Feng-long WU, Kai-yu SHANG, Wen-lei CHAI, Xiao WANG

    Published 2012-11-01
    Subjects: “…cloud computing;identity authentication;TPM;mutual authentication…”
    Get full text
    Article
  18. 18

    Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA

    Published 2013-08-01
    Subjects: “…identity authentication protocol;game theory;protocol security…”
    Get full text
    Article
  19. 19
  20. 20