-
1
P2P network identity authentication mechanism based on trusted alliance
Published 2020-04-01Subjects: Get full text
Article -
2
Research on smart authentication authorization and accounting in next generation network
Published 2006-01-01Subjects: “…identity authentication;identity management;authorization;accounting…”
Get full text
Article -
3
Research on smart authentication authorization and accounting in next generation network
Published 2006-01-01Subjects: “…identity authentication…”
Get full text
Article -
4
Design of United Identity Authentication and Key Agreement Protocol for Hybrid Cloud
Published 2014-04-01Subjects: Get full text
Article -
5
Design of United Identity Authentication and Key Agreement Protocol for Hybrid Cloud
Published 2014-04-01Subjects: “…hybrid cloud;identity authentication;bilinear pairing;security…”
Get full text
Article -
6
Research on distributed identity authentication mechanism of IoT device based on blockchain
Published 2020-06-01Subjects: “…blockchain;internet of things;distributed;identity authentication;cryptography…”
Get full text
Article -
7
Key technologies and application of artificial intelligence in telecom real-name system
Published 2019-05-01Subjects: “…real-name system;deep learning;identity authentication…”
Get full text
Article -
8
Overview of Cross-Chain Identity Authentication Based on DID
Published 2024-03-01Subjects: “…decentralized identity; blockchain; cross-chain; identity authentication…”
Get full text
Article -
9
Key technologies and application of artificial intelligence in telecom real-name system
Published 2019-05-01Subjects: Get full text
Article -
10
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01Subjects: “…identity authentication protocol…”
Get full text
Article -
11
Secure Identity Authentication of Community Medical Internet of Things
Published 2019-01-01Subjects: Get full text
Article -
12
Lightweight Secure Communication Supporting Batch Authentication for UAV Swarm
Published 2025-02-01Subjects: Get full text
Article -
13
Security issues and system structure of internet of vehicles
Published 2016-02-01Subjects: Get full text
Article -
14
A Scalable Cross-Chain Access Control and Identity Authentication Scheme
Published 2023-02-01Subjects: Get full text
Article -
15
Research on distributed identity authentication mechanism of IoT device based on blockchain
Published 2020-06-01Subjects: Get full text
Article -
16
Mutual authentication scheme based on the TPM cloud computing platform
Published 2012-11-01Subjects: Get full text
Article -
17
Mutual authentication scheme based on the TPM cloud computing platform
Published 2012-11-01Subjects: “…cloud computing;identity authentication;TPM;mutual authentication…”
Get full text
Article -
18
Rational analysis of authentication protocols based on NGUYEN L H scheme
Published 2013-08-01Subjects: “…identity authentication protocol;game theory;protocol security…”
Get full text
Article -
19
Face liveness detection algorithm based on deep learning
Published 2019-08-01Subjects: Get full text
Article -
20
Security issues and system structure of internet of vehicles
Published 2016-02-01Subjects: Get full text
Article