-
1
Provable Privacy Preserving Authentication Solution for Internet of Things Environment
Published 2021-01-01Subjects: “…Authentication…”
Get full text
Article -
2
A New Quantum Multiparty Simultaneous Identity Authentication Protocol with the Classical Third-Party
Published 2022-03-01Subjects: “…quantum authentication…”
Get full text
Article -
3
Continuous Mobile User Authentication Using Combined Biometric Traits
Published 2021-12-01Subjects: “…authentication…”
Get full text
Article -
4
Multifactor Authentication: Its Time Has Come
Published 2013-08-01Subjects: “…authentication attacks…”
Get full text
Article -
5
A Review of Lightweight IoT Authentication Protocols From the Perspective of Security Requirements, Computation, Communication, and Hardware Costs
Published 2025-01-01Subjects: “…Authentication survey…”
Get full text
Article -
6
A distributed authentication architecture and protocol
Published 2017-01-01Subjects: “…authentication factors…”
Get full text
Article -
7
Lightweight Hash-Based Authentication Protocol for Smart Grids
Published 2024-05-01Subjects: “…smart grid authentication…”
Get full text
Article -
8
Space Authentication in the Metaverse: A Blockchain-Based User-Centric Approach
Published 2024-01-01Subjects: Get full text
Article -
9
A Two-Layer Authentication Security Through Personal Mobile SMS for KRG-Iraq E-Government System
Published 2022-12-01Subjects: Get full text
Article -
10
Continuous Authentication against Collusion Attacks
Published 2022-06-01Subjects: “…continuous authentication…”
Get full text
Article -
11
Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments
Published 2016-12-01Subjects: Get full text
Article -
12
Ambient audio authentication
Published 2019-07-01Subjects: “…multi-factor authentication…”
Get full text
Article -
13
LAMT: Lightweight and Anonymous Authentication Scheme for Medical Internet of Things Services
Published 2025-01-01Subjects: Get full text
Article -
14
Continuous Entity Authentication in the Internet of Things Scenario
Published 2023-05-01Subjects: “…authentication schemes…”
Get full text
Article -
15
A Survey on Computational Intelligence Techniques in User Identity Management
Published 2019-08-01Subjects: “…adaptive authentication…”
Get full text
Article -
16
Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol
Published 2018-01-01Subjects: “…Data origin authentication…”
Get full text
Article -
17
User Authentication Protocol Based on the Location Factor for a Mobile Environment
Published 2022-01-01Subjects: “…Authentication protocols…”
Get full text
Article -
18
Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication
Published 2023-09-01Subjects: “…cloud authentication…”
Get full text
Article -
19
Spoofing detection on adaptive authentication System‐A survey
Published 2022-03-01Subjects: “…adaptive authentication…”
Get full text
Article -
20
Library resource sharing solution based on federated authentication and CALIS unified authentication
Published 2013-09-01Subjects: “…federated authentication…”
Get full text
Article