Font Size: a A A
Keyword [Authentication Protocols]
Result: 81 - 94 | Page: 5 of 5
81. Protecting privacy and ensuring security of RFID systems using private authentication protocols
82. Message authentication and recognition protocols using two-channel cryptography
83. New server-centric authentication protocols for RFID applications with simulation based analysis
84. Mutual authentication protocols for RFID systems
85. Secure ownership transfer and authentication protocols for Radio Frequency Identification (RFID)
86. Quantum encryption and authentication protocols
87. Performance analysis of broadcast authentication protocols
88. Cryptanalysis and enhancement of authentication protocols
89. Issues and approaches to generalizing two-party authentication protocols for multi-party authentication
90. Automatic validation of secure authentication protocols
91. A methodology for analyzing the performance of authentication protocols
92. Design And Analysis Of Identity Authentication Protocols In Edge Computing Network
93. Research On Multi-Factor Lightweight Authentication Protocols In Internet Of Things
94. Research On Lightweight And Secure RFID Authentication Protocols
  <<First  <Prev  Next>  Last>>  Jump to