Font Size: a A A
Keyword [authenticated]
Result: 181 - 200 | Page: 10 of 10
181. Provably Leakage-Resilient Authenticated Key Exchange Protocols
182. Design And Analysis Of Lattice-based Key Exchange Schemes
183. Research On Authenticated Anonymous Data Sharing Scheme In Internet Of Things
184. Research On Efficient Identity-based Authenticated Key Agreement Protocol Based On Pairings
185. Research On Password-Based Authenticated Key Exchange Protocols From Lattices
186. Research And Application Of Password Authenticated Key Exchange Protocol In VANET
187. From Understanding Telephone Scams to Implementing Authenticated Caller ID Transmissio
188. Authenticated query processing
189. Classical authenticated key exchange and quantum cryptography
190. Authenticated communication and computation in known-topology networks with a trusted authority
191. Authenticated messaging in wireless sensor networks used for surveillance
192. Authenticated software update
193. A formal approach toward authenticated authorization without identification
194. Secure and authenticated communication for a multi-agent framework
195. Secure and Authenticated Message Dissemination in Vehicular ad hoc Networks and an Incentive-Based Architecture for Vehicular Cloud
196. Efficient and scalable authentication of networked data
197. Simultaneously ensuring privacy and authenticity in digital communication
198. Authenticated encryption in the symmetric and asymmetric settings
199. Design and cryptanalysis of a customizable authenticated encryption algorithm
200. DNSSEC -- authenticated denial of existence: Understanding zone enumeration
  <<First  <Prev  Next>  Last>>  Jump to