Font Size:
a
A
A
Keyword [authentication protocols]
Result: 81 - 100 | Page: 5 of 6
81.
Protecting privacy and ensuring security of RFID systems using private authentication protocols
82.
Message authentication and recognition protocols using two-channel cryptography
83.
New server-centric authentication protocols for RFID applications with simulation based analysis
84.
Mutual authentication protocols for RFID systems
85.
Secure ownership transfer and authentication protocols for Radio Frequency Identification (RFID)
86.
Quantum encryption and authentication protocols
87.
Performance analysis of broadcast authentication protocols
88.
Cryptanalysis and enhancement of authentication protocols
89.
Issues and approaches to generalizing two-party authentication protocols for multi-party authentication
90.
Automatic validation of secure authentication protocols
91.
A methodology for analyzing the performance of authentication protocols
92.
Design And Analysis Of Identity Authentication Protocols In Edge Computing Network
93.
Research On Multi-Factor Lightweight Authentication Protocols In Internet Of Things
94.
Research On Lightweight And Secure RFID Authentication Protocols
95.
Research On Practical Private Data Aggregation And Secure Authentication Protocols
96.
The Research On Provably Secure Multi-factor Authentication Protocols In Internet Of Things
97.
Research On Ultra-lightweight RFID Authentication Protocols In IoT
98.
Security Analysis And Design Of Three-factor Authentication Protocols For Internet Of Things
99.
Formal Modeling And Analysis Of 5G And Wireless Local Area Network Authentication Protocols
100.
Research On Privacy Preserving And Authentication Protocols
<<First
<Prev
Next>
Last>>
Jump to