Found: 55
Select item for more details and to access through your institution.
Prevention of Exponential Equivalence in Simple Password Exponential Key Exchange (SPEKE).
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 3, p. 1587, doi. 10.3390/sym7031587
- By:
- Publication type:
- Article
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 1, p. 105, doi. 10.3390/sym7010105
- By:
- Publication type:
- Article
Robust Biometric-based Anonymous User Authenticated Key Agreement Scheme for Telecare Medicine Information Systems.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 7, p. 3720, doi. 10.3837/tiis.2017.07.023
- By:
- Publication type:
- Article
Forward Anonymity-Preserving Secure Remote Authentication Scheme.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 3, p. 1289, doi. 10.3837/tiis.2016.03.019
- By:
- Publication type:
- Article
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 12, p. 3244, doi. 10.3837/tiis.2013.12.016
- By:
- Publication type:
- Article
Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 2, p. 751, doi. 10.3837/tiis.2012.02.018
- By:
- Publication type:
- Article
Advanced Information Security Management Evaluation System.
- Published in:
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 6, p. 1192, doi. 10.3837/tiis.2011.06.006
- By:
- Publication type:
- Article
Threat modeling of a mobile device management system for secure smart work.
- Published in:
- Electronic Commerce Research, 2013, v. 13, n. 3, p. 243, doi. 10.1007/s10660-013-9121-4
- By:
- Publication type:
- Article
Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment.
- Published in:
- Wireless Communications & Mobile Computing, 2021, p. 1, doi. 10.1155/2021/2098530
- By:
- Publication type:
- Article
Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction.
- Published in:
- International Journal of Distributed Sensor Networks, 2016, p. 1, doi. 10.1155/2016/8572410
- By:
- Publication type:
- Article
Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments.
- Published in:
- International Journal of Distributed Sensor Networks, 2015, p. 1, doi. 10.1155/2015/305785
- By:
- Publication type:
- Article
Absolute configuration-dependent epoxide formation from isoflavan-4-ol stereoisomers by biphenyl dioxygenase of Pseudomonas pseudoalcaligenes strain KF707.
- Published in:
- Applied Microbiology & Biotechnology, 2011, v. 89, n. 6, p. 1773, doi. 10.1007/s00253-010-2989-1
- By:
- Publication type:
- Article
Location of flavone B-ring controls regioselectivity and stereoselectivity of naphthalene dioxygenase from Pseudomonas sp. strain NCIB 9816-4.
- Published in:
- Applied Microbiology & Biotechnology, 2010, v. 86, n. 5, p. 1451, doi. 10.1007/s00253-009-2389-6
- By:
- Publication type:
- Article
Distributed and Federated Authentication Schemes Based on Updatable Smart Contracts.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 5, p. 1217, doi. 10.3390/electronics12051217
- By:
- Publication type:
- Article
Revisit of Password-Authenticated Key Exchange Protocol for Healthcare Support Wireless Communication.
- Published in:
- Electronics (2079-9292), 2020, v. 9, n. 5, p. 733, doi. 10.3390/electronics9050733
- By:
- Publication type:
- Article
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.
- Published in:
- PLoS ONE, 2015, v. 10, n. 4, p. 1, doi. 10.1371/journal.pone.0116709
- By:
- Publication type:
- Article
A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed.
- Published in:
- Mobile Networks & Applications, 2013, v. 18, n. 1, p. 122, doi. 10.1007/s11036-012-0375-1
- By:
- Publication type:
- Article
Can differential privacy practically protect collaborative deep learning inference for IoT?
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 6, p. 4713, doi. 10.1007/s11276-022-03113-7
- By:
- Publication type:
- Article
Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving.
- Published in:
- PLoS ONE, 2021, v. 16, n. 2, p. 1, doi. 10.1371/journal.pone.0247441
- By:
- Publication type:
- Article
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/9046064
- By:
- Publication type:
- Article
An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.
- Published in:
- Journal of Medical Systems, 2016, v. 40, n. 3, p. 1, doi. 10.1007/s10916-015-0422-0
- By:
- Publication type:
- Article
Lightweight Hash-Based Authentication Protocol for Smart Grids.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 10, p. 3085, doi. 10.3390/s24103085
- By:
- Publication type:
- Article
An Improved Lightweight User Authentication Scheme for the Internet of Medical Things.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 3, p. 1122, doi. 10.3390/s23031122
- By:
- Publication type:
- Article
A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems †.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 24, p. 7136, doi. 10.3390/s20247136
- By:
- Publication type:
- Article
Secure and Efficient Three-Factor Protocol for Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2018, v. 18, n. 12, p. 4481, doi. 10.3390/s18124481
- By:
- Publication type:
- Article
Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2017, v. 17, n. 5, p. 940, doi. 10.3390/s17050940
- By:
- Publication type:
- Article
Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2017, v. 17, n. 3, p. 644, doi. 10.3390/s17030644
- By:
- Publication type:
- Article
An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2016, v. 16, n. 10, p. 1653, doi. 10.3390/s16101653
- By:
- Publication type:
- Article
An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2016, v. 16, n. 8, p. 1299, doi. 10.3390/s16081299
- By:
- Publication type:
- Article
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2014, v. 14, n. 11, p. 21023, doi. 10.3390/s141121023
- By:
- Publication type:
- Article
Association Rule Extraction from XML Stream Data forWireless Sensor Networks.
- Published in:
- Sensors (14248220), 2014, v. 14, n. 7, p. 12937, doi. 10.3390/s140712937
- By:
- Publication type:
- Article
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography.
- Published in:
- Sensors (14248220), 2014, v. 14, n. 6, p. 10081, doi. 10.3390/s140610081
- By:
- Publication type:
- Article
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2014, v. 14, n. 4, p. 6443, doi. 10.3390/s140406443
- By:
- Publication type:
- Article
An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.
- Published in:
- PLoS ONE, 2017, v. 12, n. 1, p. 1, doi. 10.1371/journal.pone.0169414
- By:
- Publication type:
- Article
An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.
- Published in:
- PLoS ONE, 2015, v. 10, n. 12, p. 1, doi. 10.1371/journal.pone.0145263
- By:
- Publication type:
- Article
Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks.
- Published in:
- Journal of Sensors, 2016, p. 1, doi. 10.1155/2016/4393721
- By:
- Publication type:
- Article
MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks*^.
- Published in:
- PLoS ONE, 2022, v. 17, n. 5, p. 1, doi. 10.1371/journal.pone.0262696
- By:
- Publication type:
- Article
A Practical and Secure Electronic Election System.
- Published in:
- ETRI Journal, 2012, v. 34, n. 1, p. 55, doi. 10.4218/etrij.12.0111.0121
- By:
- Publication type:
- Article
Secure and Efficient Code Encryption Scheme Based on Indexed Table.
- Published in:
- ETRI Journal, 2011, v. 33, n. 1, p. 60, doi. 10.4218/etrij.11.0110.0056
- By:
- Publication type:
- Article
Method for Extracting Valuable Common Structures from Heterogeneous Rooted and Labeled Tree Data.
- Published in:
- Journal of Information Science & Engineering, 2014, v. 30, n. 3, p. 787
- By:
- Publication type:
- Article
Hybrid Key Management Architecture for Robust SCADA Systems.
- Published in:
- Journal of Information Science & Engineering, 2013, v. 29, n. 2, p. 281
- By:
- Publication type:
- Article
Scalable Group Key Exchange for Securing Distributed Operating Systems.
- Published in:
- Journal of Information Science & Engineering, 2012, v. 28, n. 5, p. 829
- By:
- Publication type:
- Article
Secure Data Deletion for USB Flash Memory.
- Published in:
- Journal of Information Science & Engineering, 2011, v. 27, n. 3, p. 933
- By:
- Publication type:
- Article
Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol.
- Published in:
- Journal of Information Science & Engineering, 2010, v. 26, n. 5, p. 1845
- By:
- Publication type:
- Article
Fast Extraction of Maximal Frequent Subtrees Using Bits Representation.
- Published in:
- Journal of Information Science & Engineering, 2009, v. 25, n. 2, p. 435
- By:
- Publication type:
- Article
Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1462, doi. 10.1002/sec.1432
- By:
- Publication type:
- Article
An improved anonymous authentication scheme for roaming in ubiquitous networks.
- Published in:
- PLoS ONE, 2018, v. 13, n. 3, p. 1, doi. 10.1371/journal.pone.0193366
- By:
- Publication type:
- Article
Security analysis and enhanced user authentication in proxy mobile IPv6 networks.
- Published in:
- PLoS ONE, 2017, v. 12, n. 7, p. 1, doi. 10.1371/journal.pone.0181031
- By:
- Publication type:
- Article
Security enhanced multi-factor biometric authentication scheme using bio-hash function.
- Published in:
- PLoS ONE, 2017, v. 12, n. 5, p. 1, doi. 10.1371/journal.pone.0176250
- By:
- Publication type:
- Article
Password-only authenticated three-party key exchange with provable security in the standard model.
- Published in:
- 2014
- By:
- Publication type:
- journal article