Found: 22
Select item for more details and to access through your institution.
Decentralized Identity Authentication Mechanism: Integrating FIDO and Blockchain for Enhanced Security.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 9, p. 3551, doi. 10.3390/app14093551
- By:
- Publication type:
- Article
Symmetry in Blockchain-Powered Secure Decentralized Data Storage: Mitigating Risks and Ensuring Confidentiality.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 2, p. 147, doi. 10.3390/sym16020147
- By:
- Publication type:
- Article
IOTA Data Preservation Implementation for Industrial Automation and Control Systems.
- Published in:
- Processes, 2023, v. 11, n. 7, p. 2160, doi. 10.3390/pr11072160
- By:
- Publication type:
- Article
A Grid-Based Key Pre-Distribution Scheme Using Dependent Keys in Wireless Sensor Networks.
- Published in:
- Journal of Information Science & Engineering, 2023, v. 39, n. 3, p. 459, doi. 10.6688/JISE.202305_39(3).0001
- By:
- Publication type:
- Article
Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 2, p. N.PAG, doi. 10.3390/sym14020237
- By:
- Publication type:
- Article
An Anomaly-Based IDS Framework Using Centroid-Based Classification.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 1, p. 105, doi. 10.3390/sym14010105
- By:
- Publication type:
- Article
Correction: Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments.
- Published in:
- 2020
- By:
- Publication type:
- Correction Notice
Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments.
- Published in:
- PLoS ONE, 2020, v. 15, n. 4, p. 1, doi. 10.1371/journal.pone.0232277
- By:
- Publication type:
- Article
A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments.
- Published in:
- Mobile Information Systems, 2015, p. 1, doi. 10.1155/2015/934716
- By:
- Publication type:
- Article
A Cloud-Based Authentication Protocol for RFID Supply Chain Systems.
- Published in:
- Journal of Network & Systems Management, 2015, v. 23, n. 4, p. 978, doi. 10.1007/s10922-014-9329-1
- By:
- Publication type:
- Article
An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/743623
- By:
- Publication type:
- Article
A source authentication scheme based on message recovery digital signature for multicast.
- Published in:
- International Journal of Communication Systems, 2014, v. 27, n. 11, p. 2616, doi. 10.1002/dac.2494
- By:
- Publication type:
- Article
Data Hiding for HTML Files Using Character Coding Table and Index Coding Table.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 11, p. 2913, doi. 10.3837/tiis.2013.11.021
- By:
- Publication type:
- Article
Multicast Key Management without Rekeying Processes.
- Published in:
- Computer Journal, 2010, v. 53, n. 7, p. 939, doi. 10.1093/comjnl/bxp060
- By:
- Publication type:
- Article
Resampling Halftone Images Using Interpolation and Error-Diffusion.
- Published in:
- Computer Journal, 2010, v. 53, n. 6, p. 802, doi. 10.1093/comjnl/bxp085
- By:
- Publication type:
- Article
TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS.
- Published in:
- International Journal of Network Management, 2009, v. 19, n. 4, p. 291, doi. 10.1002/nem.703
- By:
- Publication type:
- Article
A novel key management scheme for dynamic multicast communications.
- Published in:
- International Journal of Communication Systems, 2009, v. 22, n. 1, p. 53, doi. 10.1002/dac.958
- By:
- Publication type:
- Article
A neural network system for authenticating remote users in multi-server architecture.
- Published in:
- International Journal of Communication Systems, 2008, v. 21, n. 4, p. 435, doi. 10.1002/dac.906
- By:
- Publication type:
- Article
A Novel Location Tracking Scheme for Reducing Location Updating Traffic in a Personal Communication System.
- Published in:
- Wireless Personal Communications, 2008, v. 44, n. 2, p. 139, doi. 10.1007/s11277-007-9349-1
- By:
- Publication type:
- Article
AN EFFICIENT PROGRESSIVE IMAGE TRANSMISSION SCHEME FOR CHINESE CALLIGRAPHY.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2006, v. 20, n. 7, p. 1077, doi. 10.1142/S0218001406005083
- By:
- Publication type:
- Article
A new solution for assigning cryptographic keys to control access in mobile agent environments.
- Published in:
- Wireless Communications & Mobile Computing, 2006, v. 6, n. 1, p. 137, doi. 10.1002/wcm.276
- By:
- Publication type:
- Article
A user authentication system using back-propagation network.
- Published in:
- Neural Computing & Applications, 2005, v. 14, n. 3, p. 243, doi. 10.1007/s00521-004-0460-x
- By:
- Publication type:
- Article