Found: 8
Select item for more details and to access through your institution.
A Novel Authentication Protocol with Strong Security for Roaming Service in Global Mobile Networks.
- Published in:
- Electronics (2079-9292), 2019, v. 8, n. 9, p. 939, doi. 10.3390/electronics8090939
- By:
- Publication type:
- Article
Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol.
- Published in:
- Nonlinear Dynamics, 2015, v. 80, n. 3, p. 1209, doi. 10.1007/s11071-015-1937-0
- By:
- Publication type:
- Article
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2643, doi. 10.1002/sec.1214
- By:
- Publication type:
- Article
Robust three-factor remote user authentication scheme with key agreement for multimedia systems.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 13, p. 1916, doi. 10.1002/sec.961
- By:
- Publication type:
- Article
An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture.
- Published in:
- Wireless Personal Communications, 2015, v. 80, n. 1, p. 175, doi. 10.1007/s11277-014-2002-x
- By:
- Publication type:
- Article
Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update.
- Published in:
- International Journal of Communication Systems, 2015, v. 28, n. 2, p. 374, doi. 10.1002/dac.2676
- By:
- Publication type:
- Article
Amultikey fully homomorphic encryption privacy protection protocol based on blockchain for edge computing system.
- Published in:
- Concurrency & Computation: Practice & Experience, 2023, v. 35, n. 4, p. 1, doi. 10.1002/cpe.7539
- By:
- Publication type:
- Article
A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 1, p. 263, doi. 10.1007/s11277-015-2737-z
- By:
- Publication type:
- Article