Results 281 to 290 of about 80,103 (295)
Some of the next articles are maybe not open access.
Cryptanalysis of a remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics, 2000Lm Cheng
exaly
An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs
IEEE Transactions on Intelligent Transportation Systems, 2016Shunrong Jiang, Liangmin Wang
exaly
Lossless watermarking for image authentication: a new framework and an implementation
IEEE Transactions on Image Processing, 2006Ahmet M Tekalp, Gaurav Sharma
exaly
Discriminant analysis is an inappropriate method of authentication
TrAC - Trends in Analytical Chemistry, 2016Alexey L Pomerantsev
exaly
The California Breast Cancer Law and Government-Mandated Patient Education
Ca-A Cancer Journal for Clinicians, 1982exaly
A Survey of SIP Authentication and Key Agreement Schemes
IEEE Communications Surveys and Tutorials, 2014exaly
Toward 6G Authentication and Key Agreement Protocol: A Survey on Hybrid Post Quantum Cryptography
IEEE Communications Surveys and TutorialsTogu N Turnip
exaly
A dynamic ID-based remote user authentication scheme
IEEE Transactions on Consumer Electronics, 2004exaly

