Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
A certificateless signcryption scheme for smart home networks
Ji, Sai, Huang, Rui, Shen, Jian, Jin, Xin, Cho, Youngju
Published in Concurrency and computation (10.04.2021)
Published in Concurrency and computation (10.04.2021)
Get full text
Journal Article
Subject Authentication using Textural Features of Recurrence Plot
Alotaiby, Turky N., Alshebeili, Saleh A., Alotibi, Gaseb N., Alotaibi, Gaith
Published in 2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA) (23.11.2022)
Published in 2022 International Conference on Electrical and Computing Technologies and Applications (ICECTA) (23.11.2022)
Get full text
Conference Proceeding
A Survey on Zero Trust Architecture: Challenges and Future Trends
He, Yuanhang, Huang, Daochao, Chen, Lei, Ni, Yi, Ma, Xiangjie
Published in Wireless communications and mobile computing (15.06.2022)
Published in Wireless communications and mobile computing (15.06.2022)
Get full text
Journal Article
BDSec: Security authentication protocol for BeiDou-II civil navigation message
Zhijun, Wu, Yuan, Zhang, Yiming, Yang, Peng, Wang, Meng, Yue
Published in China communications (01.06.2024)
Published in China communications (01.06.2024)
Get full text
Journal Article
Multichannel Acoustic Spectroscopy of the Human Body for Inviolable Biometric Authentication
Noh, Hyung Wook, Ahn, Chang-Geun, Chae, Seung-Hoon, Ku, Yunseo, Sim, Joo Yong
Published in Biosensors (Basel) (31.08.2022)
Published in Biosensors (Basel) (31.08.2022)
Get full text
Journal Article
Practical Privacy-Preserving ECG-Based Authentication for IoT-Based Healthcare
Huang, Pei, Guo, Linke, Li, Ming, Fang, Yuguang
Published in IEEE internet of things journal (01.10.2019)
Published in IEEE internet of things journal (01.10.2019)
Get full text
Journal Article
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones
Wang, Qian, Lin, Xiu, Zhou, Man, Chen, Yanjiao, Wang, Cong, Li, Qi, Luo, Xiangyang
Published in Annual Joint Conference of the IEEE Computer and Communications Societies (01.04.2019)
Published in Annual Joint Conference of the IEEE Computer and Communications Societies (01.04.2019)
Get full text
Conference Proceeding
Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations
Guo, Jiaxing, Gu, Chunxiang, Chen, Xi, Lu, Siqi, Wei, Fushan
Published in Information technology and control (24.09.2021)
Published in Information technology and control (24.09.2021)
Get full text
Journal Article
Multimodal Signals Subject Authentication System
Alotaiby, Turky N., Alshebeili, Saleh A., Alotaibi, Gaseb
Published in 2021 18th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON) (19.05.2021)
Published in 2021 18th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON) (19.05.2021)
Get full text
Conference Proceeding
Multi-subject information interaction and one-way hash chain authentication method for V2G application in Internet of Vehicles
Zhang, Jian, Li, Lei, Liu, Weidong, Li, Xiaohui
Published in 2022 4th International Conference on Intelligent Information Processing (IIP) (01.10.2022)
Published in 2022 4th International Conference on Intelligent Information Processing (IIP) (01.10.2022)
Get full text
Conference Proceeding
Research on the communication mechanism between entities based on end-to-end credible state assessment
Zhao, Baohua, Wang, Zhihao, An, Ningyu, Ren, Chunhui
Published in Journal of physics. Conference series (01.04.2021)
Published in Journal of physics. Conference series (01.04.2021)
Get full text
Journal Article
Improving network security using keyboard dynamics: A comparative study
Ugwunna, C.O., Chukwuogo, O.E., Alabi, O.A., Kareem, M.K., Belonwu, T.S., Oloyede, S.O.
Published in International research journal of science, technology, education, and management (Online) (01.12.2023)
Published in International research journal of science, technology, education, and management (Online) (01.12.2023)
Get full text
Journal Article
Research and Implementation of MQTT Security Mechanism Based on Domestic Cryptographic Algorithms
Liu, Zechao, Liang, Tao, Sun, Ruochen, Hao, Zhiqiang, Li, Jun
Published in Ji suan ji ke xue (01.01.2024)
Get full text
Published in Ji suan ji ke xue (01.01.2024)
Journal Article
A Cloud Assisted Hybrid Model Based Speaker Recognition and Resource Sharing
Qaisar, Saeed Mian, Bahanshal, Sarah, Alwazani, Hibatallah
Published in Procedia computer science (2019)
Published in Procedia computer science (2019)
Get full text
Journal Article
제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구
이선아(Seon-A Lee), 김범석(Beomseok Kim), 이혜인(Hyein Lee), 박원형(Wonhyung Park)
Published in 한국정보통신학회논문지 (2022)
Published in 한국정보통신학회논문지 (2022)
Get full text
Journal Article