Home
Statistics
How It Works
Login
Register
Keyword Connections
-
authentication
Keywords
Connection Type
Connection
Journals
The Analyst
Molecules (Basel, Switzerland)
Sensors (Basel, Switzerland)
Journal of medical systems
Analytical chemistry
advanced materials (deerfield beach, fla)
Journal of the science of food and agriculture
Journal of pharmaceutical and biomedical analysis
Plants (Basel, Switzerland)
Evidence-based complementary and alternative medicine : eCAM
saudi medical journal
journal of medical engineering & technology
pharmacological reviews
Research Groups
No Research Group Connected
Bibliographies
[1]
NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture.
[2]
A systematic review of the prevalence and risk factors of smoking among Saudi adolescents.
[3]
In Situ Nanoparticle Embedding for Authentication of Epoxy Composites.
[4]
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
[5]
The Psychopharmacology of Obsessive-Compulsive Disorder: A Preclinical Roadmap.
[6]
Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET.
[7]
DNA barcoding coupled with high-resolution melting analysis for nut species and walnut milk beverage authentication.
[8]
Global metabolomics analysis of serum from humans at risk of thrombotic stroke.
[9]
A Secure and Portable Multi-Sensor Module for Distributed Air Pollution Monitoring.
[10]
Certificateless pairing-free authentication scheme for wireless body area network in healthcare management system.
[11]
Identity-Based Key Exchange on In-Vehicle Networks: CAN-FD & FlexRay.
[12]
Securing MQTT by Blockchain-Based OTP Authentication.
[13]
Location-Aware Wi-Fi Authentication Scheme Using Smart Contract.
[14]
A Decentralized Privacy-Preserving Healthcare Blockchain for IoT
[15]
Radar-Based Non-Contact Continuous Identity Authentication
[16]
A Blockchain-Based Authentication and Dynamic Group Key Agreement Protocol
[17]
Internet Memes: A Novel Approach to Distinguish Humans and Bots for Authentication
[18]
A Multi-User, Single-Authentication Protocol for Smart Grid Architectures.
[19]
architecture and knowledge-driven self-adaptive security in smart space
[20]
a new three-factor authentication scheme overcome repeat registered attack for wireless sensor networks
[21]
editorial: platforms and ecosystems (september 2017)
[22]
an authentication scheme for clustered wireless sensor networks
[23]
an authenticated key agreement scheme for wireless sensor networks
[24]
A Lightweight Authentication and Key Agreement Schemes for IoT Environments.
[25]
MAKE-IT-A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things.
[26]
aspects concerning the optimization of authentication process for distributed applications
[27]
authentication of patients and participants in health information exchange and consent for medical research: a key step for privacy protection, respect for autonomy, and trustworthiness
[28]
distributed one time password infrastructure for linux environments
[29]
authentication of piper betle l. folium and quantification of their antifungal-activity
[30]
identity authentication over noisy channels
[31]
an improvement on remote user authentication schemes using smart cards
[32]
Blockchain Use in IoT for Privacy-Preserving Anti-Pandemic Home Quarantine
[33]
Authentication of Hedyotis products by adaptor ligation-mediated PCR and metabarcoding.
[34]
Differentiation of and Common Adulterants Based on Chloroplast Genome Sequencing and DNA Barcoding Markers.
[35]
MRM–MS of marker peptides and their abundance as a tool for authentication of meat species and meat cuts in single-cut meat products
[36]
Nigella sativa oil: Physico-chemical properties, authentication analysis and its antioxidant activity
[37]
Inkjet-printed unclonable quantum dot fluorescent anti-counterfeiting labels with artificial intelligence authentication
[38]
Nigella sativa oil: Physico-chemical properties, authentication analysis and its antioxidant activity
[39]
Proteomics for the authentication of fish species.
[40]
Internet Users Authentication via Artificial Intelligence
[41]
A machine learning-based user authentication model using mobile app data
[42]
Rapid Scotch Whisky Analysis and Authentication using Desorption Atmospheric Pressure Chemical Ionisation Mass Spectrometry
[43]
Pemanfaatan Teknologi Fingerprint Authentication untuk Otomatisasi Presensi Perkuliahan
[44]
A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things.
[45]
Based Medical Systems for Patient's Authentication: Towards a New Verification Secure Framework Using CIA Standard.
[46]
Invertible secret image sharing with steganography and authentication for AMBTC compressed images
[47]
Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing
[48]
A key agreement authentication protocol using an improved parallel Pollard rho for electronic payment system
[49]
Authentication of Apis cerana Honey and Apis mellifera Honey Based on Major Royal Jelly Protein 2 Gene.
[50]
Authentication for ID cards based on colour visual cryptography and facial recognition
[51]
Multiple Schemes for Mobile Payment Authentication Using QR Code and Visual Cryptography
[52]
Cloud security architecture based on user authentication and symmetric key cryptographic techniques
[53]
Realization of Identity Card and Face Recognition Two-Factor Authentication System Based on Wechat
[54]
IMBUA: Identity management on blockchain for biometrics-based user authentication
[55]
A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment.
[56]
Radio Frequency Fingerprint-Based Intelligent Mobile Edge Computing for Internet of Things Authentication.
[57]
Authentication scheme using sparse matrix in cloud computing
[58]
Authentication of black cohosh (Actaea racemosa) dietary supplements based on chemometric evaluation of hydroxycinnamic acid esters and hydroxycinnamic acid amides.
[59]
Blockchain-technology-supported platforms for diamond authentication and certification in luxury supply chains
[60]
NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture.
[61]
Computationally efficient mutual authentication protocol for remote infant incubator monitoring system.
[62]
An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system.
[63]
In Situ Nanoparticle Embedding for Authentication of Epoxy Composites.
[64]
Authentication analysis of MT-4 cells distributed by the NIH AIDS Reagent Program.
[65]
Physical layer authentication under intelligent spoofing in wireless sensor networks
[66]
New fool proof examination system through color visual cryptography and signature authentication
[67]
The Communist hero and the April Fool's joke: the cultural politics of authentication and fakery
[68]
Cryptoanalysis of Lightweight and anonymous three-factor authentication and access control protocol for real-time applications in wireless sensor networks
[69]
CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY
[70]
Authentication of the naturalness of wintergreen (Gaultheria genus) essential oils by gas chromatography, isotope ratio mass spectrometry and radiocarbon assessment
[71]
Potential authentication of various meat-based products using simple and efficient DNA extraction method.
[72]
Efficient authentication protocol with anonymity and key protection for mobile Internet users
[73]
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
[74]
ASPA: Advanced Strong Pseudonym based Authentication in Intelligent Transport System.
[75]
Secure and efficient ECC based SIP authentication scheme for VoIP communications in internet of things
[76]
High-efficiency optical image authentication scheme based on ghost imaging and block processing
[77]
An inaudible voice attack to context-based device authentication in smart IoT systems
[78]
DNA barcoding coupled with high-resolution melting analysis for nut species and walnut milk beverage authentication.
[79]
Optimized in-network authentication against pollution attacks in software-defined-named data networking
[80]
Decentralized Authentication of Distributed Patients in Hospital Networks using Blockchain.
[81]
An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs
[82]
An autonomous lightweight conditional privacy-preserving authentication scheme with provable security for vehicular ad-hoc networks
[83]
A Revocable Group Signatures Scheme to Provide Privacy-Preserving Authentications
[84]
A traceable and privacy-preserving authentication for UAV communication control system
[85]
Blockchain-Based Anonymous Authentication with Key Management for Smart Grid Edge Computing Infrastructure
[86]
Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System
[87]
A chimerical dataset combining physiological and behavioral biometric traits for reliable user authentication on smart devices and ecosystems
[88]
A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs
[89]
Using Medical History Embedded in Biometrics Medical Card for User Identity Authentication: Data Representation by AVT Hierarchical Data Tree
[90]
Dynamic Biometric Signature - an Effective Alternative for Electronic Authentication
[91]
Certificateless pairing-free authentication scheme for wireless body area network in healthcare management system.
[92]
Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography.
[93]
An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems
[94]
Pumpkin (Cucurbita maxima) seed oil: Chemical composition, antioxidant activities and its authentication analysis
[95]
A secure biometric-based authentication protocol for global mobility networks in smart cities
[96]
Perceptual Hashing-Based Robust Image Authentication Scheme for Wireless Multimedia Sensor Networks
[97]
An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks
[98]
A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes
[99]
Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication
[100]
Digital image-based tracing of geographic origin, winemaker, and grape type for red wine authentication.
[101]
Securing MQTT by Blockchain-Based OTP Authentication.