ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Anonymous Authentication Technology Review in Vehicle Networking Environment
Mapping Intimacies
◽
10.1007/978-981-16-6554-7_82
◽
2021
◽
pp. 758-765
Author(s):
Haoyan Zhang
◽
Guangjun Liang
◽
Jiacheng He
◽
Mingtao Ji
Keyword(s):
Anonymous Authentication
◽
Authentication Technology
◽
Vehicle Networking
◽
Technology Review
Download Full-text
Related Documents
Cited By
References
Authentication Technology: Identity Theft and Account Takeover.
PsycEXTRA Dataset
◽
10.1037/e313422004-001
◽
2002
◽
Author(s):
John Pollock
◽
James May
Keyword(s):
Identity Theft
◽
Authentication Technology
Download Full-text
The effects of use on acceptance and trust in voice authentication technology
PsycEXTRA Dataset
◽
10.1037/e577592012-022
◽
2006
◽
Author(s):
Carl W. Turner
◽
Jennifer A. Safar
◽
Karthik Ramaswamy
Keyword(s):
Authentication Technology
Download Full-text
Two-factor Authentication technology based on Key-Stroke
Jouranl of Information and Security
◽
10.33778/kcsa.2020.20.3.029
◽
2020
◽
Vol 20
(3)
◽
pp. 29-37
Author(s):
Jun-Yeon An
◽
◽
Gwang-Feel Ko
◽
Tae-jin Lee
Keyword(s):
Authentication Technology
Download Full-text
Learning Technology Review: Vocabulary.com
CALICO Journal
◽
10.1558/cj.38229
◽
2019
◽
Vol 37
(2)
◽
pp. 205-212
Author(s):
Hiromi Nishioka
Keyword(s):
Learning Technology
◽
Technology Review
Download Full-text
Certain Investigations on Anonymous Authentication Mechanisms for Data Stored in Clouds
International Journal of Innovative Research in Computer and Communication Engineering
◽
10.15680/ijircce.2015.0301043
◽
2015
◽
Vol 03
(01)
◽
pp. 180-183
Author(s):
J.Ganesh kumar
◽
N.Ra jesh
◽
J.Elava rasan
◽
Prof. M.Sarmila
◽
Prof.S.Bala murugan
Keyword(s):
Anonymous Authentication
Download Full-text
TECHNOLOGY REVIEW
Journal of Enhanced Heat Transfer
◽
10.1615/jenhheattransf.v1.i3.20
◽
1994
◽
Vol 1
(3)
◽
pp. 219-220
◽
Cited By ~ 1
Author(s):
Ralph L. Webb
Keyword(s):
Technology Review
Download Full-text
Authentication Technology in Industrial Control System Based on Identity Password
2020 39th Chinese Control Conference (CCC)
◽
10.23919/ccc50068.2020.9188372
◽
2020
◽
Author(s):
Luyao Yang
◽
Wenli Shang
◽
Chunyu Chen
◽
Tianyu Wang
◽
Zhoubin Liu
Keyword(s):
Control System
◽
Industrial Control System
◽
Industrial Control
◽
Authentication Technology
Download Full-text
Design-flow Methodology for Secure Group Anonymous Authentication
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)
◽
10.23919/date48585.2020.9116290
◽
2020
◽
Cited By ~ 1
Author(s):
Rashmi Agrawal
◽
Lake Bu
◽
Eliakin Del Rosario
◽
Michel A. Kinsy
Keyword(s):
Design Flow
◽
Anonymous Authentication
Download Full-text
Anonymous Authentication of Data Stored in Clouds using Decentralized Access Control Scheme
International Journal of Recent Advancement in Engineering & Research
◽
10.24128/ijraer.2017.wx78no
◽
2017
◽
Vol 2
(10)
◽
pp. 17
Author(s):
Rajiv Verma
Keyword(s):
Access Control
◽
Anonymous Authentication
◽
Control Scheme
Download Full-text
In Situ/On-Site Biodegradation of Refined Oils and Fuels (A Technology Review). Volume 3. Appendices B to F.
10.21236/ada252683
◽
1992
◽
Author(s):
Eve Riser-Roberts
Keyword(s):
Technology Review
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close