ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Research on Blockchain-Based Inter-Domain Routing Authentication Technology
Mapping Intimacies
◽
10.1109/icct52962.2021.9657917
◽
2021
◽
Author(s):
Yi Su
◽
Baosheng Wang
◽
Qianqian Xing
◽
Pengkun Li
◽
Xiaofeng Wang
◽
...
Keyword(s):
Authentication Technology
◽
Inter Domain Routing
Download Full-text
Related Documents
Cited By
References
Authentication Technology: Identity Theft and Account Takeover.
PsycEXTRA Dataset
◽
10.1037/e313422004-001
◽
2002
◽
Author(s):
John Pollock
◽
James May
Keyword(s):
Identity Theft
◽
Authentication Technology
Download Full-text
The effects of use on acceptance and trust in voice authentication technology
PsycEXTRA Dataset
◽
10.1037/e577592012-022
◽
2006
◽
Author(s):
Carl W. Turner
◽
Jennifer A. Safar
◽
Karthik Ramaswamy
Keyword(s):
Authentication Technology
Download Full-text
Two-factor Authentication technology based on Key-Stroke
Jouranl of Information and Security
◽
10.33778/kcsa.2020.20.3.029
◽
2020
◽
Vol 20
(3)
◽
pp. 29-37
Author(s):
Jun-Yeon An
◽
◽
Gwang-Feel Ko
◽
Tae-jin Lee
Keyword(s):
Authentication Technology
Download Full-text
Authentication Technology in Industrial Control System Based on Identity Password
2020 39th Chinese Control Conference (CCC)
◽
10.23919/ccc50068.2020.9188372
◽
2020
◽
Author(s):
Luyao Yang
◽
Wenli Shang
◽
Chunyu Chen
◽
Tianyu Wang
◽
Zhoubin Liu
Keyword(s):
Control System
◽
Industrial Control System
◽
Industrial Control
◽
Authentication Technology
Download Full-text
Identity-Based Secure Inter-Domain Routing Protocol
Journal of Software
◽
10.3724/sp.j.1001.2009.03396
◽
2009
◽
Vol 20
(12)
◽
pp. 3223-3239
◽
Cited By ~ 5
Author(s):
Na WANG
◽
Ying-Jian ZHI
◽
Jian-Hui ZHANG
◽
Dong-Nian CHENG
◽
Bin-Qiang WANG
Keyword(s):
Routing Protocol
◽
Identity Based
◽
Inter Domain Routing
Download Full-text
Finger Vein Authentication Technology and Financial Applications
Advances in Biometrics
◽
10.1007/978-1-84628-921-7_6
◽
2008
◽
pp. 89-105
◽
Cited By ~ 11
Author(s):
Mitsutoshi Himaga
◽
Katsuhiro Kou
Keyword(s):
Financial Applications
◽
Finger Vein
◽
Authentication Technology
Download Full-text
User-Customizing Oriented Multipath Inter-Domain Routing
2018 IEEE International Conference on Networking, Architecture and Storage (NAS)
◽
10.1109/nas.2018.8515732
◽
2018
◽
Author(s):
Donghong Qin
◽
Jiahai Yang
◽
Lina Ge
Keyword(s):
Inter Domain Routing
Download Full-text
On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards
Privacy Enhancing Technologies - Lecture Notes in Computer Science
◽
10.1007/978-3-642-39077-7_13
◽
2013
◽
pp. 245-264
◽
Cited By ~ 16
Author(s):
Marian Harbach
◽
Sascha Fahl
◽
Matthias Rieger
◽
Matthew Smith
Keyword(s):
National Identity
◽
Privacy Preserving
◽
Authentication Technology
◽
Identity Cards
Download Full-text
Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy
10.17487/rfc1519
◽
1993
◽
Cited By ~ 132
Author(s):
V. Fuller
◽
T. Li
◽
J. Yu
◽
K. Varadhan
Keyword(s):
Inter Domain Routing
Download Full-text
User Authentication Technology using Multiple SSO in the Cloud Computing Environment
Journal of the Korea Society of Computer and Information
◽
10.9708/jksci.2016.21.4.031
◽
2016
◽
Vol 21
(4)
◽
pp. 31-38
Author(s):
Min-Hee Cho
◽
Eun-Gyeom Jang
◽
Yong-Rak Choi
Keyword(s):
Cloud Computing
◽
User Authentication
◽
Computing Environment
◽
Cloud Computing Environment
◽
Authentication Technology
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close