ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Design and implementation of an ECDSA-based identity authentication protocol on WSN
2009 3rd IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications
◽
10.1109/mape.2009.5355821
◽
2009
◽
Cited By ~ 3
Author(s):
Wei-hong Wang
◽
Yi-ling Cui
◽
Tie-ming Chen
Keyword(s):
Authentication Protocol
◽
Identity Authentication
◽
Design And Implementation
Download Full-text
Related Documents
Cited By
References
Design and implementation of a RFID security authentication protocol
2013 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA)
◽
10.1109/imsna.2013.6742826
◽
2013
◽
Author(s):
Lei Zhang
◽
Zicong Xiao
Keyword(s):
Authentication Protocol
◽
Rfid Security
◽
Design And Implementation
◽
Security Authentication
Download Full-text
An enhanced one-bit identity authentication protocol for access control in IEEE 802.11
IEEE Military Communications Conference, 2003. MILCOM 2003.
◽
10.1109/milcom.2003.1290221
◽
2004
◽
Cited By ~ 1
Author(s):
Haoli Wang
◽
A. Velayutham
Keyword(s):
Access Control
◽
Ieee 802.11
◽
Authentication Protocol
◽
Identity Authentication
Download Full-text
Quantum identity authentication protocol based on three-photon quantum error avoidance code in edge computing
Transactions on Emerging Telecommunications Technologies
◽
10.1002/ett.3945
◽
2020
◽
pp. e3945
Author(s):
Zhiguo Qu
◽
Xinzhu Liu
◽
Shengyao Wu
Keyword(s):
Authentication Protocol
◽
Identity Authentication
◽
Edge Computing
◽
Quantum Identity Authentication
◽
Quantum Error
◽
Error Avoidance
Download Full-text
A double PUF-based RFID identity authentication protocol in service-centric internet of things environments
Information Sciences
◽
10.1016/j.ins.2019.06.047
◽
2019
◽
Vol 503
◽
pp. 129-147
◽
Cited By ~ 7
Author(s):
Wei Liang
◽
Songyou Xie
◽
Jing Long
◽
Kuan-Ching Li
◽
Dafang Zhang
◽
...
Keyword(s):
Internet Of Things
◽
Authentication Protocol
◽
Identity Authentication
Download Full-text
Design and implementation of identity authentication system based on fingerprint recognition and cryptography
2016 2nd IEEE International Conference on Computer and Communications (ICCC)
◽
10.1109/compcomm.2016.7924704
◽
2016
◽
Cited By ~ 1
Author(s):
Feng Fujun
◽
Li Xinshe
◽
Wang Litao
Keyword(s):
Identity Authentication
◽
Fingerprint Recognition
◽
Design And Implementation
◽
Authentication System
Download Full-text
Wireless Body Area Network Identity Authentication Protocol Based on Physical Unclonable Function
2018 International Conference on Sensor Networks and Signal Processing (SNSP)
◽
10.1109/snsp.2018.00021
◽
2018
◽
Author(s):
Wanda Zhang
◽
Tuanfa Qin
◽
Messaykabew Mekonen
◽
Weichao Wang
Keyword(s):
Wireless Body Area Network
◽
Authentication Protocol
◽
Identity Authentication
◽
Body Area Network
◽
Area Network
◽
Physical Unclonable Function
◽
Body Area
Download Full-text
Design and implementation of a new active RFID authentication protocol based on elliptic curve encryption
2016 SAI Computing Conference (SAI)
◽
10.1109/sai.2016.7556111
◽
2016
◽
Cited By ~ 5
Author(s):
Mustapha Benssalah
◽
Mustapha Djeddou
◽
Karim Drouiche
Keyword(s):
Elliptic Curve
◽
Authentication Protocol
◽
Active Rfid
◽
Design And Implementation
Download Full-text
Based on Social Network Theory Security Identity Authentication Protocol Research on MANET
2015 International Conference on Intelligent Transportation, Big Data and Smart City
◽
10.1109/icitbs.2015.46
◽
2015
◽
Author(s):
Jie Niu
Keyword(s):
Social Network
◽
Network Theory
◽
Authentication Protocol
◽
Identity Authentication
◽
Social Network Theory
Download Full-text
Design and Implementation of Unified Identity Authentication Service Based on AD
2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)
◽
10.1109/cicn.2016.84
◽
2016
◽
Author(s):
Hongjie Wang
◽
Cheng Gong
Keyword(s):
Identity Authentication
◽
Design And Implementation
Download Full-text
An Identity Authentication Protocol for Acknowledgment in IEEE 802.15.4 Network
Lecture Notes in Computer Science - Network and Parallel Computing
◽
10.1007/11577188_51
◽
2005
◽
pp. 355-358
Author(s):
Joon Heo
◽
Choong Seon Hong
Keyword(s):
Ieee 802.15.4
◽
Authentication Protocol
◽
Identity Authentication
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close